- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
I can't find where I saw it one time and may be thinking of a different file but is there a way to push different trac_client_1.ttm configs depending on the VPN group they're in? Use case is we're checking out dynamic split vpn tunneling and I'm thinking about pushing different trac_client_1.ttm files to turn on/off the split tunnel flag depending on their group.
Maybe it was a different file related to VPN but I thought it was something like adding a _GROUPNAME after the file and it would load depending on their group. Am I thinking of a different file and is there any documentation on this? So far can't find what I'm thinking of.
This is the split tunnel doc we're following: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/C...
Hi VikingsFan,
You might want to look at the sk114882. The setting that you are looking for is "neo_route_all_traffic_through_gateway" in the ttm file.
Morning,
I ran across that article also and yes is exactly what I was looking for, thanks! My plan is to have like a ttm_vendor group which will have our regular full-vpn settings and then the trac_client_1.ttm will have the "split_tunnel" configuration and set to "true".
The only thing I'm not clear on is if we can use our existing vpn groups. Say I have a VPN-VENDOR AD group, can it be part of the TTM_VENDOR group and get applied correctly or membership must be direct? Will test it but in case someone knows off hand.
Thanks!
Yes, you can. Just make sure the group name starts with "ttm_", in your case, ttm_VENDOR. I haven't tried configuring the ttm with capital letters, though, but you may try and see if it still works.
In my opinion, since you already have an existing VPN-VENDOR group, why don't you rename it with the new name instead of creating a new group? It will be much easier since you do not need to add any new policy for that new group.
There are processes and other things tied to the existing AD group names. Not being super familiar with it but what about the screenshot below? Can I have the Check Point LDAP group named properly but it points to my actual AD group name? So I can keep my existing naming convention in AD but it will match for the TTM name?
It does appear that creating the ttm_vendor group and pointing it to a different AD group name will work. I'm having issues having the settings stay consistent though... for example, I switched the vendor.ttm file back to split_tunnel = false and in the client logs it keeps saying the gateway is configured to true. Is there a trick for getting the gateway to reread the file or consistently have the changes reflect?
As far as I know, TTM settings won't update on the client until the client disconnects and reconnects to the server.
Thanks PhoneBoy. I've done it multiple times with no change on the client side. Reading the 'trac.log' file for changes but also running 'netstat -rn' shows the split tunneling even though I have it set to false (in both TTM files right now). Even tried shutting the client down completely and reconnecting with no change. I'm updating to R81.20 JHF 105 right now for fun and see if that changes anything.
Guessing a ticket might be in order if this is not expected behaviour.
If you make any changes to a TTM file, you must install the Access Policy for it to take effect.
This is documented here: https://support.checkpoint.com/results/sk/sk75221
Yep, I've installed policy multiple times with no change. I even check the 'do not use install policy acceleration for all targets.' I'll keep checking.
That may only apply for the "main" TTM file (not the group-specific ones).
One other thing to try: after making the changes, try checking the file with vpn check_ttm.
Otherwise, you're probably in TAC case territory.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY