<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Excluded Services issue in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25089#M13596</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right, I understand that.&lt;/P&gt;&lt;P&gt;What I'm saying is the example they provide for the ranges - Mid-TCP-Ports:&amp;nbsp;&lt;SPAN style="font-weight: bolder;"&gt;81&lt;/SPAN&gt; to &lt;SPAN style="font-weight: bolder;"&gt;442&lt;/SPAN&gt;. &amp;amp; High-TCP-Ports:&amp;nbsp;&lt;SPAN style="font-weight: bolder;"&gt;444&lt;/SPAN&gt; to &lt;SPAN style="font-weight: bolder;"&gt;65535, &lt;/SPAN&gt;although I can create them, will not work for some reason.&lt;/P&gt;&lt;P&gt;Is there a limitation with service ranges for VPN exclusion?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 May 2018 13:27:29 GMT</pubDate>
    <dc:creator>Dave_Taylor1</dc:creator>
    <dc:date>2018-05-25T13:27:29Z</dc:date>
    <item>
      <title>Excluded Services issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25087#M13594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We recently encountered&amp;nbsp;an issue setting up an IPSEC tunnel between our Check Point and Bluecoat/Symantec for their Web Security Services.&amp;nbsp;We could not successfully use&amp;nbsp;service ranges as recommended within Check Point. We were able to&amp;nbsp;create the service ranges, however it failed to&amp;nbsp;exclude the services.&lt;/P&gt;&lt;P&gt;We instead were required&amp;nbsp;to&amp;nbsp;list every service we needed to&amp;nbsp;exempt from the tunnel.&lt;/P&gt;&lt;P&gt;Is this a known limitation within Check Point R77.30 or has this been addressed with R80.10?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Blue Coat's instruction&lt;/P&gt;&lt;OL style="color: #000000;"&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;In the SmartDashboard, select &lt;SPAN class="" style="font-weight: bolder;"&gt;Services&lt;/SPAN&gt;.&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;Right-click &lt;SPAN class="" style="font-weight: bolder;"&gt;Group&lt;/SPAN&gt; and select &lt;SPAN class="" style="font-weight: bolder;"&gt;New Group&lt;/SPAN&gt;. The interface displays the Group Properties dialog.&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;&lt;P&gt;Click &lt;SPAN class="" style="font-weight: bolder;"&gt;New&lt;/SPAN&gt;. The interface displays the Group Properties dialog.&lt;/P&gt;&lt;OL&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;&lt;SPAN class="" style="font-weight: bolder;"&gt;Name&lt;/SPAN&gt; the object. For example, indicate that these are ports 1 to 79.&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;In &lt;SPAN class="" style="font-weight: bolder;"&gt;Port&lt;/SPAN&gt; field, enter &lt;SPAN class="" style="font-weight: bolder;"&gt;1-79&lt;/SPAN&gt;. This excludes all ports up to &lt;SPAN class=""&gt;80&lt;/SPAN&gt; (web).&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;Click &lt;SPAN class="" style="font-weight: bolder;"&gt;Advanced&lt;/SPAN&gt;. The interface displays the Advanced TCP&amp;nbsp;Service Properties dialog.&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;Select &lt;SPAN class="" style="font-weight: bolder;"&gt;Match For 'Any'&lt;/SPAN&gt;. This prevents policy installation warnings because of a possible already-defined port.&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;Click&amp;nbsp;&lt;SPAN class="" style="font-weight: bolder;"&gt;OK&lt;/SPAN&gt;; click&amp;nbsp;OK again to close the Group Properties dialog.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;&lt;P&gt;Repeat &lt;SPAN class="" style="color: #213c60; font-weight: bold;"&gt;Steps 3.1&lt;/SPAN&gt; through &lt;SPAN class="" style="color: #213c60; font-weight: bold;"&gt;3.3&lt;/SPAN&gt; to add two more groups.&lt;/P&gt;&lt;OL&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;Mid-TCP-Ports:&amp;nbsp;&lt;SPAN class="" style="font-weight: bolder;"&gt;81&lt;/SPAN&gt; to &lt;SPAN class="" style="font-weight: bolder;"&gt;442&lt;/SPAN&gt;.&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;&lt;P&gt;High-TCP-Ports:&amp;nbsp;&lt;SPAN class="" style="font-weight: bolder;"&gt;444&lt;/SPAN&gt; to &lt;SPAN class="" style="font-weight: bolder;"&gt;65535&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;This allows port &lt;SPAN class=""&gt;443&lt;/SPAN&gt; traffic into the VPN tunnel.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI style="color: #000000; margin-top: 10px;"&gt;&lt;P&gt;(Optional) You can also add ICMP and all UDP ports.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2018 16:45:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25087#M13594</guid>
      <dc:creator>Dave_Taylor1</dc:creator>
      <dc:date>2018-05-21T16:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Excluded Services issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25088#M13595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you list from BlueCoat is how to define which traffic should not go thru the VPN tunnel - but you left out the final step, that is, where you have to add these newly defined service/port groups so they are excluded ! This is made in Community settings under &lt;EM&gt;Excluded Services&lt;/EM&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 08:56:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25088#M13595</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-05-25T08:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Excluded Services issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25089#M13596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right, I understand that.&lt;/P&gt;&lt;P&gt;What I'm saying is the example they provide for the ranges - Mid-TCP-Ports:&amp;nbsp;&lt;SPAN style="font-weight: bolder;"&gt;81&lt;/SPAN&gt; to &lt;SPAN style="font-weight: bolder;"&gt;442&lt;/SPAN&gt;. &amp;amp; High-TCP-Ports:&amp;nbsp;&lt;SPAN style="font-weight: bolder;"&gt;444&lt;/SPAN&gt; to &lt;SPAN style="font-weight: bolder;"&gt;65535, &lt;/SPAN&gt;although I can create them, will not work for some reason.&lt;/P&gt;&lt;P&gt;Is there a limitation with service ranges for VPN exclusion?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 13:27:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25089#M13596</guid>
      <dc:creator>Dave_Taylor1</dc:creator>
      <dc:date>2018-05-25T13:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Excluded Services issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25090#M13597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just an FYI. Apparently this was an issue in certain versions of R77.30 later fixed in a HotFix, but not an issue in R80.10 according to our support at Optiv.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2018 17:47:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25090#M13597</guid>
      <dc:creator>Dave_Taylor1</dc:creator>
      <dc:date>2018-07-10T17:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Excluded Services issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25091#M13598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Confirmed.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117975" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117975"&gt;Services configured as Excluded for IPSec tunnel are not being excluded&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2018 12:44:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/25091#M13598</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-11T12:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Excluded Services issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/245199#M13599</link>
      <description>&lt;P&gt;I just encountered this bug in R81.10 and the workaround in the sk fixed it.&lt;/P&gt;&lt;P&gt;I guess TAC would like to hear about it?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 08:47:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Excluded-Services-issue/m-p/245199#M13599</guid>
      <dc:creator>Robin_H</dc:creator>
      <dc:date>2025-03-31T08:47:25Z</dc:date>
    </item>
  </channel>
</rss>

