- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
Is it possible to initiate a connection back to RA VPN user? Let's say for example that user is connected via RA VPN to internal network and has a problem with an application or printer or whatever. Helpdesk would like to help him by Remote Desktop connection back to his machine (laptop/desktop) via that existing RA VPN connection. That user's machine is using Office Mode address.
Is RA VPN only "one way"?
There is an option in global properties I believe under remote access for back connections, but I dont think that does what it implies. I cant recall now what the purpose of it is, but you can give it a go and install the policy. To answer your ?, yes, remote access VPN would only be one way.
Best,
Andy
Yes, this setting in Global Properties needs to be set.
There should also be an explicit rule in the Access Policy that permits the desired traffic.
Hello.
In "Remote Access VPN R81.10 Administration Guide" it is said something about "Remote Client to Client Communication"
Remote client to client connectivity is achieved in two ways:
By routing all the traffic through the Security Gateway
Including the Office Mode range of addresses in the VPN domain of the Security Gateway
There is also an example:
"Two remote users use VoIP software to hold a secure conversation. The traffic between them is directed through a central Hub"
There are also following topics:
"User Groups as the Destination in RA communities" and "Configuring Directional VPN with Remote Access Communities":
I don't want to communicate between 2 remote clients, but from internal (helpdesk) network via RDP over Remote Access VPN to remote client.
I have created directional rule, but I get an error
Hub Mode is enabled
Regards
Mirek
I dont think enabling routing vpn traffic through gateway would solve your issue, thats if you want clients to route all their Internet traffic through your firewall once they connect to VPN. Most companies do NOT want that.
I will send you screemshot later for back connections and error you see in the policy.
Best,
Andy
I really appreciate Your help.
Without active option "Enable VPN Directional Match in VPN Column" it would be impossible to create such directional rule as in my first attached screenshot. And error isn't gone.
I was about to ask what is this option "Enable Back Connections (from gateway to client)" for, and I've found it in "Remote Access VPN R81.10 Administration Guide" chapter "Resolving Connectivity Issues" and under "NAT and Back Connections from Security Gateway to Client"
So Directional VPN has nothing in common with Back Connections? So what rule should I add to allow back connections via RDP over RA VPN? Sorry, but I don't get it right now :-(.
No worries, you are welcome.
To answer your first question, correct, without that option, rule would not work.
As far as 2nd question, I still dont understand myself what this option actually does. 3 years ago, I had case with TAC with RA issue and T3 guy asked us to enable this setting for back connections and when I asked him to logically explain to me what it does, he could not and said would ask esc. buddy, but that sadly went nowhere as far as good explanation.
Below is what it says in the dashboard, but honestly, I cant "digest" it to understand it in layman's terms, if you will.
Back connections
Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine whether the back connection is enabled, and the frequency of the Keep Alive packets sent by the client in order to maintain the connection with the gateway.
Best,
Andy
This is what they gave me back in the day, this link and section below. I dont know, obviously Im not nearly as smart as lots of other people, cause enabling this back then never worked and we could never get it going no matter what we were asked to try : - )
Best,
Andy
Usually to communicate with hosts behind a Security Gateway, remote access VPN client must initialize a connection to the VPN Security Gateway. However, once a remote access VPN client has opened a connection, the hosts behind the VPN Security Gateway can open a return or back connection to the remote access VPN client. For a back connection to succeed, the remote access client's details must be maintained on all the devices between the remote access VPN client and the VPN Security Gateway, and on the VPN Security Gateway itself.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY