<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Check Point VPN / WebVPN / Mobile Access &amp;amp; Duo MFA (Duo Authentication Proxy v5.0 upwards) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VPN-WebVPN-Mobile-Access-amp-Duo-MFA-Duo/m-p/97471#M10444</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;For anyone using Duo as their 2 factor authentication service, I'd like to share this information:&lt;/P&gt;&lt;P&gt;Duo works flawlessly up till version 4.0.2, once we upgraded to the Duo Auth Proxy 5.0.1 (latest version), upon confirming the Duo Push Notification, the connection to the VPN does not work anymore (Check Point Gateway drops the traffic).&lt;/P&gt;&lt;P&gt;Turns out that in V&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;ersion 5.0.0 the Duo Authentication Proxy began sending a RADIUS Message-Authenticator attribute (attribute ID 80) in all responses, which the Check Point gateways don't recognize and drop the traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The solution from Check Point (SR was created, resolved, now closed) is to set the &lt;STRONG&gt;radius_ignore&lt;/STRONG&gt; value to 80. Smart Console Menu -&amp;gt; Global Properties -&amp;gt; Advanced -&amp;gt; Configure -&amp;gt; FireWall-1 -&amp;gt; Authentication -&amp;gt; RADIUS.&lt;/P&gt;&lt;P&gt;Afterwards the authentication works again. After having contact with the Duo support, they created a KB for that problem as well:&lt;/P&gt;&lt;P&gt;&lt;A href="https://help.duo.com/s/article/6328?language=en_US" target="_blank" rel="noopener"&gt;https://help.duo.com/s/article/6328?language=en_US&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Apparently this will be resolved in the upcoming Duo authentication release v5.0.2&lt;/P&gt;&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
    <pubDate>Thu, 24 Sep 2020 15:03:29 GMT</pubDate>
    <dc:creator>christophe</dc:creator>
    <dc:date>2020-09-24T15:03:29Z</dc:date>
    <item>
      <title>Check Point VPN / WebVPN / Mobile Access &amp; Duo MFA (Duo Authentication Proxy v5.0 upwards)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VPN-WebVPN-Mobile-Access-amp-Duo-MFA-Duo/m-p/97471#M10444</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;For anyone using Duo as their 2 factor authentication service, I'd like to share this information:&lt;/P&gt;&lt;P&gt;Duo works flawlessly up till version 4.0.2, once we upgraded to the Duo Auth Proxy 5.0.1 (latest version), upon confirming the Duo Push Notification, the connection to the VPN does not work anymore (Check Point Gateway drops the traffic).&lt;/P&gt;&lt;P&gt;Turns out that in V&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;ersion 5.0.0 the Duo Authentication Proxy began sending a RADIUS Message-Authenticator attribute (attribute ID 80) in all responses, which the Check Point gateways don't recognize and drop the traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The solution from Check Point (SR was created, resolved, now closed) is to set the &lt;STRONG&gt;radius_ignore&lt;/STRONG&gt; value to 80. Smart Console Menu -&amp;gt; Global Properties -&amp;gt; Advanced -&amp;gt; Configure -&amp;gt; FireWall-1 -&amp;gt; Authentication -&amp;gt; RADIUS.&lt;/P&gt;&lt;P&gt;Afterwards the authentication works again. After having contact with the Duo support, they created a KB for that problem as well:&lt;/P&gt;&lt;P&gt;&lt;A href="https://help.duo.com/s/article/6328?language=en_US" target="_blank" rel="noopener"&gt;https://help.duo.com/s/article/6328?language=en_US&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Apparently this will be resolved in the upcoming Duo authentication release v5.0.2&lt;/P&gt;&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Thu, 24 Sep 2020 15:03:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VPN-WebVPN-Mobile-Access-amp-Duo-MFA-Duo/m-p/97471#M10444</guid>
      <dc:creator>christophe</dc:creator>
      <dc:date>2020-09-24T15:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point VPN / WebVPN / Mobile Access &amp; Duo MFA (Duo Authentication Proxy v5.0 upwards)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VPN-WebVPN-Mobile-Access-amp-Duo-MFA-Duo/m-p/221341#M42372</link>
      <description>&lt;P&gt;Same solution worked on Windows Server NPS after Windows Security Update&amp;nbsp;&lt;SPAN&gt;KB5040437.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 01:18:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-VPN-WebVPN-Mobile-Access-amp-Duo-MFA-Duo/m-p/221341#M42372</guid>
      <dc:creator>spaceForceOne</dc:creator>
      <dc:date>2024-07-19T01:18:23Z</dc:date>
    </item>
  </channel>
</rss>

