- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Checkmates,
I have created tasks that Remote access VPN client users login to the checkpoint VPN client.
VPN users can login to the VPN client and can get the IP pool with DNS.
After login successfully into the VPN client, the can't access the internal servers. Please any help.
1. I have created rule that matches
Source : Access role (Local users, network vpn Pool IP address),
Destination: Local LAN network, servers
RemoteAccess VPN community enabled.
2. OSPF is enabled between CP firewall and internal LAN switch
3. Static routing to external
Hey @AkosBakos
I did remote with @yeruel and after checking all the basic settings first (such as IA blade remote access option, OM mode, access role, tested with subnet instead), we checked topology for eth2, which was interface involved and realized that 10.1.0.0/16 subnet was missing, so once we created new group and added 172.20.10.0/24, 172.20.27.0/24 and 10.1.0.0/16 into it, assigned to eth2, pushed policy, all worked fine, no issues, we could ping without even having to reconnect the client.
All these small things, hehe 🙂
Andy
1. Any drops logs for the traffic flow and what do you see with tcpdump / debugs?
2. What gateway version/JHF and which VPN client version/build?
3. Is it DNS related or does even basic connectivity by IP not work?
The rule name VPN rule
Source: access role (name is VPN-remote-access) which contains network pool for VPN client 192.168.253.0/24, and users - local users)
Destination: Local network and servers
VPN: RemoteAccess
Service : any/ allow
There is ospf routing to the internal network, that's full established.
The issue is after successful login to the VPN client, users can't access internal network.
Do you think my rule match is correct? The source: is that possible to use access role?
Note: the source policy is Unified
Please note E88.x is the current client version, E81.20 is end-of-life
Regarding the access role, do you have identity awareness enabled with the remote access identity source selected?
I will change the VPN client version. and regarding the Identity awarness, yes it has been enabled, and also AD users are login to the Client-less SSLVPN portal for web application access. Every AD users are loggining and accessing the web application servers. The issues is for the client vpn users after login to access internal server. For Clientless, users are accessing the web servers.
I had that sort of situation happen before with customers and here is BEST way (at least best I found) to make sure if its identity awareness /access role issue. All you do is replace access role as src with say network group, install policy and test. If that works, then you know 100% what is the issue.
Hope that helps.
Andy
Hi @the_rock
There is new thing, VPN client users with local users after successful connected to VPN, users can access some servers (172.20.10.10, 172.24.2.3 and subnet of 172.24.x.x and 172.20.X.X), but for others 172.17.0.0 and 10.1.0.x network can't access. The policy for VPN rule is the same single rule.
Source: access role, destination: 172.24.x.x, 172.17.x.x, 172.20.x.x and 10.1.0.x), VPN: remote access, service any any.
Why 172.17.x.x, 10.1.0x are not accessible? Can you provide best solution?
We would need to see why it fails...as @Chris_Atkinson asked in the beginning, any relevant logs indicating the reason?
Andy
Hey @yeruel
Just thought of something else you can do as a test. Change topology as below and see if that works after pushing the policy.
Andy
Network defined by routes - The gateway dynamically calculates the topology behind this interface. If the network changes, there is no need to click "Get Interfaces" and install a policy.
Can you send screenshots of the drop and the rule which should handle the traffic?
A screenshot would be great, where we can see a successful login in Identity Awareness.
And what is the IP that is received the client from the gateway when the VPN client connects?
Akos
Hi @AkosBakos
Attached screenshoot,
1. VPN client users from internet can login using the local users name and connected to the site
2. VPN Pool IP recevied from vpn pool ip 192.168.254.0,
3. Try to access the internal servers from application servers area. Application servers area network is accessiable
4. Server storage and server farm network are not accissiable from vpn client.
5. From Server storage and server farm (10.1.0.0 and 172.17.0.0 to the outside internet 8.8.8.8 is working fine)
Hi,
In Access rule 1, the Remote Access community intentionally not set in the VPN column?
And the most trivial question, but I want to ask: in the VPN-POOL object the subnet mask is configured corretly (or the network)?
Akos
attached to address your question.
I just tried to add vpn remoteaccess to rule 1, no result.
Can you do route print from cmd on client PC (one of them) that does not work and compare it with same command on one that does work?
Andy
Wait, this is not a simple drop:
"Encryption Failure: according to the policy the packet should not have been decrypted"
Someting is not overlapping?
https://support.checkpoint.com/results/sk/sk64060
Akos
I was just about to give that sk as well. To me, that more seems related to S2S vpn.
Andy
Any one who can assist via virtual meeting, please
Yea, lets do zoom, message me directly.
Andy
Please update me with the findigs 🙂
Hey @AkosBakos
I did remote with @yeruel and after checking all the basic settings first (such as IA blade remote access option, OM mode, access role, tested with subnet instead), we checked topology for eth2, which was interface involved and realized that 10.1.0.0/16 subnet was missing, so once we created new group and added 172.20.10.0/24, 172.20.27.0/24 and 10.1.0.0/16 into it, assigned to eth2, pushed policy, all worked fine, no issues, we could ping without even having to reconnect the client.
All these small things, hehe 🙂
Andy
you mean that, one network was missing from the AntiSpoofing group (Topology)
Yup!
WOW! You are very nice! everything is fine now!
You deserved 5 stars!
I think that's for site to site VPN, I am not going to do S2S VPN. My scope is Remote access from the internet using vpn client.
Yes, I know, but something can overlap with the Remote Access IP range
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
1 | |
1 | |
1 | |
1 | |
1 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY