- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
We are trying to configure Remote Access VPN on a Centrally Managed (Smart-1 Cloud) Spark 1600, when routing all traffic through the security gateway, remote access clients can ping and access Internal Networks but has no Internet access which is need to access our cloud resources.
We have followed this sk but are still not successful https://support.checkpoint.com/results/sk/sk101239.
Any ideas on what we could check?
Did you configure this also in rule base ?
As written in https://sc1.checkpoint.com/documents/R80.10_andhigher/WebAdminGuides/EN/CP_RemoteAccessVPN_AdminGuid...
Create the access control rule in the Access Control Policy.
VPN routing traffic is handled in the Security Policy Rule Base as a single connection, matched to one rule only.
Which part of the documentation you sent are you referring to?
See the included link !
Yup, we've already enabled hub mode for the clients.
Whenever I enable VPN tunneling (Routing traffic through the gateway) on the client even my own internet connection becomes "No Internet Access".
No, i am talking about the rule base - RA clients are restricted by the rule base that tells which networks they can access.
Ah yes, we have also configured a rule for remote access clients.
It's destination is currently set to ANY for testing purposes.
Do you see anything in the logs when the Remote Access client connects and attempts to communicate?
Why would you use hub mode at all ? Seems you usually have your private internet connection, so using endpoint security would be safe in all situations; with hub mode, you have the TP GW only when connected thru RA VPN.
Our remote access clients needs to access our cloud resources using the Public IP address of our GW because that IP address is the one authorized to access them. That's why we need to route all traffic of the remote clients thru our GW.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY