- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
We have the following setup:
2 R80.10 clusters managed by a R80.10 SmartCenter
A VPN is established between the 2 clusters
The VPN community allows only VPN domains defined behind each Firewall.
How can we reconfigure it so that the remote branch can access the corporate LAN AND also be routed to the Internet through the Central FW?
Regards
1: Change VPN community to star topology
2. Set main GW to Center GW
3. Add peer as satellite GW
4. Enable VPN Routing with option To center, or through the center to other satellites, to internet and other VPN targets. Use VPN routing for every connection a satellite gateway handles. Packets sent by a satellite gateway pass through the VPN tunnel to the central gateway before being routed to the destination address.
1: Change VPN community to star topology
2. Set main GW to Center GW
3. Add peer as satellite GW
4. Enable VPN Routing with option To center, or through the center to other satellites, to internet and other VPN targets. Use VPN routing for every connection a satellite gateway handles. Packets sent by a satellite gateway pass through the VPN tunnel to the central gateway before being routed to the destination address.
Is it possible to ENFORCE remote access users to break out to the internet only through the VPN to their corporate LAN, and deny them internet access when they are not connected to the VPN? (except for allowing the minimum necessary internet access to establish the VPN).
Not sure why posted this onto this as surely a different question,
Whilst you can enable Hub Mode and enforce it so that when connected to the Remote Access VPN then forces you to go via the VPN, it won't block access to the Internet when not on the VPN.
Possibly with the Endpoint Suite and the Connected/Disconnected Policy then on the Disconnected Policy then could block access to the Internet and just access to the Gateway, and DNS, DHCP etc. Make sure that HotSpot is enabled so can authenticate as well to Wifi if neccessary.
That way when out of the Office forces the Client to hookup the VPN to get anywhere
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY