<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic R81.20 JHF99 - Radius VPN Issues in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249420#M48714</link>
    <description>&lt;P&gt;I have an open TAC case, but I figured I would do some crowd sourcing while I wait.&lt;/P&gt;
&lt;P&gt;Upgraded from R81.20 JHF 89 -&amp;gt; 99 (Recommended). Users can no longer connect using the Check Point Mobile VPN. I am testing with version E88.62 on Windows 11 23H2. Our users authenticate against our internal Imprivata server for MFA. I get prompted to "Accept" MFA 3 times before it stops and Check Point says, "invalid username or password".&lt;/P&gt;
&lt;P&gt;When I perform "tcpdump -nni any port 1812", I am seeing good traffic.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS_pcap.png" style="width: 881px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30541iFE040EA4BD8C5F5A/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS_pcap.png" alt="RADIUS_pcap.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I see some stuff addressed for the BLAST CVE and that is where I thought my issue was, but it doesn't appear to be.&lt;/P&gt;
&lt;P&gt;I am NOT ignoring Radius attribute 80. &lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_self"&gt;sk42184&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I applied the Remote Access VPN regedit as well.&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182516" target="_self"&gt;sk182516&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;ckp_regedit -a SOFTWARE/CheckPoint/VPN1 require_message_authenticator -n 1&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;I do see the Message Authenticator field in the replies.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS_accept.png" style="width: 635px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30542i7F54A5C07A265F77/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS_accept.png" alt="RADIUS_accept.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thoughts? Anyone else seeing this?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 20 May 2025 20:05:46 GMT</pubDate>
    <dc:creator>CaseyB</dc:creator>
    <dc:date>2025-05-20T20:05:46Z</dc:date>
    <item>
      <title>R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249420#M48714</link>
      <description>&lt;P&gt;I have an open TAC case, but I figured I would do some crowd sourcing while I wait.&lt;/P&gt;
&lt;P&gt;Upgraded from R81.20 JHF 89 -&amp;gt; 99 (Recommended). Users can no longer connect using the Check Point Mobile VPN. I am testing with version E88.62 on Windows 11 23H2. Our users authenticate against our internal Imprivata server for MFA. I get prompted to "Accept" MFA 3 times before it stops and Check Point says, "invalid username or password".&lt;/P&gt;
&lt;P&gt;When I perform "tcpdump -nni any port 1812", I am seeing good traffic.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS_pcap.png" style="width: 881px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30541iFE040EA4BD8C5F5A/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS_pcap.png" alt="RADIUS_pcap.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I see some stuff addressed for the BLAST CVE and that is where I thought my issue was, but it doesn't appear to be.&lt;/P&gt;
&lt;P&gt;I am NOT ignoring Radius attribute 80. &lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_self"&gt;sk42184&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I applied the Remote Access VPN regedit as well.&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182516" target="_self"&gt;sk182516&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;ckp_regedit -a SOFTWARE/CheckPoint/VPN1 require_message_authenticator -n 1&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;I do see the Message Authenticator field in the replies.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS_accept.png" style="width: 635px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30542i7F54A5C07A265F77/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS_accept.png" alt="RADIUS_accept.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thoughts? Anyone else seeing this?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 20:05:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249420#M48714</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-20T20:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249427#M48717</link>
      <description>&lt;P&gt;Saw someone else post about this too...affecting every user I assume?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 00:22:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249427#M48717</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-21T00:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249490#M48726</link>
      <description>&lt;P&gt;Yeah it's for all users.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 12:26:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249490#M48726</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-21T12:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249494#M48727</link>
      <description>&lt;P&gt;So tcpdump just shows auth error? What did TAC say?&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 12:42:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249494#M48727</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-21T12:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249501#M48728</link>
      <description>&lt;P&gt;I see valid accept / pass messages in the tcpdump, I am gathering debugs for TAC.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 13:28:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249501#M48728</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-21T13:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249503#M48729</link>
      <description>&lt;P&gt;Sounds good, let us know how it gets solved.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2025 13:41:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249503#M48729</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-21T13:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249723#M48763</link>
      <description>&lt;P&gt;I was hoping for a better answer, but here is what is going on. This is Blast-RADIUS related.&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk183244" target="_self"&gt;sk183244&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically, our RADIUS server, Imprivata, is not sending the AVP&amp;nbsp;Message-Authenticator back first. Check Point is requiring that the&amp;nbsp;Message-Authenticator AVP is listed first in the response, since it is not first, we get the failure. We have a ticket open with Imprivata, and they are investigating the issue, so it sounds like we are not the first ticket on this.&lt;/P&gt;
&lt;P&gt;Here are pictures explaining the issue. You can see in the Access-Request,&amp;nbsp;Message-Authenticator is AVP #1, in Access-Accept it is AVP #3, which to Check Point is bad.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS_1.png" style="width: 602px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30597iD5BBE0862D54732C/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS_1.png" alt="RADIUS_1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RADIUS_2.png" style="width: 644px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30598i709224E541DC41CA/image-size/large?v=v2&amp;amp;px=999" role="button" title="RADIUS_2.png" alt="RADIUS_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Per the SK I linked, it sounds like there is a patch that changes the behavior, but that hotfix is currently only available for JHF-96,98. Nothing for JHF-99 yet.&lt;/P&gt;
&lt;P&gt;So, it seems like I am still stuck running JHF-89 for the foreseeable future.&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2025 13:50:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249723#M48763</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-23T13:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249728#M48764</link>
      <description>&lt;P&gt;da*n..nothing in 101?&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2025 18:30:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249728#M48764</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-23T18:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249794#M48774</link>
      <description>&lt;P&gt;Hey mate,&lt;/P&gt;
&lt;P&gt;Any news from TAC?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 26 May 2025 01:18:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249794#M48774</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-26T01:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249924#M48812</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;any news from TAC, bcz we are planning to upgrade our JHF 92 to 99, and our more users are connecting through VPN, so if we face this issue then big challenges for us.&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 13:14:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249924#M48812</guid>
      <dc:creator>VIKAS1</dc:creator>
      <dc:date>2025-05-27T13:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249925#M48813</link>
      <description>&lt;P&gt;We are still discussing with them, nothing concrete yet other than read these SKs.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk183244" target="_self"&gt;sk183244&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182516" target="_self"&gt;sk182516&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_self"&gt;sk42184&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 27 May 2025 13:14:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249925#M48813</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-27T13:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249927#M48814</link>
      <description>&lt;P&gt;If you are on JHF-92, you should be fine. I am running JHF-89 which never included the fixed for CVE-2024-3596, it was added in JHF-90.&lt;/P&gt;
&lt;P&gt;You can validate your current setup, just do a packet capture of a authentication on the gateway and look at the RADIUS packets:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;tcpdump -nni any port 1812 -w radiuscap.pcap&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Open the .pcap in wireshark and look at the "Access-Accept" packet, under the RADIUS protocol in the Attribute Value Pairs section, as long as the Message-Authenticator is #1 you are in the clear. I reference this in a screenshot above.&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 13:22:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/249927#M48814</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-27T13:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250168#M48858</link>
      <description>&lt;P&gt;The fix is:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk183244" target="_self"&gt;sk183244&lt;/A&gt;&amp;nbsp;- Get the hotfix mentioned at the bottom of this SK. The hotfix allows the Message-Authenticator to be anywhere in the list of Attribute Value Pairs. This is working in our environment.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The other solution would be to get your RADIUS vendor to send back the Message-Authenticator as AVP #1. I am still trying to get this accomplished with Imprivata, but no updates yet. I do not wish to manage this hotfix for the rest of my life.&lt;/P&gt;
&lt;P&gt;I am under the impression that Microsoft NPS and some Linux flavors send Message-Authenticator as AVP #1, so I'm not sure if Imprivata is the only vendor not doing this. The fix for BLAST has been publicly available since November from Check Point, and we have been the only ticket our engineer has delt with where the RADIUS vendor is not sending the Message-Authenticator as AVP #1, but if you are using Imprivata, be aware of this. Based on that, it seems unlikely Check Point is going to change the behavior, but you never know.&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 15:42:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250168#M48858</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-29T15:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250170#M48859</link>
      <description>&lt;P&gt;Tx for letting us know!&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 15:46:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250170#M48859</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-29T15:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250186#M48862</link>
      <description>&lt;P&gt;Update from TAC:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Just got a message from internal team, and the hotfix from&amp;nbsp;SK183244 will be integrated in the next upcoming Jumbo or the one after that.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I guess they are going to change the behavior, nice.&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 20:04:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250186#M48862</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2025-05-29T20:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250187#M48863</link>
      <description>&lt;P&gt;So probably take that comes after 101?&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 20:07:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/250187#M48863</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-29T20:07:35Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/261110#M51226</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;Hi!&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;I&lt;/SPAN&gt;&lt;SPAN&gt; would &lt;/SPAN&gt;&lt;SPAN class=""&gt;like&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;add&lt;/SPAN&gt;&lt;SPAN&gt; that &lt;/SPAN&gt;&lt;SPAN class=""&gt;my&lt;/SPAN&gt; &lt;SPAN class=""&gt;client&lt;/SPAN&gt;&lt;SPAN&gt; has a &lt;/SPAN&gt;&lt;SPAN class=""&gt;problem&lt;/SPAN&gt; &lt;SPAN class=""&gt;on&lt;/SPAN&gt; &lt;SPAN class=""&gt;take&lt;/SPAN&gt; &lt;SPAN class=""&gt;105&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; &lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;we&lt;/SPAN&gt; &lt;SPAN class=""&gt;see&lt;/SPAN&gt; &lt;SPAN class=""&gt;other&lt;/SPAN&gt; &lt;SPAN class=""&gt;data&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;Not&lt;/SPAN&gt; &lt;SPAN class=""&gt;all&lt;/SPAN&gt; &lt;SPAN class=""&gt;users&lt;/SPAN&gt; &lt;SPAN class=""&gt;have&lt;/SPAN&gt;&lt;SPAN&gt; this &lt;/SPAN&gt;&lt;SPAN class=""&gt;problem&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; &lt;SPAN class=""&gt;but&lt;/SPAN&gt; &lt;SPAN class=""&gt;only&lt;/SPAN&gt; &lt;SPAN class=""&gt;some&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt; &lt;SPAN class=""&gt;At&lt;/SPAN&gt;&lt;SPAN&gt; the same time, the &lt;/SPAN&gt;&lt;SPAN class=""&gt;problem&lt;/SPAN&gt;&lt;SPAN&gt; is &lt;/SPAN&gt;&lt;SPAN class=""&gt;if&lt;/SPAN&gt;&lt;SPAN&gt; you &lt;/SPAN&gt;&lt;SPAN class=""&gt;connect&lt;/SPAN&gt; &lt;SPAN class=""&gt;using&lt;/SPAN&gt;&lt;SPAN&gt; an &lt;/SPAN&gt;&lt;SPAN class=""&gt;ISP&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; &lt;SPAN class=""&gt;if&lt;/SPAN&gt;&lt;SPAN&gt; you &lt;/SPAN&gt;&lt;SPAN class=""&gt;distribute&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class=""&gt;Internet&lt;/SPAN&gt; &lt;SPAN class=""&gt;from&lt;/SPAN&gt;&lt;SPAN&gt; your &lt;/SPAN&gt;&lt;SPAN class=""&gt;phone&lt;/SPAN&gt;&lt;SPAN&gt;, there are &lt;/SPAN&gt;&lt;SPAN class=""&gt;no&lt;/SPAN&gt; &lt;SPAN class=""&gt;problems&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;I&lt;/SPAN&gt; &lt;SPAN class=""&gt;solved&lt;/SPAN&gt; &lt;SPAN class=""&gt;this&lt;/SPAN&gt; &lt;SPAN class=""&gt;problem&lt;/SPAN&gt; &lt;SPAN class=""&gt;using&lt;/SPAN&gt; &lt;SPAN class=""&gt;radius_ignore&lt;/SPAN&gt; &lt;SPAN class=""&gt;80&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; &lt;SPAN class=""&gt;so&lt;/SPAN&gt; &lt;SPAN class=""&gt;I&lt;/SPAN&gt; &lt;SPAN class=""&gt;think&lt;/SPAN&gt; &lt;SPAN class=""&gt;each&lt;/SPAN&gt; &lt;SPAN class=""&gt;take&lt;/SPAN&gt; &lt;SPAN class=""&gt;will&lt;/SPAN&gt;&lt;SPAN&gt; have &lt;/SPAN&gt;&lt;SPAN class=""&gt;its&lt;/SPAN&gt;&lt;SPAN&gt; own &lt;/SPAN&gt;&lt;SPAN class=""&gt;fix&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; &lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;as&lt;/SPAN&gt; &lt;SPAN class=""&gt;indicated&lt;/SPAN&gt; &lt;SPAN class=""&gt;in&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class=""&gt;article&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;switch&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;take&lt;/SPAN&gt; &lt;SPAN class=""&gt;111&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;I&lt;/SPAN&gt; &lt;SPAN class=""&gt;have&lt;/SPAN&gt;&lt;SPAN&gt; an &lt;/SPAN&gt;&lt;SPAN class=""&gt;example in attachments.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So &lt;/SPAN&gt;&lt;SPAN class=""&gt;far&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;I&lt;/SPAN&gt; &lt;SPAN class=""&gt;think&lt;/SPAN&gt; &lt;SPAN class=""&gt;if&lt;/SPAN&gt;&lt;SPAN&gt; you &lt;/SPAN&gt;&lt;SPAN class=""&gt;upgrade&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;111&lt;/SPAN&gt; &lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;remove&lt;/SPAN&gt; &lt;SPAN class=""&gt;radius_ignore&lt;/SPAN&gt; &lt;SPAN class=""&gt;80&lt;/SPAN&gt;&lt;SPAN&gt;, the &lt;/SPAN&gt;&lt;SPAN class=""&gt;problem&lt;/SPAN&gt;&lt;SPAN&gt; will &lt;/SPAN&gt;&lt;SPAN class=""&gt;disappear&lt;/SPAN&gt; &lt;SPAN class=""&gt;or&lt;/SPAN&gt; &lt;SPAN class=""&gt;not&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Or&lt;/SPAN&gt; &lt;SPAN class=""&gt;I&lt;/SPAN&gt; &lt;SPAN class=""&gt;thought&lt;/SPAN&gt; &lt;SPAN class=""&gt;about&lt;/SPAN&gt; &lt;SPAN class=""&gt;changing&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class=""&gt;registry&lt;/SPAN&gt; &lt;SPAN class=""&gt;setting&lt;/SPAN&gt; &lt;SPAN class=""&gt;as&lt;/SPAN&gt; &lt;SPAN class=""&gt;mentioned&lt;/SPAN&gt; &lt;SPAN class=""&gt;in&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class=""&gt;article&lt;/SPAN&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182516" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk182516&lt;/A&gt;&lt;/SPAN&gt; &lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;remove&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class=""&gt;80&lt;/SPAN&gt; &lt;SPAN class=""&gt;parameter&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I will &lt;/SPAN&gt;&lt;SPAN class=""&gt;add&lt;/SPAN&gt;&lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;we&lt;/SPAN&gt;&lt;SPAN&gt; have a &lt;/SPAN&gt;&lt;SPAN class=""&gt;factor&lt;/SPAN&gt; &lt;SPAN class=""&gt;1&lt;/SPAN&gt; &lt;SPAN class=""&gt;error&lt;/SPAN&gt; &lt;SPAN class=""&gt;in&lt;/SPAN&gt; &lt;SPAN class=""&gt;Logs&lt;/SPAN&gt; &lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;Monitor&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; &lt;SPAN class=""&gt;in&lt;/SPAN&gt;&lt;SPAN&gt; the iked1&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;SPAN class=""&gt;elg&lt;/SPAN&gt; &lt;SPAN class=""&gt;file&lt;/SPAN&gt; &lt;SPAN class=""&gt;-&lt;/SPAN&gt; &lt;SPAN class=""&gt;RADIUS&lt;/SPAN&gt; &lt;SPAN class=""&gt;Servers&lt;/SPAN&gt; &lt;SPAN class=""&gt;Cannot&lt;/SPAN&gt; &lt;SPAN class=""&gt;Be&lt;/SPAN&gt; &lt;SPAN class=""&gt;Reached&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt; &lt;SPAN class=""&gt;Dropping Request&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;Also&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class=""&gt;client&lt;/SPAN&gt; &lt;SPAN class=""&gt;connects&lt;/SPAN&gt; &lt;SPAN class=""&gt;and&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class=""&gt;download&lt;/SPAN&gt; &lt;SPAN class=""&gt;freezes&lt;/SPAN&gt; &lt;SPAN class=""&gt;by&lt;/SPAN&gt; &lt;SPAN class=""&gt;47&lt;/SPAN&gt;&lt;SPAN class=""&gt;%&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 08:23:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/261110#M51226</guid>
      <dc:creator>ShemHunter</dc:creator>
      <dc:date>2025-10-28T08:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF99 - Radius VPN Issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/261150#M51227</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;I&lt;/SPAN&gt; &lt;SPAN class=""&gt;upgraded&lt;/SPAN&gt; &lt;SPAN class=""&gt;one&lt;/SPAN&gt; &lt;SPAN class=""&gt;of&lt;/SPAN&gt; &lt;SPAN class=""&gt;my&lt;/SPAN&gt; &lt;SPAN class=""&gt;clients&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;take&lt;/SPAN&gt; &lt;SPAN class=""&gt;111&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt; &lt;SPAN class=""&gt;made&lt;/SPAN&gt; &lt;SPAN class=""&gt;radius_ignore&lt;/SPAN&gt; &lt;SPAN class=""&gt;80&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;it&lt;/SPAN&gt; &lt;SPAN class=""&gt;also&lt;/SPAN&gt; &lt;SPAN class=""&gt;freezes&lt;/SPAN&gt; &lt;SPAN class=""&gt;at&lt;/SPAN&gt; &lt;SPAN class=""&gt;47&lt;/SPAN&gt;&lt;SPAN class=""&gt;%&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt; &lt;SPAN class=""&gt;I&lt;/SPAN&gt;&lt;SPAN&gt; have &lt;/SPAN&gt;&lt;SPAN class=""&gt;returned&lt;/SPAN&gt;&lt;SPAN&gt; radius_ignore &lt;/SPAN&gt;&lt;SPAN class=""&gt;80&lt;/SPAN&gt; &lt;SPAN class=""&gt;back&lt;/SPAN&gt; &lt;SPAN class=""&gt;and&lt;/SPAN&gt; &lt;SPAN class=""&gt;still&lt;/SPAN&gt; &lt;SPAN class=""&gt;get&lt;/SPAN&gt; &lt;SPAN class=""&gt;47&lt;/SPAN&gt;&lt;SPAN class=""&gt;%&lt;/SPAN&gt;&lt;SPAN class=""&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 13:15:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-JHF99-Radius-VPN-Issues/m-p/261150#M51227</guid>
      <dc:creator>ShemHunter</dc:creator>
      <dc:date>2025-10-28T13:15:48Z</dc:date>
    </item>
  </channel>
</rss>

