Advanced Settings
Quantum Spark 1500, 1600 and 1800 Appliance Series R80.20.40 Locally Managed Administration Guide | 151
VPN Remote
Access Attribute
Description
Back
connections
keep-alive
interval
Indicates the interval (in seconds) between keep-alive packets to the
gateway required for gateway to client back connections.
Enable Visitor
Mode on All
Interfaces
Enable Visitor
Mode on This
Interface
This dialog box lets you configure a specified interface for visitor mode.
Visitor mode allows the appliance to listen for TCPT traffic on a specified
port (by default port 443) as backup to IKE connections from the remote
access client.
This mode is normally used to allow VPN remote access connections
from behind restrictive environments such as hotels.
Modifying visitor mode to be enabled only on a specific interface is not
recommended.
Encrypt DNS
traffic
Indicates if DNS queries sent by the remote client to a DNS server located
in the encryption domain are passed through the VPN tunnel.
Encryption
Method
Indicates which IKE encryption method (version) is used for IKE phase 1
and 2.
Endpoint
Connect re-
authentication
timeout
Indicates the time (in minutes) until the Endpoint Connect user's
credentials are resent to the gateway to verify authorization.
IKE IP
Compression
Support
Indicates if IPSec packets from remote access clients is compressed.
IKE Over TCP
Enables support of IKE over TCP.
IKE restart
recovery
When dealing with Remote Access clients, the appliance cannot initiate
an IKE phase 1 negotiation because the client address is unknown. If the
appliance has an active SA with a Remote Access client and it restarts,
the SA is lost, and the appliance cannot initiate IKE phase 1. But, if the
restart option is selected, the appliance saves the tunnel details every
minute. When the first encrypted packet arrives after the appliance
restarts, the appliance sends a Delete SA message. This causes the
remote client to discard the old SA and initiate IKE phase 1 to reopen the
tunnel.
Legacy NAT
traversal
Indicates if the Check Point proprietary NAT traversal mechanism (UDP
encapsulation) is enabled for SecureClient.
Match on Internal
Rule Base only
Traffic from Remote Access clients will always be matched on the
Incoming/Internal/VPN rulebase, including traffic to the Internet
Table: VPN Remote Access Attributes (continued)