- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We have overlapping IP ranges between a supplier and us. Once they connect to us they can no longer access their printers etc.
Client is running Endpoint security E80.81. Firewalls running R77.30
Connection Details
User Name RXXXX
IP 69.159.XXX.XX
VPN Gateway hfpXna_gateway_cluster
Client Type Other
Connect Time 1:50:59 PM 9/11/2018
SCV State Unknown
Version
Operating System
Build Number
Last SCV Fail Reason
Internal IP 192.168.245.160
Authentication Method XAUTH
Encryption Algorithm ESP3DES
Visitor Mode False
Route traffic False
UDP Encapsulation NATT
Office Mode True
Any ideas on how to work around this. Way back in the past we fixed this by making a batch file that the user could run to change their routes to point the conflicting 10 network to their local gateway.
Anybody know of a better way to handle this?
Short of changing your own encryption domain to exclude the relevant IP addresses, you're pretty much limited to the batch script.
Years ago, I wrote my own script for this, documented in this thread: https://community.checkpoint.com/thread/5919-route-vpn-client-remote-access-to-lan
I had this same problem, and I solved it with sk121766.
I hope it helps you.
Can you try to exclude the IP addresses of their printers from your Remote access VPN Domain object? If you have a network subnet defined on your gateway properties, then you might want to switch to a group containing network subnets/ip address ranges instead
Short of changing your own encryption domain to exclude the relevant IP addresses, you're pretty much limited to the batch script.
Years ago, I wrote my own script for this, documented in this thread: https://community.checkpoint.com/thread/5919-route-vpn-client-remote-access-to-lan
Hi @PhoneBoy we have a very similar scenario like this with our VPN client these days.
For few ips on some users systems there are multiple entries in their route tables, We don't want that traffic to go over vpn so that ip is not in tunnel encryption domain and still those ip's are showing up in route table.
This is causing the issues with the websites getting error as took too long to load. Now i can manually delete those entries and the site loads up fine.
But the query is what might be causing the issue here? The batch file script which you shared it can work if we've few know ip's but this issue with multiple sites and is there any reason it might happen?
I've attached a snip of working and not working scenario where left section is of working system and right one is not working scenario. Any help would be really helpful.
Thanks for getting back on this query, i've checked a few time remoteaccess encryption domain and couldn't find those ip's in there. I've a TAC case already opened up so hopefully they should be able to find the cause of this.
Was just curious on this "groups with exclusion" do we create them in encryption domain itself?
Preferably redesign your network in such a way that you only need public IP's for VPN purposes.
That is the only way to avoid overlaps.
Doing some creative NATting might be a workaround.
I had this same problem, and I solved it with sk121766.
I hope it helps you.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY