- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hey folks. Wondering if anyone has gotten this working yet, and are using it in a production environment? I've tried following the instructions laid out in this document; https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_RemoteAccessVPN_AdminGuide/Content... , but when I attempt to add the domain group to the VPN group, I get
I've got a call open with TAC, thought I'd post it here as well just in case anyone had any ideas while TAC gets around to looking at it. Running R81.20.
Can you send a screenshot of what it looks like at the moment?
Andy
I can easily test it in R81.20 and R82 to see if any difference.
Andy
What does your group look like? It did not give me any fuss in R81.20 JHF 89.
Yep, I tested the same, worked fine.
Andy
Strange indeed, here is mine
Just accept it and see if policy works.
Andy
Fails immediately.
The names of groups don't line up between your screenshot and the validation error, so I feel like I'm missing something.
Are you nesting the earlier "VPN" group under the "Encryption.Domain" referenced in the validation error?
See screenshots below.
Make sure group you are adding has name exclusions_
Andy
What EXACTLY are you configuring as your RemoteAccess encryption domain?
This should be a group object that includes the exclusions_ group you've created.
The Remote Access encryption domain is a group with exclusions;
This group looks as follows;
And the main group (non excluded) looks like this;
Just do how @CaseyB did it. I did it same way and it worked.
Andy
The problem is that's how we do traditional IP based split tunneling, which I don't want to break.
You can leave the gateway encryption domain as is.
This will only effect stuff using that RemoteAccess community.
You could just clone the group you are using already and just remove the objects you are doing the exclude on.
So what's the difference between these two settings? I always thought they did the same thing;
I am using my screenshot below for reference.
Based on your new screenshots, you should just be able to add your "exclusions_" group to the group "VPN_Exclusion_Domain".
Thats exactly how I tested it as well.
Andy
Just getting back to testing this again, and I was wondering if the object (domain or updatable) should be reflected in the routing table on the client once connected. For instance, if I added a domain entry for a simple website like www.recorder.ca (small town newspaper), and added it to the exclusions_ group, should that then be evident in the client route table (not there in order words)? Same with all objects associated with an Updatable object?
If its NOT full tunnel, it works 100%. I confirmed this with guy from Israel office and also tested with 2 customers, no issues. Yes, you would see it in route print.
Andy
When you say "If its NOT full tunnel", what does that mean?
Here is a good example:
FULL TUNNEL -> user connects from home and ALL their connections go through CP gateway, including Internet
SPLIT TUNNEL -> ONLY local connections go through the gateway, Internet goes through local users ISP provider
Makes sense? 🙂
Andy
We're not using hub mode, which I guess would count as full tunnel. Our encryption domain basically says all-internet though, which basically does the same thing. I don't see the entries showing up in the client routing table, so I guess it's not working as expected. I've got an open call with TAC, hopefully they can figure it out.
For what its worth, most people dont use full tunnel. I remember once when I attended Palo Alto conference, people were having discussion about it...the way I personally look at it is that hey, if users want to access questionable websites, let them do it at their own risk through their own ISP.
Some companies do have requirement to use full tunnel, but if not, I would stick with the split one.
Andy
Full Tunnel I assume refers to Hub Mode.
It's "allowed" in the gateway object here:
You can require your clients to use it here:
As far as I know Updatable, Dynamic, or Domain can ONLY be used in this exclusions_ group and ONLY when Hub Mode is used (as configured above).
The only item in your RemoteAccess Encryption Domain is this exclusions_ group and not other objects (i.e. the stuff you want the client to access directly without being routed through the VPN tunnel).
When you are not using Hub Mode, then you must manually specify what hosts are in your encryption domain using standard Network and Host objects (not Updatable, Dynamic, or Domain objects as you're trying to do).
Second screenshot looks scary, since it's something that might affect all gateways, not just the one I'm testing with. lol
Its a global setting lol
Andy
We're not using hub mode, so I guess that might be the issue?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY