<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Get rid of Secondary Connect - use VPN routing in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/260349#M1633</link>
    <description>&lt;P&gt;&lt;A href="https://pages.checkpoint.com/infinity-identity-early-availability-program.html" target="_self"&gt;Infinity Identity is still in Early Availability&lt;/A&gt;&amp;nbsp;as far as I know (though&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;can confirm)&lt;BR /&gt;Currently it requires R82 management and either R81.20 or R82 gateways.&lt;BR /&gt;As this requires Infinity Portal, I expect there will ultimately be a charge for this, but the details are not finalized yet.&lt;/P&gt;</description>
    <pubDate>Mon, 20 Oct 2025 15:53:35 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-10-20T15:53:35Z</dc:date>
    <item>
      <title>Get rid of Secondary Connect - use VPN routing</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/257877#M1630</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For now vpn client are using basic authentication (AD login/password) and I want to enforce a new authentication method for vpn client (azure SAML),&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The issue is every client usually open a secondary tunnel to our main site, it's totaly transparent for the user.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;With SAML I will have a prompt when the second tunnel open, so I want to get ride of this functionnality, the traffic going though this secondary tunnel is legit but I want to use vpn routing instead.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To achieve this, should I disable secondary connect on all gateway with "$FWDIR/conf/trac_client_1.ttm" file ?&lt;BR /&gt;Or can I only modify Encryption domain for vpn client to include the destination subnet of the remote gateway ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is a picture of a part of my infra (default: default encryption domain, azure, vpn-client are specific encryption domain)&lt;/P&gt;&lt;P&gt;site 1 is the center gateway of a star community where site 2 and 3 are satellite&lt;/P&gt;&lt;P&gt;clients on site 2 and 3 usually open a secondary tunnel to site 1&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I add the subnet in red and blue in encryption domain, should it be enough ? I did some test and I still see a secondary tunnel, if I check routes on client I see subnets from all my gateway is it the issue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="secondaryconnect.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31504i937F0227E26A260C/image-size/large?v=v2&amp;amp;px=999" role="button" title="secondaryconnect.jpg" alt="secondaryconnect.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;All Gateway version : R81.20 Take 99&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Sep 2025 09:21:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/257877#M1630</guid>
      <dc:creator>Khay</dc:creator>
      <dc:date>2025-09-22T09:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Get rid of Secondary Connect - use VPN routing</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/258493#M1631</link>
      <description>&lt;P&gt;This is expected behavior with SAML as each gateway/cluster is a unique service provider.&lt;BR /&gt;I believe it's possible to use Infinity Identity with Secondary Connect, though I'm sure&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;will correct me if I'm wrong.&lt;/P&gt;
&lt;P&gt;Without Infinity Identity and SAML, yes, you have to disable Secondary Connect if you don't want to be prompted for authentication again.&lt;BR /&gt;If you want a specific gateway to allow access to other subnets behind other gateways via VPN routing, you need to add those subnets to the RemoteAccess encryption domain on the relevant gateway.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2025 20:56:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/258493#M1631</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-29T20:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Get rid of Secondary Connect - use VPN routing</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/260301#M1632</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;thanks for the information, I didnt know Infinity Identity.&lt;/P&gt;&lt;P&gt;Is it only available on R82 ? this component is part of a subscription or can be use free of charge ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 07:20:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/260301#M1632</guid>
      <dc:creator>Khay</dc:creator>
      <dc:date>2025-10-20T07:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Get rid of Secondary Connect - use VPN routing</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/260349#M1633</link>
      <description>&lt;P&gt;&lt;A href="https://pages.checkpoint.com/infinity-identity-early-availability-program.html" target="_self"&gt;Infinity Identity is still in Early Availability&lt;/A&gt;&amp;nbsp;as far as I know (though&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;can confirm)&lt;BR /&gt;Currently it requires R82 management and either R81.20 or R82 gateways.&lt;BR /&gt;As this requires Infinity Portal, I expect there will ultimately be a charge for this, but the details are not finalized yet.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 15:53:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/260349#M1633</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-10-20T15:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Get rid of Secondary Connect - use VPN routing</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/260430#M1634</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;for tagging me.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN&gt;The administrator configures the IDP once in the Infinity Portal.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;The IDP is "replicated" into SmartConsole, and you can place it for authentication and in the access role picker.&lt;/LI&gt;
&lt;LI&gt;The infinity portal acts as a SAML service provider, and the identity can be shared via Infinity Identity to other gateways (to Identity Awareness component).&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Now, to the disclamers &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Infinity Identity is a cloud service, and the gateway side that supports it is currently in EA. It will be included in R82.10GA2 which is right across the corner.&lt;/LI&gt;
&lt;LI&gt;the VPN support for Infinity Identity/Portal SAML I/S was not released yet. It is planned for 2026 as far as I know. Currently only Identity Awareness supports this (from R82 GA).&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 21 Oct 2025 08:38:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Get-rid-of-Secondary-Connect-use-VPN-routing/m-p/260430#M1634</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2025-10-21T08:38:35Z</dc:date>
    </item>
  </channel>
</rss>

