I'd like to use Check Point SASE as a secondary path to connect to my work PC via RDP.
So I set up my SASE ACLs as shown:
My perimeter ACLs are configured like this:
Both, VPN remote access and SASE work fine for RDP connections to my PC.
As you can see VPN remote access uses an access role 'Danny' in the 'Source' column.
For SASE RDP I had to select the network object that represents my SASE backbone.
I'd like to restrict RDP access to my identity even on my perimeter gateway and not allow the entire SASE backbone to open RDP connection to my PC.
Any recommendations?
It seems there is no identity sharing available yet with Check Point gateways to let my perimeter know that it's me.
Maybe within the SASE portal devices can be given a fixed IP address within the SASE backbone network as a workaround?