- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hello,
We have a request from our customer to implement split tunnel solution for certain user/users. Currently they have full tunnel remote access VPN.
I've found sk167000 (https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...) tested it also in lab environment and it works great. But it's only applicable for a VPN community.
Is it possible to implement split tunneling somehow for a user group?
Thanks in advance!
Zsolt
in the global properties you set the "route all traffic to gateway" to "configured on endpoint client" for oth the secureclient mobile and endpoint connect options
on the gateway object you tick the box for "allow vpn clients to route traffic through this gateway" and you configure the remote access encryption domain for the split vpn users
if the end user connects once to the gateway, the setting to route all traffic to gateway will no longer be greyed out and the user can freely choose between full tunnel or split tunnel
you could create a new vpn package one for full tunnel users and one for split tunnel users and install accordingly, that way you don't have to teach them about the setting
download the tool from sk122574
i believe you need the setting "neo_route_all_traffic_through_gateway"
I believe below is what you are looking for:
Andy
I believe this option just defines which with authentication method can user authenticate on the VPN client.
Split tunneling is a global setting, unfortunately, so it applies to everyone.
That's what I thought. Thanks, PhoneBoy!
route all traffic to gateway (yes/no/decide on endpoint)
make the default in the trac.default file to route all traffic to gateway, but tell specific users to manually untick the checkbox in their client?
Sounds good. May I ask for an SK or example from where I can learn and test it?
in the global properties you set the "route all traffic to gateway" to "configured on endpoint client" for oth the secureclient mobile and endpoint connect options
on the gateway object you tick the box for "allow vpn clients to route traffic through this gateway" and you configure the remote access encryption domain for the split vpn users
if the end user connects once to the gateway, the setting to route all traffic to gateway will no longer be greyed out and the user can freely choose between full tunnel or split tunnel
you could create a new vpn package one for full tunnel users and one for split tunnel users and install accordingly, that way you don't have to teach them about the setting
download the tool from sk122574
i believe you need the setting "neo_route_all_traffic_through_gateway"
Thanks Jan!
Meanwhile I've found sk114882. Based on that and your help it works for me in lab environment.
In addition to your settings I've modified the ttm files:
In the test group file:
:neo_route_all_traffic_through_gateway (
:gateway (endpoint_vpn_route_all_traffic_through_gateway
:default (client_decide)
)
In the trac_client_1 file:
:neo_route_all_traffic_through_gateway (
:gateway (endpoint_vpn_route_all_traffic_through_gateway
:valid (false)
:default (true)
)
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY