- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hey guys,
Just wondering about this and wanted to clarify something. Customer was asking about option on the gateway, vpn clients -> authentication -> allow older clients to connect to this gateway.
Now, when we check it, it shows its referring to actual legacy VPN (standalone clients) and NOT harmony endpoint. Their only auth option currently is user+password.
Is there any confirmation anywhere what is LOWEST vpn client version that could connect if say this option was indeed enabled?
Also, is there any way to disable any legacy vpn client from actually connecting and ONLY allow harmony endpoint?
Thanks!
Andy
The version element is outlined in the SK I commented above, context is these settings / options
There are different options available for this requirement:
1. VPN Clients option - Allows restricting some client types
2. Using SCV / Compliance Policies in particular the method enforceable via HEP.
(Note here their is a reliance on the Desktop Firewall / Desktop Policy allowing necessary comms to allow clients checks to occur per sk164861)
3. sk108892 - How to verify the integrity of Endpoint Remote Access VPN clients (Appendix 5)
4. Machine Cert Auth for further enhanced security.
@the_rock maybe you can try with restrictions via the access-role....
For what its worth, this is an explanation from smart console about it.
Andy
If I remember correctly the setting is relevant to the client versions specified in sk111583.
With R82 forcing IKEv2 for remote access would have a similar effect for older client versions earlier than E88.40 aswell.
Similarity not all client types support SAML, so even without specific options you could achieve an outcome through these choices perhaps.
See also: Gateway Properties > Mobile Access > Allowed Clients
Hey Chris,
Thanks for the response. I think customer is simply wondering what is the LOWEST client version that could connect say if that option was enabled and 2nd, is there any way to prevent anyone who is NOT using harmony endpoint client to conect to the gateway?
Andy
The version element is outlined in the SK I commented above, context is these settings / options
K thank you, I think that answers my 1st question. Now, for the 2nd one, any way to prevent anyone NOT using harmony endpoint client to connect?
Andy
There are different options available for this requirement:
1. VPN Clients option - Allows restricting some client types
2. Using SCV / Compliance Policies in particular the method enforceable via HEP.
(Note here their is a reliance on the Desktop Firewall / Desktop Policy allowing necessary comms to allow clients checks to occur per sk164861)
3. sk108892 - How to verify the integrity of Endpoint Remote Access VPN clients (Appendix 5)
4. Machine Cert Auth for further enhanced security.
Thanks Chris. So I know for option 1, I was thinking if that may actually work. Would that technically prevent anyone using legacy endpoint vpn from connecting and still allow people using harmony endpoint to connect?
Best,
Andy
@the_rock maybe you can try with restrictions via the access-role....
Thanks @Wolfgang ! I just want to be sure that option you gave and option 1 @Chris_Atkinson provided would ineed stop ONLY legacu endpoint vpn from connecting and allow harmony endpoint. Let me see if my colleague I had been working with on this and I can test this in the lab to confirm.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
3 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |
Thu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAMon 22 Sep 2025 @ 02:00 PM (EDT)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security AMERThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY