<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Changing Encryption Domain?  Client may not update. in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269198#M1304</link>
    <description>&lt;P&gt;It was actually Grok that said it might be the site's cached material and to recreate it or delete the trac file.&lt;BR /&gt;&lt;BR /&gt;I spent about 3 hours going through LDAP groups, validating objects, auditing changes, and every other thing related to how the VPN was talking to the client.&amp;nbsp; Then to find that the client was stubborn and not listening to what it was told.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Jan 2026 12:49:53 GMT</pubDate>
    <dc:creator>George_Ellis</dc:creator>
    <dc:date>2026-01-30T12:49:53Z</dc:date>
    <item>
      <title>Changing Encryption Domain?  Client may not update.</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269041#M1299</link>
      <description>&lt;P&gt;Just passing this on as we just encountered it.&lt;BR /&gt;&lt;BR /&gt;A request came to add some new IPs to the Encryption Domain so that the traffic would go internally instead of to the internet in the split tunnel configuration.&amp;nbsp; Added new IPs.&amp;nbsp; Oops, those new IPs are used by other apps, put it back the way it was.&lt;BR /&gt;&lt;BR /&gt;A client logged in to the original settings.&amp;nbsp; Then the change with the new IPs, and the client logged in.&amp;nbsp; THEN (last one), the client logged in after the backoff.&amp;nbsp; The client was still going through the internal path (I spent a bunch of time verifying this with audits, etc.)&lt;BR /&gt;&lt;BR /&gt;Problem?&amp;nbsp; The client had cached the path.&lt;BR /&gt;Easiest Solution?&amp;nbsp; Delete the site in the VPN client and recreate it.&lt;BR /&gt;&lt;BR /&gt;Or you can delete the trac.config file.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Like I said, just passing it on.&amp;nbsp; I did not find a SK referencing it, so I decided to share it here.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 13:48:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269041#M1299</guid>
      <dc:creator>George_Ellis</dc:creator>
      <dc:date>2026-01-29T13:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Changing Encryption Domain?  Client may not update.</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269053#M1300</link>
      <description>&lt;P&gt;Could you please explain the issue in a bit more detail? It was a little difficult to understand, but from what I understood, you have a Remote Access configuration with split tunneling enabled, intended to ensure that an application with a public IP does not go out through the internet for VPN clients, but instead is accessed through the application’s private IP via the tunnel.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1 – Show this points:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Re-enter the IPs in the VPN domain and push the policy again.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Ask the user to disconnect and reconnect.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Restart the VPN client.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In some cases, restarting the computer may help.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Check whether the client’s computer received the new routes using route print in the command prompt.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Run a tracert to the application from the test user’s machine and verify whether it is going through the tunnel as expected.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Test with other users.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Best Regards&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 29 Jan 2026 14:13:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269053#M1300</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-29T14:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Changing Encryption Domain?  Client may not update.</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269090#M1301</link>
      <description>&lt;P&gt;That is not the scenario.&amp;nbsp; The destination is a AWS address.&amp;nbsp; They wanted the AWS connection to pass through internal networks so that it could get a corp public NAT.&amp;nbsp; So they added the IP to the Encryption Domain.&amp;nbsp; That broke others going to the same address for different apps that relied on the internet connection.&amp;nbsp; So, removed the IP from the group defining the encryption domain.&amp;nbsp; That fixed it for many, but a few clients were still trying to go through internal.&amp;nbsp; It was because the client still had the path defined in the previous config.&amp;nbsp; Restarting did not change it.&amp;nbsp; By redoing the site, that cleared it from tracs.config.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 16:39:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269090#M1301</guid>
      <dc:creator>George_Ellis</dc:creator>
      <dc:date>2026-01-29T16:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Changing Encryption Domain?  Client may not update.</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269176#M1302</link>
      <description>&lt;P&gt;Im so glad you posted about this, because I had the same issue with few clients. I really wish I knew in what scenarios deleting and recreating the site would NOT be needed.&lt;/P&gt;
&lt;P&gt;Sadly, that appears to be very difficult to know, so I make sure I always let people know that might be needed, so they are aware beforehand.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 02:55:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269176#M1302</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T02:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Changing Encryption Domain?  Client may not update.</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269177#M1303</link>
      <description>&lt;P&gt;Out of curiousity, though obviously its AI response, but somewhat interesting...&lt;/P&gt;
&lt;P&gt;******************&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;In Check Point &lt;STRONG&gt;Remote Access VPN&lt;/STRONG&gt; (Harmony/Endpoint Security VPN / Mobile / SNX), you &lt;STRONG&gt;do NOT need to delete &amp;amp; re‑create the VPN “site” on the client&lt;/STRONG&gt; as long as the change you made on the firewall &lt;STRONG&gt;doesn’t invalidate what the client cached when the site was created&lt;/STRONG&gt; (gateway address resolution, trust/fingerprint, and authentication method). &lt;A href="https://sc1.checkpoint.com/documents/RemoteAccessClients_forWindows_AdminGuide/Content/Topics-RA-VPN-for-Win/Preparing-the-Gateway-Fingerprint.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;, &lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/R81-10-Delete-and-adding-existing-site-Checkpoint-Endpoint/td-p/184254" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;, &lt;A href="https://community.checkpoint.com/t5/Mobile/delete-and-recreate-of-VPN-site-in-Check-Point-Mobile-VPN-client/td-p/234717" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Below are the &lt;STRONG&gt;common change types where re-creating the site is &lt;EM&gt;not&lt;/EM&gt; needed&lt;/STRONG&gt;—a disconnect/reconnect (or “Update Topology”) is usually enough.&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="changesthattypicallydonotrequiredeletingrecreatingtheclientsite"&gt;&lt;span class="lia-unicode-emoji" title=":white_heavy_check_mark:"&gt;✅&lt;/span&gt; Changes that typically &lt;STRONG&gt;DO NOT&lt;/STRONG&gt; require deleting/re-creating the client “site”&lt;/H2&gt;
&lt;H3 id="1accesscontrolsecuritypolicyrulechanges"&gt;1) &lt;STRONG&gt;Access Control / Security Policy rule changes&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;If you’re only changing what remote users can access (new rules, modified services, rule ordering, VPN column changes, etc.), the &lt;STRONG&gt;client site entry doesn’t need to change&lt;/STRONG&gt;—you just &lt;STRONG&gt;install policy&lt;/STRONG&gt; and users reconnect. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="2remoteaccesscommunitymembershipusergroupchanges"&gt;2) &lt;STRONG&gt;Remote Access community membership / user group changes&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Adding/removing gateways in the Remote Access community, changing participating user groups, or changing Identity Awareness / Access Roles that control who gets access are &lt;STRONG&gt;policy-side changes&lt;/STRONG&gt;; they do not require rebuilding the site on the endpoint. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="3cryptosettingsadjustedinglobalpropertiesencryptionintegritydh"&gt;3) &lt;STRONG&gt;Crypto settings adjusted in Global Properties (encryption/integrity/DH)&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Changing IKE/IPsec proposal preferences (encryption algorithms, integrity, DH group) is normally handled via policy and negotiation; users typically just reconnect after policy install. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Practical note: users may need to &lt;STRONG&gt;disconnect/reconnect&lt;/STRONG&gt; so Phase 1/2 can renegotiate using the new settings. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3 id="4topologyofficemodeparameterswhereupdatetopologyissufficient"&gt;4) &lt;STRONG&gt;Topology/Office Mode parameters where “Update Topology” is sufficient&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;When you change things like Office Mode behavior, split-tunnel routes, or similar “site topology” data, Check Point’s own guidance is generally to have users &lt;STRONG&gt;create or update site topology&lt;/STRONG&gt; after policy install—not necessarily delete/recreate the site entry. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;H3 id="5certificateupdateswherethetrustanchorfingerprintexpectationdoesntchange"&gt;5) &lt;STRONG&gt;Certificate updates where the trust anchor/fingerprint expectation doesn’t change&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;The client uses a &lt;STRONG&gt;fingerprint/trust check&lt;/STRONG&gt; during site definition/initial connection; if your changes don’t alter what the client expects/trusts (e.g., still anchored the same way), then you typically don’t need to delete/recreate—at most users may see a prompt to verify/accept. &lt;A href="https://sc1.checkpoint.com/documents/RemoteAccessClients_forWindows_AdminGuide/Content/Topics-RA-VPN-for-Win/Preparing-the-Gateway-Fingerprint.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="asimpleruleofthumbfasttest"&gt;A simple rule of thumb (fast test)&lt;/H2&gt;
&lt;P&gt;You &lt;STRONG&gt;usually don’t need&lt;/STRONG&gt; to delete/recreate the site if &lt;STRONG&gt;all three&lt;/STRONG&gt; are true:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Same gateway identifier&lt;/STRONG&gt; (the hostname/IP the site points to still works) &lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/R81-10-Delete-and-adding-existing-site-Checkpoint-Endpoint/td-p/184254" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Same authentication method&lt;/STRONG&gt; (you didn’t switch CP password ↔ RADIUS/other) &lt;A href="https://community.checkpoint.com/t5/Mobile/delete-and-recreate-of-VPN-site-in-Check-Point-Mobile-VPN-client/td-p/234717" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Trust/fingerprint isn’t “stale”&lt;/STRONG&gt; (client isn’t rejecting the gateway identity) &lt;A href="https://sc1.checkpoint.com/documents/RemoteAccessClients_forWindows_AdminGuide/Content/Topics-RA-VPN-for-Win/Preparing-the-Gateway-Fingerprint.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If those hold, changes like policies, groups, and crypto settings generally don’t require site recreation. &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/P&gt;
&lt;HR /&gt;
&lt;H2 id="forcontextwhensiterecreationiscommonlyrequiredsoyoucanavoidit"&gt;For context: when site recreation &lt;STRONG&gt;is&lt;/STRONG&gt; commonly required (so you can avoid it)&lt;/H2&gt;
&lt;P&gt;Even though you didn’t ask, this helps draw the boundary:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Switching authentication mechanism&lt;/STRONG&gt; (e.g., Check Point password → RADIUS) can require delete/re-add. &lt;A href="https://community.checkpoint.com/t5/Mobile/delete-and-recreate-of-VPN-site-in-Check-Point-Mobile-VPN-client/td-p/234717" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If the site was added by &lt;STRONG&gt;FQDN&lt;/STRONG&gt;, the client may resolve it once; if the gateway IP behind that FQDN changes, you may have to delete/re-add. &lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/R81-10-Delete-and-adding-existing-site-Checkpoint-Endpoint/td-p/184254" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2 id="quicktroubleshootingbeforetellinguserstodeleterecreate"&gt;Quick troubleshooting before telling users to delete/recreate&lt;/H2&gt;
&lt;P&gt;Try these in order (least disruptive first):&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Disconnect/reconnect&lt;/STRONG&gt; (forces renegotiation). &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Update site topology&lt;/STRONG&gt; / refresh site info (if your client UI supports it). &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Configuring-Policy.htm" target="_blank"&gt;[sc1.checkpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;If it’s an FQDN-based site and you suspect IP changed, confirm behavior (some clients cache resolution). &lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/R81-10-Delete-and-adding-existing-site-Checkpoint-Endpoint/td-p/184254" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;HR /&gt;
&lt;H3 id="acouplequestionssoicananswerexactlyforyourenvironment"&gt;A couple questions so I can answer &lt;EM&gt;exactly&lt;/EM&gt; for your environment&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;Which client are you using: &lt;STRONG&gt;Harmony Endpoint VPN / Endpoint Security VPN / Mobile VPN / SNX&lt;/STRONG&gt;?&lt;/LI&gt;
&lt;LI&gt;Do users create the site using &lt;STRONG&gt;FQDN&lt;/STRONG&gt; (e.g., &lt;CODE&gt;vpn.company.com&lt;/CODE&gt;) or a &lt;STRONG&gt;raw IP&lt;/STRONG&gt;? &lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/R81-10-Delete-and-adding-existing-site-Checkpoint-Endpoint/td-p/184254" target="_blank"&gt;[community….kpoint.com]&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;What change are you planning (policy rule change, encryption settings, certificate, auth method, gateway IP/FQDN)?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;If you tell me those three, I can give you a precise “&lt;STRONG&gt;no client action / reconnect only / update topology / must recreate&lt;/STRONG&gt;” answer for your specific change.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 30 Jan 2026 03:01:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269177#M1303</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T03:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: Changing Encryption Domain?  Client may not update.</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269198#M1304</link>
      <description>&lt;P&gt;It was actually Grok that said it might be the site's cached material and to recreate it or delete the trac file.&lt;BR /&gt;&lt;BR /&gt;I spent about 3 hours going through LDAP groups, validating objects, auditing changes, and every other thing related to how the VPN was talking to the client.&amp;nbsp; Then to find that the client was stubborn and not listening to what it was told.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 12:49:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Changing-Encryption-Domain-Client-may-not-update/m-p/269198#M1304</guid>
      <dc:creator>George_Ellis</dc:creator>
      <dc:date>2026-01-30T12:49:53Z</dc:date>
    </item>
  </channel>
</rss>

