<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADIUS Authentication over Site-to-Site VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/115137#M16152</link>
    <description>&lt;P&gt;Hello,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;i have a question to this ...&lt;BR /&gt;when you have the firewall doing RADIUS over VPN, what is your source IP? is it the Firewalls external IP?&lt;BR /&gt;is it possible to set a specific outgoing IP address? So the closest IP pointing to the destination in easy words.&lt;BR /&gt;In a scenario of many many firewalls and NPS servers i want to limit the amount of IP address i have to set on NPS as NAS IP.&lt;BR /&gt;&lt;BR /&gt;is there a way?&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;</description>
    <pubDate>Fri, 02 Apr 2021 09:12:20 GMT</pubDate>
    <dc:creator>Thomas_Eichelbu</dc:creator>
    <dc:date>2021-04-02T09:12:20Z</dc:date>
    <item>
      <title>RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/85397#M11087</link>
      <description>&lt;P&gt;I have set up a Radius Server to authenticate remote-access VPN clients. The Radius server is located at a remote site connected via Site-to-Site VPN on the same gateway the clients connect to.&lt;/P&gt;&lt;P&gt;Authentication fails because the request to the Radius server does not go through the VPN tunnel. Logs show traffic is accepted by an implied rule and consequently not encrypted.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 16:28:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/85397#M11087</guid>
      <dc:creator>Mark_Papworth</dc:creator>
      <dc:date>2020-05-15T16:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/85482#M11088</link>
      <description>You need to disable the implied rule for RADIUS.&lt;BR /&gt;You can do that by editing the appropriate implied_rules.def, ensuring explicit rules exist for RADIUS where needed and installing policy.&lt;BR /&gt;Refer to: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92281" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92281&lt;/A&gt;</description>
      <pubDate>Sat, 16 May 2020 22:52:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/85482#M11088</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-16T22:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/85571#M11089</link>
      <description>Thanks. I couldn't figure out where to disable the implied rule.&lt;BR /&gt;We've established communication with the Radius server now.&lt;BR /&gt;</description>
      <pubDate>Sun, 17 May 2020 16:25:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/85571#M11089</guid>
      <dc:creator>Mark_Papworth</dc:creator>
      <dc:date>2020-05-17T16:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/115137#M16152</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;i have a question to this ...&lt;BR /&gt;when you have the firewall doing RADIUS over VPN, what is your source IP? is it the Firewalls external IP?&lt;BR /&gt;is it possible to set a specific outgoing IP address? So the closest IP pointing to the destination in easy words.&lt;BR /&gt;In a scenario of many many firewalls and NPS servers i want to limit the amount of IP address i have to set on NPS as NAS IP.&lt;BR /&gt;&lt;BR /&gt;is there a way?&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;</description>
      <pubDate>Fri, 02 Apr 2021 09:12:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/115137#M16152</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2021-04-02T09:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/115180#M16167</link>
      <description>&lt;P&gt;It should always use the "nearest" IP to the destination (according to the routing table).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Apr 2021 00:59:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/115180#M16167</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-04T00:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/151314#M24690</link>
      <description>&lt;P&gt;What's the solution?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 20:22:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/151314#M24690</guid>
      <dc:creator>renanmvc</dc:creator>
      <dc:date>2022-06-20T20:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/193017#M35840</link>
      <description>&lt;P&gt;This worked perfectly with an MDS running on version R80.40 and (a specific CMA's implied_rule.def had to be modified) respective SG running on R80.40. However, it seems since we upgraded the MDS to R81.20 while the relevant SG is still running on version R80.40 this solution does not work any more. While RADIUS implied rule is disabled in the appropriate CMA's implied_rule.def (and policy install was also performed, of course), the behavior remains the original, so RADIUS traffic is still matched by the implied rule.&lt;/P&gt;&lt;P&gt;Any thoughts on this, please? Are you aware of any change in R81.20 or it is simply caused by the version difference between the management and the SG?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 06:20:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/193017#M35840</guid>
      <dc:creator>Norbert_Giczi</dc:creator>
      <dc:date>2023-09-19T06:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/193063#M35845</link>
      <description>&lt;P&gt;Changes made to .def files are not maintained across version upgrades.&lt;BR /&gt;Further, if you are managing older/different gateway versions, you will need to make a change in the relevant backward compatibility directory.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk92281" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk92281&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 13:08:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/193063#M35845</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-19T13:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: RADIUS Authentication over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/193184#M35879</link>
      <description>&lt;P&gt;Thank you so much for your answer.&lt;/P&gt;&lt;P&gt;Now we can see where the problem lies: the implied_rules.def change was made in the wrong directory (to be more precise, not in the backward compatibility directory). In the meantime, it was decided to go with the SG upgrade to R81.20 and now the RADIUS traffic tunneling works as expected.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 18:19:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RADIUS-Authentication-over-Site-to-Site-VPN/m-p/193184#M35879</guid>
      <dc:creator>Norbert_Giczi</dc:creator>
      <dc:date>2023-09-20T18:19:29Z</dc:date>
    </item>
  </channel>
</rss>

