I also was looking for it AND I've found a checkpoint client VPN on the Checkpoint Users Forums, I'll link it to you tomorrow. OK Here is the link to the Documentation under RedHat:

Check Point Infinity architecture delivers consolidated Gen V cyber security across networks, cloud, and mobile environments. Download this app from Microsoft Store for Windows 10, Windows 10 Mobile, Windows Phone 8.1, Windows 10 Team (Surface Hub). See screenshots, read the latest customer reviews, and compare ratings for Check Point Capsule VPN. The Check Point VPN solution uses these secure VPN protocols to manage encryption keys, and send encrypted packets. IKE (Internet Key Exchange) is a standard key management protocol that is used to create the VPN tunnels. IPsec is protocol that supports secure IP communications that are authenticated and encrypted on private or public networks. Mar 01, 2018 · Key Details of Check Point Capsule VPN for Windows 10 Securely access all your corporate resources from your device through a VPN tunnel Last updated on 03/01/18 Remote Access VPN – Simply and safely connects your employees to their corporate email, calendar, contacts, plus other confidential data and corporate applications without risk, via both Layer-3 and SSL VPN; Mobile Security – Protects personal and corporate mobile devices from viruses and other types of malware with enterprise grade technology. Check Point VPN Plugin for Windows 8.1 is an L3 VPN client. It supplies secure connectivity and access to corporate resources using L3 SSL VPN Tunnel. Required Licenses - Mobile Access Software Blade on the gateway • VPN Connection persistency upon device roaming • Always attempt to connect after session expires or device reboot About Check Point Software Technologies Check Point Software Technologies, Ltd. is a world-wide leader in Network and Endpoint Security. Visit www.checkpoint.com

Check Point VPN Plugin for Windows 8.1 is an L3 VPN client. It supplies secure connectivity and access to corporate resources using L3 SSL VPN Tunnel. Required Licenses - Mobile Access Software Blade on the gateway

Check Point Infinity architecture delivers consolidated Gen V cyber security across networks, cloud, and mobile environments.

Check Point SSL Network Extender will be displayed upon the completion of the ActiveX / Java control download and automatic installation.

To easily check your VPN for DNS leaks, first connect to a VPN server outside of your country. Then, if you see IP addresses in your country, and they belong to your ISP, then you have a DNS leak. You can see above there are two DNS requests leaking out while connected to a VPN server in the United States. VPN-1 is a firewall and VPN product developed by Check Point Software Technologies Ltd. VPN-1 is a stateful firewall which also filters traffic by inspecting the application layer . It was the first commercially available software firewall to use stateful inspection.