
"I can use up to three computers, but sometimes I have four.

More Check Point Remote Access VPN Cons → Right now, it will fail after ten seconds, however, it shouldn't fail until after 20 seconds." "The VPN remote Access blade could be improved." In the case of host translations, the request was made to the same host, however, we cannot specify the ports, which, in our case, are used to redirect to different servers." "Without a doubt and with the new trends in technology, Check Point should already have a blade with a 2MFA solution and not through some other vendor." "They need to increase their timeout.

"Some configurations, like idle timeout (the requirement came from multiple users), are not possible to configure directly from the Check Point management server." "We would like to implement HTML5 (clientless access) in the product without installing any additional software." "There was complexity in the initial setup." "This is the best version we are using, however, if some changes can be made in the next release, I'd like to see adjustments to the time period and internet connectivity." "In the case of URL translation of the VPN Web portal, the requests made from the front end to the back end weren't valid (due to the use of dynamic subdomains).
