- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello guys,
what is the usage for field Location under user tab? Admin guide and HELP does not clear this.


Hi Martin,
I think it would be fair to say to think of this setting as defining "trusted clients" but instead of limiting access to a Server/Gateway you can limit access to other objects as well like networks etc.
I hope that helps.
Why I should use that, we have policy to limit users access. Does this apply for users VPN?
From sk92467:
The user has a host object defined in the source of allowed locations in its properties. the expected configuration requires that this user properties be defined using network objects, and not a specific host object.
Allowed Location required Office Mode, in the case of a VPN client, it require the office mode range as the source when Office Mode is defined on the gateway.
I suppose we can assume from this, that the location setting is set per user when you have more general rules for networks. For example we allow all remote users to access server network, but some users (based on name, not on IP) can connect to some specific server, other users can connect to only other servers.
Not sure where is the profit.
This is kind of a "legacy" setting from ages ago when we didn't have things like Access Roles or Mobile Access Blade ![]()
It is primarily to restrict the networks from which or to which a given user may connect using Remote Access VPN above and beyond those imposed by the rules.
I know this is an old post, but please correct me if my assumptions below are incorrect:
1) if there are no entries defined in this field for a user, the user can access any host or network that the Mobile Access policy or local gateway security policy allows
2) if there are ANY entries in this setting for a user, the user can access ONLY the listed hosts or networks and all other destinations are blocked, even if mobile access or local gateway security policies would allow it otherwise?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 15 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY