Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
cdooer
Participant

Split Tunnel Domain group

Hey folks. Wondering if anyone has gotten this working yet, and are using it in a production environment?  I've tried following the instructions laid out in this document;  https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_RemoteAccessVPN_AdminGuide/Content... , but when I attempt to add the domain group to the VPN group, I get 

 

error.JPG

I've got a call open with TAC, thought I'd post it here as well just in case anyone had any ideas while TAC gets around to looking at it. Running R81.20. 

35 Replies
the_rock
Legend
Legend

Can you send a screenshot of what it looks like at the moment?

Andy

the_rock
Legend
Legend

I can easily test it in R81.20 and R82 to see if any difference.

Andy

CaseyB
Advisor

What does your group look like? It did not give me any fuss in R81.20 JHF 89.

GroupExample.png

the_rock
Legend
Legend

Yep, I tested the same, worked fine.

Andy

cdooer
Participant

Strange indeed, here is mine

error2.JPG

the_rock
Legend
Legend

Just accept it and see if policy works.

Andy

cdooer
Participant

Fails immediately. 

eror3.JPG

CaseyB
Advisor

The names of groups don't line up between your screenshot and the validation error, so I feel like I'm missing something.

Are you nesting the earlier "VPN" group under the "Encryption.Domain" referenced in the validation error? 

cdooer
Participant

See screenshots below.

the_rock
Legend
Legend

Make sure group you are adding has name exclusions_

Andy

PhoneBoy
Admin
Admin

What EXACTLY are you configuring as your RemoteAccess encryption domain?
This should be a group object that includes the exclusions_ group you've created.

cdooer
Participant

The Remote Access encryption domain is a group with exclusions;

ED.JPG

This group looks as follows;

group.JPG

And the main group (non excluded) looks like this;

group2.JPG

the_rock
Legend
Legend

Just do how @CaseyB  did it. I did it same way and it worked.

Andy

cdooer
Participant

The problem is that's how we do traditional IP based split tunneling, which I don't want to break. 

CaseyB
Advisor

You can leave the gateway encryption domain as is.

  • Make a new group that has all the IP addresses in it for RemoteAccess that you want
  • Add the exclusions_ group to that
  • Use the granular encryption domain for the RemoteAccess community

This will only effect stuff using that RemoteAccess community.

You could just clone the group you are using already and just remove the objects you are doing the exclude on.

VPN1.png

VPN2.png

cdooer
Participant

So what's the difference between these two settings? I always thought they did the same thing;

error3.JPG

error5.JPG

CaseyB
Advisor

I am using my screenshot below for reference.

  • Section 1 - This is the default VPN domain for the gateway. RemoteAccess VPNs and IPsec VPNs will use this by default. It is a shared pool.
  • Section 2 - This is where you can create a more specific VPN domain for that IPsec VPN or RemoteAccess VPN. I highlighted objects that say, "According to the gateway", that means those VPNs use the encryption domain from section 1. Everything else is using their own specific group with a much more defined encryption domain.

VPN_Domains.png

 

Based on your new screenshots, you should just be able to add your "exclusions_" group to the group "VPN_Exclusion_Domain".

the_rock
Legend
Legend

Thats exactly how I tested it as well.

Andy

cdooer
Participant

Just getting back to testing this again, and I was wondering if the object (domain or updatable) should be reflected in the routing table on the client once connected. For instance, if I added a domain entry for a simple website like www.recorder.ca (small town newspaper), and added it to the exclusions_ group, should that then be evident in the client route table (not there in order words)? Same with all objects associated with an Updatable object?

the_rock
Legend
Legend

If its NOT full tunnel, it works 100%. I confirmed this with guy from Israel office and also tested with 2 customers, no issues. Yes, you would see it in route print.

Andy

cdooer
Participant

When you say "If its NOT full tunnel", what does that mean?

the_rock
Legend
Legend

Here is a good example:

FULL TUNNEL -> user connects from home and ALL their connections go through CP gateway, including Internet

SPLIT TUNNEL -> ONLY local connections go through the gateway, Internet goes through local users ISP provider

Makes sense? 🙂

Andy

cdooer
Participant

We're not using hub mode, which I guess would count as full tunnel. Our encryption domain basically says all-internet though, which basically does the same thing. I don't see the entries showing up in the client routing table, so I guess it's not working as expected. I've got an open call with TAC, hopefully they can figure it out. 

the_rock
Legend
Legend

Thats right, hub mode is considered full tunnel. Btw, for what its worth, MAKE SURE if users ever have issue that what I attached is selected, so they can access things locally fine.

Andy

the_rock
Legend
Legend

For what its worth, most people dont use full tunnel. I remember once when I attended Palo Alto conference, people were having discussion about it...the way I personally look at it is that hey, if users want to access questionable websites, let them do it at their own risk through their own ISP. 

Some companies do have requirement to use full tunnel, but if not, I would stick with the split one.

Andy

PhoneBoy
Admin
Admin

Full Tunnel I assume refers to Hub Mode.
It's "allowed" in the gateway object here:

image.png

You can require your clients to use it here:

image.png

As far as I know Updatable, Dynamic, or Domain can ONLY be used in this exclusions_ group and ONLY when Hub Mode is used (as configured above).
The only item in your RemoteAccess Encryption Domain is this exclusions_ group and not other objects (i.e. the stuff you want the client to access directly without being routed through the VPN tunnel).

When you are not using Hub Mode, then you must manually specify what hosts are in your encryption domain using standard Network and Host objects (not UpdatableDynamic, or Domain objects as you're trying to do).

cdooer
Participant

Second screenshot looks scary, since it's something that might affect all gateways, not just the one I'm testing with. lol

the_rock
Legend
Legend

Its a global setting lol

Andy

cdooer
Participant

We're not using hub mode, so I guess that might be the issue?

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events