- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Everyone,
Can someone help how to do split tunnel. I want to force the traffic of the VPN user to use their local internet provider when connected to the VPN tunnel so it will not consume the bandwidth of the company.
Thanks
Hello Juan,
The configuration is done in Global Properties. It is enabled by default. Configure the option "Route all traffic to gateway" to "No".
You can also set it to "Configured on endpoint client", so the user can route everything through gateway to be safer when needed.
Split tunneling is enabled by default. you don't have to do anything.
Yeah Correct. Split tunneling is enabled by default for remote VPN users. You need to enable setting if you don't want split tunneling but by default it is enabled.
Hello Juan,
The configuration is done in Global Properties. It is enabled by default. Configure the option "Route all traffic to gateway" to "No".
You can also set it to "Configured on endpoint client", so the user can route everything through gateway to be safer when needed.
Hi Sanjay_S,
What's your final goal: to forward traffic to encryption domain or to exclude some traffic from encryption domain?
Are you working in hub mode when all traffic is routed to gateway or in regular mode (split tunnel) when non-encryption domain traffic is not routed to gateway?
Hi @Sanjay_S ,
You may manually define VPN domain. Open Smart Console, open properties for specific gateway, go to Network Management –> VPN Domain. There you can select "Manual defined" and specify VPN domain using predefined network objects.
Hope that helps.
if im using splittunnel setup and i would like to have the same rules, that is: a user should not have access to socialmedia when he is at the office and also when he is using splittunnel vpn. what do you suggest in this case?
I also want to do this. I do not want to enable hub mode, but want to add additional subnet range of a 3rd party website.
I added the external range to my VPN Domain, but still no luck.
I don't even see any blocked packets in the Logs (either before or after the change).
Please help.
Hi AndreiR,
You just need to add the new subnet in the VPN Domain.
Thanks! That's worked!! I changed the wrong object at first.
So at the moment I am routing all traffic to the gateway for my vpn set up. I want to only allow office 365 to break out locally on the endpoint. Do I have to turn off hub mode and select "No" to route all traffic to the gateway and just rely on the vpn domain to route traffic into my gateway. hope that makes sense....
Have you reviewed sk167000 for your use case?
Nice one thanks very much for that Chris. 👍
Hi Chris, I used this SK tonight on our environment but it totally broke traffic going over the remote access vpn for some reason.
The IP Addresses for office 365 did route out the broadband which was all good. But all traffic back to the firewalls did not work.
Do you try using ANY and or ALL INTERNET when configuring your group with exclusions?
Other than trying these alternatives I would suggest diagnosing further with the TAC.
Yeah I tried to use "ANY" and I created a "ALL INTERNET" 0.0.0.0/0 to test but i only got some internal subnets working which is really weird. Do you know of any file on the manager that sends out the encryption domain to the client? that contains the subnets to encrypt?
thanks
Alan
What Endpoint client version is used here?
To further expedite this I would recommend contacting TAC as above.
Onto TAC now for the last 3 months, with no sign of fixing the issue that I have. has anyone else had this sort of issue before? Was there any way around this?
Are you using E87.x or some other client version currently - also how about the Gateway versions involved?
Please share the SR with me via DM and I'll take a look at it's status.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
1 | |
1 | |
1 | |
1 | |
1 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY