<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Endpoint Security VPN in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243945#M2247</link>
    <description>&lt;P&gt;Gateway &amp;amp; client version, is MEP configured?&lt;/P&gt;
&lt;P&gt;Does this effect all users/clients or just your specific location and what type of ISP link is used e.g. IPV6 or CGNAT etc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 17 Mar 2025 13:28:50 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2025-03-17T13:28:50Z</dc:date>
    <item>
      <title>Endpoint Security VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243938#M2246</link>
      <description>&lt;P&gt;My client currently has Firewall A and Firewall B, which are connected via an IPsec VPN. However, when using Capsule VPN (Windows), whether the gateway is set to Firewall A or Firewall B, access to the internal network works. But with Endpoint Security VPN, unlike with Capsule VPN, access to the internal network of each firewall is not possible. Has anyone experienced a similar situation? When pinging, the packets don't even reach the firewall. It's not a policy issue.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 13:09:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243938#M2246</guid>
      <dc:creator>dkzndkqh</dc:creator>
      <dc:date>2025-03-17T13:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Security VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243945#M2247</link>
      <description>&lt;P&gt;Gateway &amp;amp; client version, is MEP configured?&lt;/P&gt;
&lt;P&gt;Does this effect all users/clients or just your specific location and what type of ISP link is used e.g. IPV6 or CGNAT etc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 13:28:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243945#M2247</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-03-17T13:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Security VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243956#M2248</link>
      <description>&lt;P&gt;No, current vpn community is mesh type , so it is not an MEP configuration , and it applies to all users connecting via Endpoint Security VPN regardless of location. The ISP is using CGNAT."&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 14:37:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243956#M2248</guid>
      <dc:creator>dkzndkqh</dc:creator>
      <dc:date>2025-03-17T14:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Security VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243965#M2249</link>
      <description>&lt;P&gt;Just curious, does deleting and re-creating tyhe site works? If not, then we would need to do captures to see if you even see any traffic on tunnel test port 18234?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 16:05:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243965#M2249</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T16:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Endpoint Security VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243966#M2250</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/119966"&gt;@dkzndkqh&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See my lab example...IMPORTANT to point out, see how last flag shows Oe, meaning outbound and encrypted.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@R82:0]# fw monitor -e "accept port(18234);"&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_debug_filter_off&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorfreebufs&lt;BR /&gt;************************************************************** NOTE **************************************************************&lt;BR /&gt;*** Using "-e" filter will not monitor accelerated traffic. To monitor and filter accelerated traffic please use the "-F" filter ***&lt;BR /&gt;************************************************************************************************************************************&lt;BR /&gt;FW monitor will record only ip &amp;amp; transport layers in a packet&lt;BR /&gt;For capturing the whole packet please do -w&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_ppak_all_position&lt;BR /&gt;monitor: getting filter (from command line)&lt;BR /&gt;monitor: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;monitor: loading&lt;BR /&gt;monitor: monitoring (control-C to stop)&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormaxpacket&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitormask&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorallocbufs&lt;BR /&gt;PPAK 0: Get before set operation succeeded of printuuid&lt;BR /&gt;[vs_0][fw_1] eth0:i[40]: 172.17.10.1 -&amp;gt; 172.16.10.253 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18534 -&amp;gt; 18234&lt;BR /&gt;[vs_0][fw_1] eth0:I[40]: 172.17.10.1 -&amp;gt; 172.16.10.253 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18534 -&amp;gt; 18234&lt;BR /&gt;[vs_0][fw_1] eth0:o[40]: 172.16.10.253 -&amp;gt; 172.17.10.1 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18234 -&amp;gt; 18534&lt;BR /&gt;[vs_0][fw_1] eth0:O[40]: 172.16.10.253 -&amp;gt; 172.17.10.1 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18234 -&amp;gt; 18534&lt;BR /&gt;[vs_0][fw_1] eth0:Oe[40]: 172.16.10.253 -&amp;gt; 172.17.10.1 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18234 -&amp;gt; 18534&lt;BR /&gt;[vs_0][fw_1] eth0:i[40]: 172.17.10.1 -&amp;gt; 172.16.10.253 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18535 -&amp;gt; 18234&lt;BR /&gt;[vs_0][fw_1] eth0:I[40]: 172.17.10.1 -&amp;gt; 172.16.10.253 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18535 -&amp;gt; 18234&lt;BR /&gt;[vs_0][fw_1] eth0:o[40]: 172.16.10.253 -&amp;gt; 172.17.10.1 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18234 -&amp;gt; 18535&lt;BR /&gt;[vs_0][fw_1] eth0:O[40]: 172.16.10.253 -&amp;gt; 172.17.10.1 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18234 -&amp;gt; 18535&lt;BR /&gt;[vs_0][fw_1] eth0:Oe[40]: 172.16.10.253 -&amp;gt; 172.17.10.1 (UDP) len=40 id=1&lt;BR /&gt;UDP: 18234 -&amp;gt; 18535&lt;BR /&gt;^C monitor: caught sig 2&lt;BR /&gt;monitor: unloading&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_kiss_enable&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitor_debug_filter_off&lt;BR /&gt;PPAK 0: Get before set operation succeeded of fwmonitorfreebufs&lt;BR /&gt;[Expert@R82:0]#&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2025 16:08:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Endpoint-Security-VPN/m-p/243966#M2250</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-17T16:08:58Z</dc:date>
    </item>
  </channel>
</rss>

