- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
AI Security Masters E4:
Introducing Cyata - Securing the Agenic AI Era
AI Security Masters E3:
AI-Generated Malware
CheckMates Go:
CheckMates Fest
Hey guys,
I dont ever recall having to this by default, but is there any manual config you would have to do as far as routing through the VPN tunnel once community is configured on CP? I believe all this is inherited based on the community settings and there is no need to add any routes manually via web GUI, but I could be wrong.
tx
No, not usually.
Traffic should route over the VPN without you manually adding routes.
Sounds like the remote end isnt presenting all of its subnets if traffic isnt routing correctly.
No, not usually.
Traffic should route over the VPN without you manually adding routes.
Sounds like the remote end isnt presenting all of its subnets if traffic isnt routing correctly.
Thats what I thought...I know sometimes they may need to be added manually for RA stuff, but otherwise, no. Thanks for confirming!
Hi,
I assume this is a policy based VPN, in that case it should match the encryption domain. Are you getting any encrypt logs from smart console?
You can also run 'vpn tu tlist' on the gateway to check the SAs and TSs
Yes, correct, its policy based.
Andy
So there is no need for routes to be defined as long as the encryption domain is correct.
Kurt
Thats what I thought.
Are you having issues?
Not at the moment...it was something on remote side. Thanks everyone for your input, really appreciate it.
Andy
There is a vpn_route.conf file.
Believe it applies only when using SmartLSM but it could apply in other situations also.
See: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...,
I believe (if I am not mistaken) years ago at a customers environment we often used vpn_route.conf without SmartLSM.
We had a VPN to their hub cluster and at used vpn_route.conf to route between their spoke gateways and our gateway.
Worked fine.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 51 | |
| 36 | |
| 13 | |
| 13 | |
| 12 | |
| 11 | |
| 10 | |
| 8 | |
| 7 | |
| 7 |
Mon 23 Feb 2026 @ 11:00 AM (EST)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - AMERTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANMon 23 Feb 2026 @ 11:00 AM (EST)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - AMERTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANThu 26 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 4: Introducing Cyata, Securing the Agentic AI EraFri 06 Mar 2026 @ 08:00 AM (COT)
Check Point R82 Hands‑On Bootcamp – Comunidad DOJO PanamáAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY