<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSEC VPN and proxy PAC in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97577#M9873</link>
    <description>&lt;P&gt;When connecting using the Endpoint Security Client, I am receiving a proxy PAC file from the DC. while I have modified the PAC file to allow my VPN subnet to go direct this isn't working as expected. I am able to access all internal resource but cannot browse the internet, disabling the pac file works straight away.&lt;/P&gt;&lt;P&gt;Here is a snippet of the pac file&lt;/P&gt;&lt;P&gt;function FindProxyForURL(url, host) {&lt;BR /&gt;// our local URLs from the domains below example.com don't need a proxy:&lt;BR /&gt;if (dnsDomainIs(host, "*.office.com")) return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.office365.com"))return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.teams.microsoft.com"))return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.lync.com")) return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.broadcast.skype.com")) return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.skypeforbusiness.com")) return "DIRECT";&lt;/P&gt;&lt;P&gt;// If the requested website is hosted within the internal network, send direct.&lt;BR /&gt;if (isPlainHostName(host) ||&lt;BR /&gt;shExpMatch(host, "*.local") ||&lt;BR /&gt;isInNet(dnsResolve(host), "10.0.0.0", "255.0.0.0") ||&lt;BR /&gt;isInNet(dnsResolve(host), "172.0.0.0", "255.0.0.0") ||&lt;BR /&gt;isInNet(dnsResolve(host), "192.168.0.0", "255.255.0.0") ||&lt;BR /&gt;isInNet(dnsResolve(host), "127.0.0.0", "255.255.255.0"))&lt;BR /&gt;return "DIRECT";&lt;/P&gt;&lt;P&gt;// subnet, send to a specific proxy.&lt;BR /&gt;if (isInNet(myIpAddress(), "172.16.0.0", "255.255.255.0"))&lt;BR /&gt;return "DIRECT";&lt;/P&gt;&lt;P&gt;// Proxy Addresses&lt;BR /&gt;return "PROXY 10.0.0.1:8080";&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;While this is not a Checkpoint issue. I would like to know if it is possible to tell the firewall or Endpoint Security Client to block the pac file from being downloaded and installed on the client machine&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 26 Sep 2020 06:21:30 GMT</pubDate>
    <dc:creator>H2-F1</dc:creator>
    <dc:date>2020-09-26T06:21:30Z</dc:date>
    <item>
      <title>IPSEC VPN and proxy PAC</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97577#M9873</link>
      <description>&lt;P&gt;When connecting using the Endpoint Security Client, I am receiving a proxy PAC file from the DC. while I have modified the PAC file to allow my VPN subnet to go direct this isn't working as expected. I am able to access all internal resource but cannot browse the internet, disabling the pac file works straight away.&lt;/P&gt;&lt;P&gt;Here is a snippet of the pac file&lt;/P&gt;&lt;P&gt;function FindProxyForURL(url, host) {&lt;BR /&gt;// our local URLs from the domains below example.com don't need a proxy:&lt;BR /&gt;if (dnsDomainIs(host, "*.office.com")) return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.office365.com"))return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.teams.microsoft.com"))return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.lync.com")) return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.broadcast.skype.com")) return "DIRECT";&lt;BR /&gt;if (dnsDomainIs(host, "*.skypeforbusiness.com")) return "DIRECT";&lt;/P&gt;&lt;P&gt;// If the requested website is hosted within the internal network, send direct.&lt;BR /&gt;if (isPlainHostName(host) ||&lt;BR /&gt;shExpMatch(host, "*.local") ||&lt;BR /&gt;isInNet(dnsResolve(host), "10.0.0.0", "255.0.0.0") ||&lt;BR /&gt;isInNet(dnsResolve(host), "172.0.0.0", "255.0.0.0") ||&lt;BR /&gt;isInNet(dnsResolve(host), "192.168.0.0", "255.255.0.0") ||&lt;BR /&gt;isInNet(dnsResolve(host), "127.0.0.0", "255.255.255.0"))&lt;BR /&gt;return "DIRECT";&lt;/P&gt;&lt;P&gt;// subnet, send to a specific proxy.&lt;BR /&gt;if (isInNet(myIpAddress(), "172.16.0.0", "255.255.255.0"))&lt;BR /&gt;return "DIRECT";&lt;/P&gt;&lt;P&gt;// Proxy Addresses&lt;BR /&gt;return "PROXY 10.0.0.1:8080";&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;While this is not a Checkpoint issue. I would like to know if it is possible to tell the firewall or Endpoint Security Client to block the pac file from being downloaded and installed on the client machine&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Sep 2020 06:21:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97577#M9873</guid>
      <dc:creator>H2-F1</dc:creator>
      <dc:date>2020-09-26T06:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN and proxy PAC</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97578#M9874</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I would try and configure the proxy.pac file to check if the host is any other subnet other than the one allocated for RemoteAccess and exempt it from using the proxy server.&lt;/P&gt;&lt;P&gt;Also, are you using split tunnel ?&lt;/P&gt;</description>
      <pubDate>Sat, 26 Sep 2020 08:11:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97578#M9874</guid>
      <dc:creator>funkylicious</dc:creator>
      <dc:date>2020-09-26T08:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN and proxy PAC</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97583#M9875</link>
      <description>&lt;P&gt;The host is a mapped to a different vlan/subnet when in the office, would this matter when it connects over the vpn? yes split tunnelling is enabled.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Sep 2020 12:27:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97583#M9875</guid>
      <dc:creator>H2-F1</dc:creator>
      <dc:date>2020-09-26T12:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN and proxy PAC</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97585#M9876</link>
      <description>&lt;P&gt;When the user/device is in the office, I would expect the normal behaviour is to use the proxy in order to be granted internet access.&lt;/P&gt;&lt;P&gt;When it's at home/other location with Internet access, to use that in order to be granted Internet access and not having to use the proxy located in the office/datacenter.&lt;/P&gt;&lt;P&gt;For this, in the configuration of the proxy.pac that is downloaded on the client's machine, to have another check of see if the computer IP is in the subnet/range assigned for Office Mode / Remote Access and return DIRECT and not&amp;nbsp;&lt;SPAN&gt;"PROXY 10.0.0.1:8080"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Sep 2020 13:23:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/97585#M9876</guid>
      <dc:creator>funkylicious</dc:creator>
      <dc:date>2020-09-26T13:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN and proxy PAC</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/131374#M9877</link>
      <description>&lt;P&gt;Ok, someone knows witch code works in PAC file, to realy identify the computer IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This "&lt;SPAN&gt;if (isInNet(myIpAddress(),&amp;nbsp;" doesnt work. I dont know much about JS, but in my tries all I got is the IP 127.0.0.1, even with others fuctions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Oct 2021 14:30:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/IPSEC-VPN-and-proxy-PAC/m-p/131374#M9877</guid>
      <dc:creator>AlanDias</dc:creator>
      <dc:date>2021-10-08T14:30:48Z</dc:date>
    </item>
  </channel>
</rss>

