- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters
E1: How AI is Reshaping Our World
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We just implemented Checkpoint VPN. We have several vendors that have access to specific systems. When they use CP VPN, is there a way to limit their access to specific IP addresses based on their user group?
Do you use site-to-site or client-to-site VPN?
If client-to-site, do you use local users or AD/LDAP?
We have client to site via CP Mobile and have LDAP groups setup currently for the main office users who need to connect remotely.
Thanks for the response. I'm going to spell this out a bit as I don't see any step by steps for the new folks to checkpoint. If you have a specific vendor that VPNs into your network and has to connect to a specific IP or host on your network, this is what you do...or the way I did it.
1. To keep my AD clean, I created a single OU for vendors in AD. Then later referenced that single OU and the applicable vendor IDs in my CP object creation in the following steps.
2. Create the Vendor account in the OU that you created in step 1
3. Create the objects for the vendor, the network or hosts that the vendor needs to connect to in Checkpoint. **When creating the object for the vendor in CP, you will need the full Distinguished name.**
4. Our VPN subnet for CP is housed in the firewalls, so I added the vendor account to the group authorized to access the VPN subnet.
5. Created a rule that allowed our vendor, which has was added to the VPN subnet, as the source.
6. I added the IP address / host name that the vendor was trying to access as the destination. When adding the Host name of the destination, I had to add the primary/secondary DC (dns) to the destination or it would not allow access by host name.
7. Specify any specific protocols required for the connection,
8. Set CP to accept and log.
9. Install & Publish
10. Test
I am in the same boat. I was just fixing to post this question. I have about 40 different vendors that have access to different proprietary systems. From what I found, you have to setup a rule for each different vendor with the information you provided above. I was hoping their would be an easier way to do it. Is there any issue with have a ton of rules? How much does that affect the processing of data?
This sort of configuration is required to ensure only the relevant vendor(s) can access the relevant systems.
While the number of rules may have been an issue in R77.x and earlier releases, it s less relevant in R8x due to how the rulebase matching works (column-based).
The fact you can put all "vendor" rules in their own inline layer also helps substantially in terms of the processing and manageability of these rules.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsThu 08 Jan 2026 @ 05:00 PM (CET)
AI Security Masters Session 1: How AI is Reshaping Our WorldAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY