YES MATE!
Here you have it:
You have to modify these two lines in the trac_client_1.ttm file
FROM this:
-----------------------------------------------------------
:ips_of_gws_in_mep (
:gateway (
:default (client_decide)
)
)
:automatic_mep_topology (
:gateway (
:map (
:false (false)
:true (true)
:client_decide (client_decide)
)
:default (true)
)
)
-----------------------------------------------------------
TO this:
-- before modifying the file save a copy of the original one #cp trac_client_1.ttm trac_client1.ttm_ORIGINAL
-- to find the file and correct path especially on VSX use find / -name trac_client_1.ttm
-- to modify the file then use vi trac_client_1.ttm
1. In the ips_of_gws_in_mep instead of (client decide) just put the public IP of the external interface for that specific gateway where the users are going to connect. Here below as example 8.8.8.8 *note use that specific syntax don't forget &#
To disable the mep properly you must do this on each cp gateway that is part of the vpn remote access community.
2. In the automatic_mep_topology instead of (client decide) put (false) AND instead of default (true) put default (false).
3. Install the policy to apply the changes!
4.When you upgrade (both upgrade/clean install) your system this configuration will be erased. So be careful and save the modified file!
-----------------------------------------------------------
:ips_of_gws_in_mep
:gateway (
:default (8.8.8.8&#)
)
)
:automatic_mep_topology (
:gateway (
:map (
:false (false)
:true (true)
:client_decide (false)
)
:default (false)
)
)
-----------------------------------------------------------
Here below you can find also sk relevant to the trac client file.
Remote Access TTM Configuration (checkpoint.com)
I hope at some point Check Point VPN R&D team will review the way we interact with such an important piece of configuration, especially during the pandemic this is a very painful way to configure vpn client setting!
Hope this helps. 😉