If you do not see this parameter, add it manually as shown here: On the gateway, open the $FWDIR/conf/trac_client_1.ttm configuration file.Whichever you choose, you must set the XX Product XX configuration file to identify the configuration.
#CHECK POINT VPN HOST NAME MANUAL#
First to Respond - The first Security Gateway to reply to the probing mechanism is chosen.There are three methods used to choose which Security Gateway is used as the entry point for a connection: Note - In a MEP Security Gateway environment, the remote clients supported are the Check Point Remote Access Clients. The MEP Security Gateways do not have to be in the same location and can be widely-spaced, geographically. The probing protocol is used only in Site-to-Site MEP. The Check Point solution for multiple entry points is based on a proprietary Probing Protocol (PP) that tests Security Gateway availability. How a remote user selects a Security Gateway in order to reach a destination IP address depends on how the MEP Security Gateways have been configured, which in turn depends on the requirements of the organization. In an MEP environment, more than one Security Gateway is both protecting and giving access to the same VPN domain. The Check Point Solution for Multiple Entry Points It therefore makes good sense to have Multiple Entry Points (MEP) to the same network. If the Security Gateway fails, the internal network is no longer available. It is the Security Gateway that makes the internal network "available" to remote machines. The Security Gateway provides a single point of entry to the internal network. The Need for Multiple Entry Point Security Gateways Multiple Entry Point for Remote Access VPNs In This Section: