What you’re seeing (“No security policy is configured” / “Firewall policy is not configured”) almost always means the client is not receiving a Desktop/Endpoint policy from your Check Point environment. In other words: the VPN tunnel may come up briefly, but the Endpoint Firewall blade has no policy to enforce, and your environment may be configured to block/limit traffic when endpoint policy/compliance is missing, which explains why the Internet drops and the client keeps reconnecting. (support.checkpoint.com)
Below is the most practical Check Point–aligned way to fix it, with the two common deployment models.
1) First: confirm you’re using the right client “mode”
If you only need Remote Access VPN (no endpoint firewall/compliance), install the VPN-only client. If you installed the full “Endpoint Security” package (Firewall/Compliance), it expects policy.
If your organization does want Endpoint Firewall/Compliance, keep reading and fix policy delivery.
2) Most common root cause: Desktop Security Policy is not installed/available for this user/gateway
For Check Point Remote Access clients, the Desktop Security Policy must be configured and installed on the Remote Access gateway to support policy-driven desktop controls (including firewall behavior). (support.checkpoint.com)
Fix path (Security Management / SmartConsole)
-
In SmartConsole → Security Policies, ensure you have a Desktop Security Policy (Policy Type = Desktop Security).
-
Configure at least a basic Desktop Firewall policy (even permissive) so the client receives something.
-
Install the Desktop policy to the relevant Remote Access gateway(s).
Check Point’s admin guide describes the workflow to create/configure a Desktop Security policy in SmartConsole and then open/configure the Desktop policy (including firewall). (Checkpoint)
If Desktop policy isn’t installed (or the gateway isn’t acting as Policy Server for desktops), the client can connect but still display “No security policy is configured”. (support.checkpoint.com)
3) Alternative root cause: endpoint is not managed / not assigned to a policy (Harmony Endpoint / EPM)
If your org uses Harmony Endpoint (EPM) for policy, the new laptop may not be:
-
registered/enrolled correctly, or
-
placed in the right group, or
-
allowed to fetch policy (certificate/trust chain/identity mismatch).
Symptom-wise, the result is identical: VPN connects, but endpoint firewall stays yellow because no policy arrived. (Your old laptop likely still has a valid enrollment + cached policy.)
Practical checks (admin side):
4) Why Internet drops right after “Connected”
This pattern usually happens when:
-
the environment enforces desktop policy / compliance and blocks traffic if the endpoint is “unmanaged / no policy”, or
-
a “disconnect if policy missing” posture is enabled, which triggers reconnection loops.
This is consistent with Check Point guidance that Desktop Security policy must exist/installed for proper operation of desktop controls. (support.checkpoint.com)
5) What to do next (fast, actionable)
If you manage RA VPN from SmartConsole (most common):
If you manage via Harmony Endpoint (EPM):
If you don’t need endpoint firewall at all: