- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello everyone, how are you?
We are trying to restrict access to the VPN to only a few countries. We have done a procedure to remove the Accept from the Implied Rule for port 80/443 (sk105740), allowing access only to a specific country, as follows:
After that, a kernel parameter is required (fw ctl set int fw_ignore_before_drop_rules 1). The change is working, port 443 is used to create the connection on the Endpoint, if it is blocked in a country, the connection is not successful, great.
However, we came across an employee who uses a commercial VPN (ProtonVPN; UrbanVPN etc.) to go out with an IP from an allowed country, and so she connects to the Check Point VPN, and then she disconnects from the commercial VPN and Check Point maintains the connection via NAT-T (IPSec) and shows information in the logs of "IP Changed". We did this test in the lab:
My question is, do you know of any way to block reconnection when an IP is changed? For example, make Check Point FW not maintain the connection as soon as the client's IP is changed.
I'm trying to understand the flow here, so please confirm:
I can see how that would be problematic.
I would engage with TAC on this.
Meanwhile, as a workaround, you might try using: https://community.checkpoint.com/t5/Security-Gateways/Block-VPN-Traffic-by-Country/m-p/172695#M31396
I really think there should be an option within SmartConsole (for example in Global Properties) to control this behavior, if there is no way to control it. I opened a ticket with TAC about it.
Hey bro,
Long time no talk, how are you?
I thought about this and to me, logically, sounds like the only reasonable way to do it would be to block whatever app that perosn is using, because once they connect and get an IP that belongs to country thats allowed, not sure how would fw be able to block it, if that country is allowed by the rule.
Andy
Hey bro, how long, are you okay?
The Firewall even identifies this IP exchange, the issue is that it allows it, by some parameter that I don't know (maybe something in trac_client_1.ttm or in Control Connections Remote Access).
We also thought about this alternative that you suggested, a SCV (Secure Configuration Validation), which identifies VPN programs, the problem is that there are several VPNs of this kind, there are many software available to verify...)
See if the post I made about it last year helps?
Andy
https://community.checkpoint.com/t5/Remote-Access-VPN/Geo-VPN-blocking/m-p/214040#M10593
I'm trying to understand the flow here, so please confirm:
I can see how that would be problematic.
I would engage with TAC on this.
Meanwhile, as a workaround, you might try using: https://community.checkpoint.com/t5/Security-Gateways/Block-VPN-Traffic-by-Country/m-p/172695#M31396
Exactly! The VPN user connects to a commercial VPN to exit with an allowed IP in the 80/443 rules, then she connects to Check Point VPN; a tunnel in Visitor Mode (443) is created. The VPN user then disconnects from the commercial VPN, as there is a blocking rule on port 443, Check Point passes the connection to NAT-T and maintains the connection, with a "Reconnect" and an "IP Changed" information in the Logs & Monitor.
Thank you very much for sharing this information, indeed with fwaccel dos rate it can be a viable solution, I will test it right now, I hope it blocks the NAT-T port also for the countries I specify.
Rules with country code are no longer supported... I tried to create a rule with Bypass for US and BR (Brazil), traffic is still blocked, the rule is no longer effective when it is made by country code. I can't see any other alternatives...
I believe buddy that using updatable objects is the way to go...
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 18 | |
| 13 | |
| 8 | |
| 6 | |
| 6 | |
| 6 | |
| 5 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY