- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
We have configured a rule that drops traffic from a specific user group in in RemoteAccess. However the user in the group can still connect to VPN even though the traffic should be dropped based on the policy.
Is there a way to prevent user from connecting to VPN without disabling the user itself?
Thanks
Can you tell what rule allows the access based on the logs?
Andy
Unfortunately, you would have to disable the user to prevent the user from being authenticated.
Interesting...I could have sworn it was possible before by blocking the access with the group or making sure that user was NOT part of below setting in RA community object in dashboard:
You’re correct, but I don’t believe the original poster will do that since a specific policy rule was spoken of.
Im pretty sure with screenshot I sent, IF that user is included, they CAN connect to the site, but if rule does not allow them access, then they wont be able to connect to anything internally. I did it that way with few customers and worked just fine.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY