- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
How I can restirct users with Endpoint client (remote acccess) only and allow only users with Endpoint client with policy from SmartEndpoint?
Should I try setting up SVC on the VPN GW R80.20?
Andrey
If you use Enterprise Security VPN clients with FW (Desktop policy defined in Dashboard), there is a simple solution: After a certain date, change the Inbound and Outbound Rules in Dashboard to Drop instead of Encrypt 8)
On next connection, these clients will load the new policy and be unable to connect anymore ! EPS clients will not use this policy.
Can you explain - maybe using examples of which kind of behaviour you want and which not - what restrictions you speak of ?
Currently all users connect to R80.20 Gateway using Endpoint clients (Windows and MacOS). We plan to use Harmony SmartEndpoint server for deploy policy (Firewall, compliance, anti-malware and etc.) for remote users. So we would like to restrict old users with Endoint client without Policy connect to GW and allow only users with clients deployed from exported package from SmartEndpoint server.
If you use Enterprise Security VPN clients with FW (Desktop policy defined in Dashboard), there is a simple solution: After a certain date, change the Inbound and Outbound Rules in Dashboard to Drop instead of Encrypt 8)
On next connection, these clients will load the new policy and be unable to connect anymore ! EPS clients will not use this policy.
Thank you for solution.
Unfortunately we don't use Desktop Policy defined in Dashboard, only remote access vpn.
Then change to use Desktop Policy defined in Dashboard - that is easy !
Thank you. I will check the solution.
I think you are just using the pre-defined default Desktop Policy found in old Dashboard and do not realize that - it only tells the client to encrypt outgoing and decrypt ingoing packets, that is just the usual VPN client behaviour ! You can see that in old Dashboard.
Also see Remote Access VPN R81 Administration Guide p.82 for details and the note:
If you use Endpoint Security VPN as part of the Check Point Endpoint Security Suite, you can configure if your client Firewall comes from Desktop Security in SmartDashboard or SmartEndpoint.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY