- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
This is possible using the Route All Traffic feature:
Harmony Mobile doesn't filter all Internet traffic, but it does block certain malicious traffic (phishing/bots).
And no, an MDM can't do that alone, but an MDM can be used to place restrictions on the device when it falls out of compliance and/or isn't secure according to Harmony Mobile.
Whether or not you "block" Internet when using Route All Traffic is a function of the specific access policy.
This is possible using the Route All Traffic feature:
@GW_W_Albrecht, thank you for your response. I have checked the guide, it just shows the way to route all traffic to the gateway. I also want to know if I configure route all traffic to the gateway, wouldn't this way increase the overhead on the gateway, when all traffic from the client will be passed through the gateway.
If the customer will agree to do that, after enabling the feature, we can restrict the traffic in policy right?
Please clarify on this. Thanks!
Of course the Route All Traffic feature will increase GW load ! As this feature only works while VPN is connected it also will only do TP for client traffic during that time. This was your customers request and he may have good reasons for it - i would prefer not to use the Route All Traffic feature, but also install the Harmony Mobile protect app on mobile devices. This gives safety anytime !
By that means, with harmony mobile, we can achieve the requirement to restrict users to access the internet when VPN is connected or it is just to prevent malicious traffic to route through the gateway.
Also, I want to know if we can suggest them to go with any 3rd party MDM or achieve that requirement.
Please confirm one more thing, if customer agrees to enable route all traffic through gateway feature, we can restrict particular user traffic by access policy but blocking destination as internet, right?
Harmony Mobile doesn't filter all Internet traffic, but it does block certain malicious traffic (phishing/bots).
And no, an MDM can't do that alone, but an MDM can be used to place restrictions on the device when it falls out of compliance and/or isn't secure according to Harmony Mobile.
Whether or not you "block" Internet when using Route All Traffic is a function of the specific access policy.
Thanks @G_W_Albrecht and @PhoneBoy I will try to do this in my lab and propose this option as route all traffic to the gateway to achieve their requirement.
No, as @PhoneBoy wrote, harmony mobile protects mobile devices all the time. Complete internet traffic by connected clients using the Route All Traffic feature can be restricted and undergo TP on GW. Or disabled completely, of course...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY