<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Desktop Security firewall policy in active state after Endpoint Client disconnected from server in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221055#M3480</link>
    <description>&lt;P&gt;Good day.&lt;/P&gt;&lt;P&gt;According to R81.20 Remote Access manual created SVC check with additional test desktop security firewall policy (just simple block outgoing traffic to 8.8.8.8).&lt;/P&gt;&lt;P&gt;SCV works perfectly but firewall policy always in active state even when there is no connection to VPN server.&lt;/P&gt;&lt;P&gt;How to enforce Endpoint client to disable firewall in disconnected state? I would not like to allow remote clients to decide for themselves when to turn off the firewall.&lt;/P&gt;&lt;P&gt;I know that Harmony has such functionality, but we use simple SCV.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jul 2024 12:50:01 GMT</pubDate>
    <dc:creator>akurtasanov</dc:creator>
    <dc:date>2024-07-17T12:50:01Z</dc:date>
    <item>
      <title>Desktop Security firewall policy in active state after Endpoint Client disconnected from server</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221055#M3480</link>
      <description>&lt;P&gt;Good day.&lt;/P&gt;&lt;P&gt;According to R81.20 Remote Access manual created SVC check with additional test desktop security firewall policy (just simple block outgoing traffic to 8.8.8.8).&lt;/P&gt;&lt;P&gt;SCV works perfectly but firewall policy always in active state even when there is no connection to VPN server.&lt;/P&gt;&lt;P&gt;How to enforce Endpoint client to disable firewall in disconnected state? I would not like to allow remote clients to decide for themselves when to turn off the firewall.&lt;/P&gt;&lt;P&gt;I know that Harmony has such functionality, but we use simple SCV.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 12:50:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221055#M3480</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2024-07-17T12:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: Desktop Security firewall policy in active state after Endpoint Client disconnected from server</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221111#M3481</link>
      <description>&lt;P&gt;You can configure a different policy for connected and disconnected using the Desktop Security features (not as part of SCV).&lt;BR /&gt;I don't believe you can disable the firewall entirely, but you can make the policy "any any" if you'd like:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/Desktop-Security.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/Desktop-Security.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 17:56:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221111#M3481</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-17T17:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Desktop Security firewall policy in active state after Endpoint Client disconnected from server</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221150#M3482</link>
      <description>&lt;P&gt;Added next:&lt;BR /&gt;&lt;BR /&gt;:allow_ipv6 (&lt;BR /&gt;:gateway (allow_ipv6&lt;BR /&gt;:default (false)&lt;BR /&gt;)&lt;BR /&gt;)&lt;BR /&gt;:disconnected_in_house_fw_policy_enabled (&lt;BR /&gt;:gateway (disconnected_in_house_fw_policy_enabled&lt;BR /&gt;:default (true)&lt;BR /&gt;)&lt;BR /&gt;)&lt;BR /&gt;:disconnected_in_house_fw_policy_mode (&lt;BR /&gt;:gateway (disconnected_in_house_fw_policy_mode&lt;BR /&gt;:default (any_any_allow)&lt;BR /&gt;)&lt;BR /&gt;)&lt;/P&gt;&lt;P&gt;Installed policy&lt;/P&gt;&lt;P&gt;Nothing on client. After several tries Any Any Deny in Desktop Security rule still in active state after VPN disconnection.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 07:08:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221150#M3482</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2024-07-18T07:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Desktop Security firewall policy in active state after Endpoint Client disconnected from server</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221271#M3483</link>
      <description>&lt;P&gt;Where did you put this configuration exactly?&lt;BR /&gt;These look like ttm settings, just want to confirm.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2024 17:05:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221271#M3483</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-18T17:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: Desktop Security firewall policy in active state after Endpoint Client disconnected from server</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221344#M3484</link>
      <description>&lt;P&gt;Yes in&amp;nbsp;trac_client_1.ttm.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 02:14:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221344#M3484</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2024-07-19T02:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: Desktop Security firewall policy in active state after Endpoint Client disconnected from server</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221348#M3485</link>
      <description>&lt;P&gt;There are errors in the official documentation:&lt;/P&gt;&lt;P&gt;1)&amp;nbsp;any_any_allow - is wrong. In&amp;nbsp;sk75221 there is no&amp;nbsp;&amp;nbsp;any_any_allow&amp;nbsp; in disconnected_in_house_fw_policy_mode section. Only&amp;nbsp;&lt;SPAN&gt;all_allow instead off&amp;nbsp;&amp;nbsp;any_any_allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2) Even with enabled&amp;nbsp;right&amp;nbsp;all_allow option&amp;nbsp;"Any - Any - Allow" will not be enforced. Enforced will be first "Any User@Any" with block or allow action.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3) With enabled&amp;nbsp;Location Awareness for desktop firewall is much better to use&amp;nbsp;"Any - Any - Encrypt" default implied rules for inbound and outbound connections +&amp;nbsp;encrypt_to_allow in&amp;nbsp;disconnected_in_house_fw_policy_mode section in ttm file.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 04:26:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Desktop-Security-firewall-policy-in-active-state-after-Endpoint/m-p/221348#M3485</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2024-07-19T04:26:13Z</dc:date>
    </item>
  </channel>
</rss>

