Dynamic Split Tunneling for SaaS Using Updatable Objects
To control the load on a VPN Gateway, Check Point supports Domain based Dynamic Split Tunneling for Remote Access VPN An encrypted tunnel between remote access clients (such as Endpoint Security VPN) and a Security Gateway. in two modes:
-
Exclusion Mode: Specified domains bypass the VPN tunnel.
Supported on R82 GA.
-
Inclusion Mode: Only specified domains are routed through the VPN tunnel.
Supported starting R82 Jumbo Hotfix Accumulator Take 36.
|
Note - You can configure either |
Chain of Events:
-
Administrator configures which services to exclude or include in the Remote Access VPN Tunnel.
-
The VPN Gateway dynamically fetches the IP addresses of configured services from the Internet, and sends this information to Remote Access VPN clients.
-
Remote Access VPN clients exclude or include the traffic for these services from / to the Remote Access VPN Tunnel.
Prerequisites
-
The Exclusion Mode requires:
-
Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. - version R82 or higher
-
Remote Access VPN clients for Windows OS - version E86.20 or higher.
-
The Inclusion Mode requires:
-
Security Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. with R82 Jumbo Hotfix Accumulator Take 36 or higher.
-
Security Gateway with R82 Jumbo Hotfix Accumulator Take 36 or higher.
-
Remote Access VPN clients for Windows OS - version E86.20 or higher.
-
Configuration
To exclude or include SaaS services in a Remote Access VPN tunnel:

Step 1.a: Configure the Remote Access VPN
-
Connect with SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management Server / Domain Management Server that manages this Security Gateway / Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing..
-
Configure Remote Access VPN.
-
Configure a dedicated encryption domain for Remote Access VPN.
Step 1.b: Configure the VPN Domain
-
From the left navigation panel, click Gateways & Servers.
-
Open the Security Gateway / Cluster object:
-
In the left navigation tree, expand Network Management > VPN Domain.
-
In the Advanced section, next to Set Specific VPN Domain for Gateway Communities, click Set...
The Communities Specific VPN Domain window opens.
-
Select the Remote Access community object.
-
Click Set...
The Set Specific VPN Domain for Community window opens.
-
Click User defined.
-
Click New > Group > Simple Group.
-
Give the Simple Group a name.
-
Click the plus icon (
)to add an object to this group.
-
Click New > Groups > Network Group.
-
The Name of the Network Group must begin with:
-
For exclusion mode, the name must begin with:
exclusions_
-
For inclusion mode, the name must begin with:
inclusions_
Important:
-
Naming is critical – the system uses this prefix to identify the mode.
-
The group must directly contains only these object types:
-
Updatable objects
-
Dynamic objects
-
Domain objects
Nested groups are not supported, even if the nested group contains only allowed object types.
-
-
-
Add the applicable Updatable, Dynamic, or Domain objects (e.g. your SaaS application) directly to the group that starts with
exclusions_
orinclusions_
. -
Click OK.
-
Click OK to save the Simple Group settings.
-
From the drop-down menu, select the Simple Group object you created in step 8.
-
Click OK.
-
Click OK to save the Communities Specific VPN Domain settings.
-
Click OK to save the Security Gateway / Cluster object settings.
-
In SmartConsole, publish the changes and install the Access Control Policy on the Security Gateway / Cluster.

To enable the feature on the Remote Access VPN client, do one of these:
-
Edit the '$FWDIR/conf/trac_client_1.ttm' file on the Security Gateway
-
Connect to the command line on the Security Gateway / each Cluster Member
Security Gateway that is part of a cluster..
-
Log in to the Expert mode.
-
Back up the current $FWDIR/conf/trac_client_1.ttm file:
cp -v $FWDIR/conf/trac_client_1.ttm{,_BKP}
-
Edit the current $FWDIR/conf/trac_client_1.ttm file:
vi $FWDIR/conf/trac_client_1.ttm
-
In the main parameter "trac_client_1", add the new parameter "split_tunnel" as appears below:
Copy(
:trac_client_1 (
:split_tunnel (
:gateway (
:default (true)
)
)
:<other_parameters> (
... ...
)
)
) -
Save the changes in the file and exit the editor.
-
In SmartConsole, install the Access Control policy on the Security Gateway / Cluster Object.
The feature is available on the VPN client after the administrator makes a new connection between the Security Gateway and a Remote Access VPN tunnel.
-
-
Edit the 'trac.defaults' file on the VPN client (located in the VPN client's installation folder)
Note - For information on how to prepare an installation package with the VPN Configuration Utility, see sk122574.
-
Go to the VPN client installation directory:
Operating System
Default Path
Windows OS 32-bit
One of these:
-
%ProgramFiles%\CheckPoint\Endpoint Security\Endpoint Connect\
-
%ProgramFiles%\CheckPoint\Endpoint Connect\
Windows OS 64-bit
One of these:
-
%ProgramFiles(x86)%\CheckPoint\Endpoint Security\Endpoint Connect\
-
%ProgramFiles(x86)%\CheckPoint\Endpoint Connect\
macOS
/Library/Application Support/Checkpoint/Endpoint Security/Endpoint Connect/
-
-
Create a copy of the current trac.defaults file.
-
Edit the current trac.defaults file with an advanced plain-text editor (such as Notepad++, UltraEdit, PSPad).
-
Configure the value of the "
split_tunnel
" parameter to "true
":split_tunnel STRING true GW_USER 0
Important - Do not change other predefined strings in this line - "
STRING
", "GW_USER
", and "0
". -
Save your changes and close the file.
-
Restart the computer with the VPN client installed.
The VPN client starts to exclude SaaS services the next time it creates a new Remote Access VPN tunnel to the Security Gateway.
-