- CheckMates
- :
- Products
- :
- Quantum
- :
- Remote Access VPN
- :
- Re: Exclude Subnet
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Exclude Subnet
I don't want to configure split tunnel on the security gateway, I was wondering how I can exclude my subnet from full tunnel setup, is there any options?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As @PhoneBoy says, you can use 'exclude_local_networks_in_hub_mode' attribute in the trac_client_1.ttm to exclude a user's local network when they're connected to Remote Access VPN and using hub mode...
OR
You can go for a more manual and customisable approach where you manually exclude any host/network required, rather than just being limited to the excluding a user's local network.
If you'd like configure the Remote Access routing to essentially route all traffic to the gateway, EXCEPT a certain list of hosts/subnets, then you need to do the following:
- Ensure "Route all traffic to gateway" is set to NO in Global Properties > Remote Access > SecureClient Mobile & Endpoint Connect.
- Ensure Hub Mode is set to ALLOW on the gateway object under VPN Clients > Remote Access.
- Create a new network group named 'All_Internet_Group', and add the default 'All_Internet' object to it.
- Create a new network group named 'ED-RemoteAccess_Exclusions'. Add all of the hosts/networks you'd like to be excluded from hub mode (I.E, routed locally on the client's end rather than across the VPN to the gateway).
- Create a new "group with exclusions" called 'ED-RemoteAccess', reference the 'All_Internet_Group' we created as the main group and the 'ED-RemoteAccess_Exclusions' we created as the exclusion group.
- Set the 'ED-RemoteAccess' group as the Remote Access encryption domain on the gateway topology.
- Ensure security rules and NAT rules are setup to support this configuration (I.E, security rules allow the OfficeMode subnet access to the Internet, and the OfficeMode subnet is NAT'd behind the gateway).
- Install policy, then disconnect/reconnect any existing connected clients so that they get the new routing table.
To put this into a scenario, lets say you want all traffic to be routed to the gateway (like it is in hub mode), apart from 167.20.10.0/24 (some random network I thought of, insert yours here) - you want the clients to route this out of their local connection rather than via the security gateway. Following the scenario above and adding the 167.20.10.0/24 network to the 'ED-RemoteAccess_Exclusions' group will achieve this.
Hope that helps!
Luke
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Let's put this in the Remote Access section where it belongs.
Looks like you can achieve what you're after by following this SK: Cannot exclude local network when connected to Remote Access VPN via Hub Mode
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Dameon, I followed your SK but it didnt help.
When ever I try to access a local resource (local VM on my PC), the traffic is still being sent through to SG.
I am trying to find a solution where i can have split tunnel enabled for my VPN (exclude local subnet going through SG which is enabled for hub mode)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Perhaps there is an error in the SK or there is a different issue.
Have you opened a TAC case?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have not as I dont have support contract with CP.
I there any solution where i can have split tunnel enabled for certain users on Checkpoint and other users will have to go through SG which is configured for Hub Mode?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As far as I know this is a global setting.
That means either all users can do it or none can.
Did you modify trac_client_1.ttm as described in the SK?
Your partner (or whoever you have a support contract they) should be able to open a ticket with us as needed.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Dameon
Is there any other option other than sk121766, to exclude local subnet from going through security gateways which is configured for HUB mode.
I want to have split tunnel enabled for only specific users and other users I they will have to go through SG which is configured for Hub Mode?
Is it possible to configure split tunnel for some and full tunnel for other users ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As far as I know the settings apply to all users connecting to a given gateway but will double-check.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Looks like you can configure the TTM file per group.
In fact, the exact scenario you want is described in the following SK: Remote Access clients configuration based on group membership
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Jessica,
Did you got the solution for remote access vpn tunnel requirement?.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As @PhoneBoy says, you can use 'exclude_local_networks_in_hub_mode' attribute in the trac_client_1.ttm to exclude a user's local network when they're connected to Remote Access VPN and using hub mode...
OR
You can go for a more manual and customisable approach where you manually exclude any host/network required, rather than just being limited to the excluding a user's local network.
If you'd like configure the Remote Access routing to essentially route all traffic to the gateway, EXCEPT a certain list of hosts/subnets, then you need to do the following:
- Ensure "Route all traffic to gateway" is set to NO in Global Properties > Remote Access > SecureClient Mobile & Endpoint Connect.
- Ensure Hub Mode is set to ALLOW on the gateway object under VPN Clients > Remote Access.
- Create a new network group named 'All_Internet_Group', and add the default 'All_Internet' object to it.
- Create a new network group named 'ED-RemoteAccess_Exclusions'. Add all of the hosts/networks you'd like to be excluded from hub mode (I.E, routed locally on the client's end rather than across the VPN to the gateway).
- Create a new "group with exclusions" called 'ED-RemoteAccess', reference the 'All_Internet_Group' we created as the main group and the 'ED-RemoteAccess_Exclusions' we created as the exclusion group.
- Set the 'ED-RemoteAccess' group as the Remote Access encryption domain on the gateway topology.
- Ensure security rules and NAT rules are setup to support this configuration (I.E, security rules allow the OfficeMode subnet access to the Internet, and the OfficeMode subnet is NAT'd behind the gateway).
- Install policy, then disconnect/reconnect any existing connected clients so that they get the new routing table.
To put this into a scenario, lets say you want all traffic to be routed to the gateway (like it is in hub mode), apart from 167.20.10.0/24 (some random network I thought of, insert yours here) - you want the clients to route this out of their local connection rather than via the security gateway. Following the scenario above and adding the 167.20.10.0/24 network to the 'ED-RemoteAccess_Exclusions' group will achieve this.
Hope that helps!
Luke
