
If extended authentication is used, this certificate can be used for EAP-TLS. If you select Certificate, and extended authentication (EAP) is not used, this certificate will be sent out for IKE client authentication. Some enterprises have a strong preference concerning which identifier is exposed.Ĭertificate - If you select Certificate, select the identity certificate to be used as the account credential. Users will need to fill in the relevant username. Įnter $NULL$ if you want the field presented to the user to be blank.You can use combinations such as the following: $USERID$, $EMAIL$, $SAM_ACCOUNT_NAME$, $USER_CUSTOM1$, $USER_CUSTOM2$, $USER_CUSTOM3$, $USER_CUSTOM4$, $CUSTOM_DEVICE_Attributename$, $CUSTOM_USER_Attributename$, $NULL$ Use this field to specify an alternate format, such as: To configure a Manual or Automatic proxy, go to Proxy - Manual or Proxy - Automatic. User channel - the configuration is effective only for the currently registered user on a device.Įnter the IP address, hostname, or URL for the VPN server.Device channel - the configuration is effective for all users on a device.Select one of the following distribution options: Provide a description that clarifies the purpose of these settings.įor macOS only. Proxy - None settingsĮnter a short phrase that identifies this VPN setting.


Use the following guidelines to configure a Check Point Capsule VPN without a proxy. Within these selections, you may make settings for: Use the following guidelines to configure the Check Point Capsule VPN connection type: This VPN connection type is supported on iOS, macOS, and Windows devices only.
