- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Simple as it gets: I need to only allow to establish remote access connections (with the VPN client and/or Capsule) from certain countries for some users. Is there any way to do it?
I know I could allow/deny https connection to the gateway from a country on the access control rulebase, but I can't do that as some users maybe will be connecting from different countries... But I need to be sure that other users can't connect from some other countries.
The location tab on the user properties only allow me to use network objects so that also doesn't work me. And neither the Geo Policy offer the flexibility to do this.
Hope I was clear with my question, thanks!
Have you tried using a rule with source: countries vpn: remote access action: drop?
This implies R80.20.
Hi Jerry, maybe my question appears to be complicated, but is as easy as you said in your last paragraph. I think the problem is the rule I need needs to much granularity.
Like you said, I know how to drop traffic from specific countries... And I know how to drop traffic from specific RA users... But as you said, I need both aspects in place and enforced in the same rule.
Maybe with an example the issue will be simpler to understand: need to drop RA connections from USA for certain users (or user groups), but other RA users still have to be able to connect from USA.
If I do a drop rule for USA above the MAB/RA access rule, it will drop *all* RA connections incoming from USA, regardless which user is the one trying to connect.
The granularity is the issue here: I need the cake, eat it and have it ![]()
You can block certain countries from updatable object list.
This doesn't work as you get the error: "Only user groups and access roles are supported as source in VPN and client authentication rules".
Also, Implied rules take precedence, so the rule wouldn't apply even if we were allowed to use it.
Would you mind send a screenshot of that rule please? I want to see what it looks like, so I can try mimic it in my lab.
Thanks!
In order to block or allow RA VPN users by geo country, you would need the ability to add Updatable Objects to the Network screen of an Access Role object as a matching criteria. This does not currently seem to be possible, probably because there is no mechanism to propagate Updatable Object changes on the fly into the IA User to IP Address cache (displayed with pdp monitor all).
You can try checking with the Solutions Center via your Check Point SE to see if they have some code that can enable this capability, otherwise you are probably looking at an RFE.
Hi Timothy,
Thanks for the reply. I can check with support.
However, your reply was talking about adding updatable objects to the Access Role object. As per my previous reply the PNG attached, does not include Access Role.
We want to block anyone connecting to the VPN from outside the United Kingdom. Is there anyway to get that to work as both the_rock and PhoneBoy has suggested the same method of using updatable objects with RemoteAccess VPN domain. I'm just surprised it doesn't work (they probably are too).
Hi PhoneBoy,
Old thread, but I tried your suggestion, and I get the below error:
"Only user groups and access roles are supported as source in VPN and client authentication rules"
Also, as implied rules are run first, packets are accepted even if I were able to use a rule like this.
Using R80.40
I am finding the same. We need to block connections out of Colombia for example. so only the users of one country can connect.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 4 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY