<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Admin access to Spark 1555 in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249409#M12679</link>
    <description>&lt;P&gt;I think there is no way around it. You can only fill in hosts IP's and network ranges.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As workaround you could manage the firewall via VPN client. With VPN client you will get an IP from the pool. This pool you can add as VPN range in the access list:&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="MCDropDownHead dropDownHead"&gt;&lt;A class="MCDropDownHotSpot dropDownHotspot MCDropDownHotSpot_ MCHotSpotImage" role="button" href="https://sc1.checkpoint.com/documents/SMB_R81.10.X/AdminGuides_Centrally_Managed/EN/Content/Topics/Configuring-Administrator-Access.htm?Highlight=local%20ip#" aria-expanded="true" aria-controls="mc-dropdown-body60280c84-da67-414e-81db-bc50aa019fae" target="_blank"&gt;To set the interface sources from which&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_admin variable"&gt;administrator&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;access is allowed&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="mc-dropdown-body60280c84-da67-414e-81db-bc50aa019fae" class="MCDropDownBody dropDownBody"&gt;
&lt;DIV class="No_Page_Break_Inside"&gt;
&lt;P&gt;Select one or more of these options:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;LAN&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- All internal physical ports&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Trusted wireless&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Wireless networks that are allowed access to the LAN by default (only in Wireless Network models.)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="Menu_Options"&gt;VPN&lt;/SPAN&gt;&amp;nbsp;- Uses encrypted traffic through VPN tunnels from a remote site or uses a remote access client&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Internet&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Clear traffic from the Internet (not recommended to allow access from all&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="SearchHighlight SearchHighlight2"&gt;IP&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;addresses)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 20 May 2025 17:50:10 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2025-05-20T17:50:10Z</dc:date>
    <item>
      <title>Admin access to Spark 1555</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249396#M12678</link>
      <description>&lt;P&gt;These devices allow you to lock down admin access via the internet to specific IP addresses. The problem is, my IP address is DHCP from the ISP, so can change occasionally. In the security policy I have used a domain object pointing to my domain so the name is resolved from DNS, which is kept up to date automatically by a little docker container, which all works fine. However, the admin access only allows you to add IP addresses, not names that could be resolved.&lt;/P&gt;&lt;P&gt;Has anyone else had this problem and found a way round it at all?&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 13:54:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249396#M12678</guid>
      <dc:creator>StevePearson</dc:creator>
      <dc:date>2025-05-20T13:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access to Spark 1555</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249409#M12679</link>
      <description>&lt;P&gt;I think there is no way around it. You can only fill in hosts IP's and network ranges.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As workaround you could manage the firewall via VPN client. With VPN client you will get an IP from the pool. This pool you can add as VPN range in the access list:&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="MCDropDownHead dropDownHead"&gt;&lt;A class="MCDropDownHotSpot dropDownHotspot MCDropDownHotSpot_ MCHotSpotImage" role="button" href="https://sc1.checkpoint.com/documents/SMB_R81.10.X/AdminGuides_Centrally_Managed/EN/Content/Topics/Configuring-Administrator-Access.htm?Highlight=local%20ip#" aria-expanded="true" aria-controls="mc-dropdown-body60280c84-da67-414e-81db-bc50aa019fae" target="_blank"&gt;To set the interface sources from which&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_admin variable"&gt;administrator&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;access is allowed&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="mc-dropdown-body60280c84-da67-414e-81db-bc50aa019fae" class="MCDropDownBody dropDownBody"&gt;
&lt;DIV class="No_Page_Break_Inside"&gt;
&lt;P&gt;Select one or more of these options:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;LAN&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- All internal physical ports&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Trusted wireless&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Wireless networks that are allowed access to the LAN by default (only in Wireless Network models.)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="Menu_Options"&gt;VPN&lt;/SPAN&gt;&amp;nbsp;- Uses encrypted traffic through VPN tunnels from a remote site or uses a remote access client&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Internet&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Clear traffic from the Internet (not recommended to allow access from all&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="SearchHighlight SearchHighlight2"&gt;IP&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;addresses)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 20 May 2025 17:50:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249409#M12679</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-05-20T17:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access to Spark 1555</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249414#M12680</link>
      <description>&lt;P&gt;As DNS queries can be changed by a man-in-the-midddle, we only allow fixed IPs to be configured for admin access.&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 18:47:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249414#M12680</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-20T18:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access to Spark 1555</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249478#M12684</link>
      <description>&lt;P&gt;Interesting work around thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 09:56:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Admin-access-to-Spark-1555/m-p/249478#M12684</guid>
      <dc:creator>StevePearson</dc:creator>
      <dc:date>2025-05-21T09:56:58Z</dc:date>
    </item>
  </channel>
</rss>

