Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
cdooer
Participant

Split Tunnel Domain group

Hey folks. Wondering if anyone has gotten this working yet, and are using it in a production environment?  I've tried following the instructions laid out in this document;  https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_RemoteAccessVPN_AdminGuide/Content... , but when I attempt to add the domain group to the VPN group, I get 

 

error.JPG

I've got a call open with TAC, thought I'd post it here as well just in case anyone had any ideas while TAC gets around to looking at it. Running R81.20. 

0 Kudos
18 Replies
the_rock
Legend
Legend

Can you send a screenshot of what it looks like at the moment?

Andy

0 Kudos
the_rock
Legend
Legend

I can easily test it in R81.20 and R82 to see if any difference.

Andy

0 Kudos
CaseyB
Advisor

What does your group look like? It did not give me any fuss in R81.20 JHF 89.

GroupExample.png

the_rock
Legend
Legend

Yep, I tested the same, worked fine.

Andy

0 Kudos
cdooer
Participant

Strange indeed, here is mine

error2.JPG

0 Kudos
the_rock
Legend
Legend

Just accept it and see if policy works.

Andy

0 Kudos
cdooer
Participant

Fails immediately. 

eror3.JPG

0 Kudos
CaseyB
Advisor

The names of groups don't line up between your screenshot and the validation error, so I feel like I'm missing something.

Are you nesting the earlier "VPN" group under the "Encryption.Domain" referenced in the validation error? 

0 Kudos
cdooer
Participant

See screenshots below.

0 Kudos
the_rock
Legend
Legend

Make sure group you are adding has name exclusions_

Andy

0 Kudos
PhoneBoy
Admin
Admin

What EXACTLY are you configuring as your RemoteAccess encryption domain?
This should be a group object that includes the exclusions_ group you've created.

0 Kudos
cdooer
Participant

The Remote Access encryption domain is a group with exclusions;

ED.JPG

This group looks as follows;

group.JPG

And the main group (non excluded) looks like this;

group2.JPG

0 Kudos
the_rock
Legend
Legend

Just do how @CaseyB  did it. I did it same way and it worked.

Andy

0 Kudos
cdooer
Participant

The problem is that's how we do traditional IP based split tunneling, which I don't want to break. 

0 Kudos
CaseyB
Advisor

You can leave the gateway encryption domain as is.

  • Make a new group that has all the IP addresses in it for RemoteAccess that you want
  • Add the exclusions_ group to that
  • Use the granular encryption domain for the RemoteAccess community

This will only effect stuff using that RemoteAccess community.

You could just clone the group you are using already and just remove the objects you are doing the exclude on.

VPN1.png

VPN2.png

0 Kudos
cdooer
Participant

So what's the difference between these two settings? I always thought they did the same thing;

error3.JPG

error5.JPG

0 Kudos
CaseyB
Advisor

I am using my screenshot below for reference.

  • Section 1 - This is the default VPN domain for the gateway. RemoteAccess VPNs and IPsec VPNs will use this by default. It is a shared pool.
  • Section 2 - This is where you can create a more specific VPN domain for that IPsec VPN or RemoteAccess VPN. I highlighted objects that say, "According to the gateway", that means those VPNs use the encryption domain from section 1. Everything else is using their own specific group with a much more defined encryption domain.

VPN_Domains.png

 

Based on your new screenshots, you should just be able to add your "exclusions_" group to the group "VPN_Exclusion_Domain".

the_rock
Legend
Legend

Thats exactly how I tested it as well.

Andy

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events