<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Harmony SASE Technical View in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Harmony-SASE-Technical-View/m-p/273557#M14407</link>
    <description>&lt;P&gt;Another great write up!&lt;/P&gt;</description>
    <pubDate>Mon, 16 Mar 2026 21:39:57 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-03-16T21:39:57Z</dc:date>
    <item>
      <title>Harmony SASE Technical View</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Harmony-SASE-Technical-View/m-p/273556#M14406</link>
      <description>&lt;H2&gt;Architecture, adoption phases, and failure points (Control Plane vs Data Plane)&lt;/H2&gt;
&lt;H3&gt;Thesis&lt;/H3&gt;
&lt;P&gt;Harmony SASE is not “a VPN in the cloud.” It is a SASE platform with a global &lt;STRONG&gt;PoP/Region mesh&lt;/STRONG&gt; acting as &lt;STRONG&gt;policy enforcement points&lt;/STRONG&gt; for two primary planes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Internet Access (SWG)&lt;/STRONG&gt; for web/SaaS&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Private Access (ZTNA)&lt;/STRONG&gt; for private applications (on-prem / cloud)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The operational differentiator is a &lt;STRONG&gt;centralized governance and policy model&lt;/STRONG&gt;, combined with &lt;STRONG&gt;site-to-cloud connectivity&lt;/STRONG&gt; (tunnels) and &lt;STRONG&gt;routed interconnectivity&lt;/STRONG&gt; (when required).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;1) Mental model: Control Plane vs Data Plane&lt;/H2&gt;
&lt;H3&gt;Control Plane (management/policy)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Policies, objects, users, and rules are managed in the &lt;STRONG&gt;Infinity Portal&lt;/STRONG&gt; (Harmony SASE Admin Portal).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Examples:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Internet Access Policy (SWG)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Data Loss Prevention (DLP)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Private Access&lt;/STRONG&gt; rules&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Directory integrations (&lt;STRONG&gt;AD / Azure AD / SCIM&lt;/STRONG&gt;) and automation APIs&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Data Plane (traffic)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Remote users, branches, and workloads establish connectivity to the &lt;STRONG&gt;PoP/Region mesh&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Traffic is routed to:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Internet Access (SWG):&lt;/STRONG&gt; secure access to web/SaaS&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Private Access (ZTNA):&lt;/STRONG&gt; secure access to private applications (on-prem or cloud)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Traffic flows (text diagram)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Remote Users (Agent / on-device)&lt;/STRONG&gt; → &lt;STRONG&gt;Harmony SASE PoP&lt;/STRONG&gt; → &lt;STRONG&gt;Web/SaaS&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Remote Users / BYOD (Agentless)&lt;/STRONG&gt; → &lt;STRONG&gt;Harmony SASE PoP&lt;/STRONG&gt; → &lt;STRONG&gt;Private Apps (DC/Cloud)&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Offices / DC / Cloud workloads (IPsec/WireGuard/OpenVPN)&lt;/STRONG&gt; → &lt;STRONG&gt;Harmony SASE PoP&lt;/STRONG&gt; → &lt;STRONG&gt;Interconnectivity / routing&lt;/STRONG&gt; (when applicable)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Critical note:&lt;/STRONG&gt; “Full mesh” refers to any-to-any connectivity via the SASE backbone, but &lt;STRONG&gt;site-to-site interconnectivity requires explicit routing&lt;/STRONG&gt; — it is not automatic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;2) Architecture: components and responsibilities&lt;/H2&gt;
&lt;H3&gt;2.1 PoPs/Regions and Cloud Gateways&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Harmony SASE operates through &lt;STRONG&gt;globally distributed PoPs&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The PoP is the &lt;STRONG&gt;policy enforcement point&lt;/STRONG&gt; for Internet Access and Private Access.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Region selection directly impacts &lt;STRONG&gt;latency, user experience, and resiliency&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;2.2 Network connectivity (site-to-cloud tunnels)&lt;/H3&gt;
&lt;P&gt;Three tunnel types are supported to connect sites/resources into the mesh:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;IPsec Site-to-Site VPN&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;WireGuard Connector&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;OpenVPN&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Interconnectivity (site ↔ site)&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;To interconnect sites through the SASE mesh, you must configure routes in the &lt;STRONG&gt;Route Table&lt;/STRONG&gt;, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;each site’s subnets, and&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;the mesh subnet (e.g., &lt;STRONG&gt;10.255.0.0/16&lt;/STRONG&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Operational caution:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;In &lt;STRONG&gt;policy-based&lt;/STRONG&gt; environments, interconnectivity may require multiple Phase II SAs and not all routers support this model; &lt;STRONG&gt;route-based IPsec&lt;/STRONG&gt; is recommended for interconnectivity use cases.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;WireGuard Connector (common pitfall)&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;By default, the WireGuard Connector is installed in &lt;STRONG&gt;accessor mode&lt;/STRONG&gt;, which does &lt;STRONG&gt;not&lt;/STRONG&gt; allow &lt;STRONG&gt;resource-to-resource&lt;/STRONG&gt; traffic without specific configuration/re-installation.&lt;BR /&gt;This is a classic root cause of “tunnel is up, but no lateral traffic.”&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;2.3 Internet Access (SWG) + Threat Prevention&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;The typical design is to start with &lt;STRONG&gt;Internet Access Policy&lt;/STRONG&gt; and, when needed, define &lt;STRONG&gt;bypass rules&lt;/STRONG&gt; for critical applications—especially apps with &lt;STRONG&gt;certificate pinning&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Important: enforcement of &lt;STRONG&gt;Threat Prevention / DLP / inspection&lt;/STRONG&gt; can impact performance and compatibility; rollout should be &lt;STRONG&gt;controlled&lt;/STRONG&gt;, with baselines and monitoring.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;2.4 Private Access (ZTNA) + Agentless&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Secure access to private applications (e.g., &lt;STRONG&gt;SSH, RDP, Web, Database&lt;/STRONG&gt;) via agent or &lt;STRONG&gt;agentless portal&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Enables onboarding for &lt;STRONG&gt;BYOD and third parties&lt;/STRONG&gt; without requiring agent deployment/management in specific scenarios.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;2.5 Data Loss Prevention (DLP)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Integrated DLP module with policies scoped by members/groups and management of &lt;STRONG&gt;Data Types / Data Groups&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Integration with &lt;STRONG&gt;Microsoft Purview Sensitivity Labels&lt;/STRONG&gt; for data governance.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;2.6 Agent governance (anti-tampering / uninstall control)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Ability to protect uninstallation with a code (“&lt;STRONG&gt;Uninstall is Protected&lt;/STRONG&gt;”), reducing control evasion and posture/enforcement drift.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;3) Threat/Failure scenarios (real-world failures)&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Tunnel UP, no traffic (site ↔ site)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Almost always missing explicit routes in the Route Table for remote subnets + the mesh subnet.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;WireGuard Connector with no lateral traffic&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Default accessor mode blocks resource-to-resource unless reconfigured.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Application breaks after inspection (SSL / SWG)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Most commonly certificate pinning → requires a bypass rule.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Data exfiltration via SaaS/AI&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Without DLP or correct group/risk scoping, sensitive data escapes via uploads/web apps.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Operations without governance&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Lack of logging/telemetry and metrics turns troubleshooting into trial-and-error and MTTR spikes.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H2&gt;4) Architecture options (trade-offs)&lt;/H2&gt;
&lt;H3&gt;Option A — Traditional VPN + NGFW/Proxy&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Pros&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Fast initial deployment&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Operational familiarity&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Cons&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Expanded attack surface (network exposure)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Low per-application granularity&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Fragmented governance and observability&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Harder to enforce identity-driven Zero Trust&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Option B — Point ZTNA + separate SWG&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Pros&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Reduces exposure with application-level access&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Good incremental evolution path&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Cons&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Multiple consoles and policy stacks&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;More complex integrations/troubleshooting&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Hard to unify logs and governance&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Option C — Harmony SASE (Internet Access + Private Access + Tunnels + Interconnectivity)&lt;/H3&gt;
&lt;P&gt;&lt;STRONG&gt;Pros&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Centralized policy/governance model&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;PoPs/Regions as global enforcement points&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;ZTNA/agentless + DLP + Threat Prevention under unified governance&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Support for IPsec/WireGuard/OpenVPN&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Cons&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Interconnectivity requires explicit routing design (route-based recommended)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Controlled rollout required (bypass/pinning/tuning)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Subnet planning needed to avoid overlaps&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 16 Mar 2026 21:11:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Harmony-SASE-Technical-View/m-p/273556#M14406</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-16T21:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony SASE Technical View</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Harmony-SASE-Technical-View/m-p/273557#M14407</link>
      <description>&lt;P&gt;Another great write up!&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2026 21:39:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Harmony-SASE-Technical-View/m-p/273557#M14407</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-16T21:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony SASE Technical View</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Harmony-SASE-Technical-View/m-p/273559#M14408</link>
      <description>&lt;P&gt;Very good &lt;span class="lia-unicode-emoji" title=":hundred_points:"&gt;💯&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2026 22:40:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Harmony-SASE-Technical-View/m-p/273559#M14408</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-03-16T22:40:16Z</dc:date>
    </item>
  </channel>
</rss>

