<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS+ with Check Point Gaia &amp;amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/258013#M50592</link>
    <description>&lt;P&gt;So I've found out why the ssh connection drops,&amp;nbsp; basically when the NON-Local User attempts to login which has admin rights, the system does not allow access to the virtual systems.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sk98733 (last updated in 2021!) Implies this:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;HostName&amp;gt; &lt;STRONG&gt;add rba role TACP-15 domain-type System all-features&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;save config&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;show configuration rba&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Note for VSX:&lt;/STRONG&gt;HostName &amp;gt; &lt;STRONG&gt;add rba role TACP-15 virtual-system-access &amp;lt;0, ALL_Relevant VS&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;However you this does not work.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;TESTFW:0&amp;gt; add rba role TACP-15 virtual-system-access all&lt;BR /&gt;NMSRBA0429 The following features: CloningGroup, aaa-servers, backup, command, configuration, cron, expert, expert-authentication-method, expert-password, expert-password-hash, ftw, group, grub2-password, grub2-password-hash, rba, scheduled_backup, snapshot, user, are restricted to global users only, and therefore cannot be added to roles with specific VS access.&lt;BR /&gt;TESTFW:0&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Sep 2025 15:28:21 GMT</pubDate>
    <dc:creator>genisis__</dc:creator>
    <dc:date>2025-09-23T15:28:21Z</dc:date>
    <item>
      <title>TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255668#M50039</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I’ve been working on integrating our Check Point firewalls (Gaia R81.x) with Cisco ISE for TACACS+ device administration and hit a roadblock that I can’t seem to get past. Hoping someone in the community has run into this and can point me in the right direction.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Full disclosure a different team handles Cisco ISE and I do not have access to look in there myself and can only go off screenshots shared to me. [I have configured this in two separate environments with the same Gaia Clish configurations. The only thing that is different is the TACACS+ servers, Cisco ISE, and user credentials.]&lt;/P&gt;&lt;P&gt;Commands used&lt;/P&gt;&lt;P&gt;add aaa tacacs-servers priority 1 server &amp;lt;TACACS_SERVER_1&amp;gt; key ******** timeout 10&lt;BR /&gt;add aaa tacacs-servers priority 2 server &amp;lt;TACACS_SERVER_2&amp;gt; key ******** timeout 10&lt;BR /&gt;set aaa tacacs-servers state on&lt;BR /&gt;set aaa tacacs-servers user-uid 0&lt;BR /&gt;add rba role TACP-0 domain-type System readwrite-features tacacs_enable&lt;BR /&gt;add rba role TACP-15 domain-type System all-features&lt;BR /&gt;add user &amp;lt;AD_Username&amp;gt; uid 0 homedir /home/&amp;lt;AD_Username&amp;gt;&lt;BR /&gt;add rba user &amp;lt;AD_Username&amp;gt; roles TACP-15&lt;BR /&gt;set user &amp;lt;AD_Username&amp;gt; gid 100 shell /bin/bash&lt;BR /&gt;set user &amp;lt;AD_Username&amp;gt; realname "&amp;lt;AD_Username&amp;gt;"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;What works so far&lt;/P&gt;&lt;P&gt;Connectivity is good:&lt;/P&gt;&lt;P&gt;ping, nc -vz &amp;lt;ISE&amp;gt; 49, and tcpdump all confirm the firewall can reach ISE on TCP/49.&lt;BR /&gt;IP routes are correct, and ISE is receiving the authentication requests.&lt;BR /&gt;Authentication is successful:&lt;BR /&gt;ISE Live Logs show Passed-Authentication: Authentication succeeded.&lt;BR /&gt;Username is correctly resolved in Active Directory.&lt;BR /&gt;Authorization Profile was created:&lt;BR /&gt;In ISE, a created a Shell Profile (Checkpoint_Admin) with no custom attributes (mirrors separate working environment)&lt;BR /&gt;The TACACS+ policy matches the correct AD group and returns the profile&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The Problem&lt;/P&gt;&lt;P&gt;On Gaia, I still get “Permission denied” when attempting SSH login with TACACS credentials.&lt;BR /&gt;Gaia logs show:&lt;BR /&gt;PAM-tacplus[…] auth failed: 2 tac_connect: all possible TACACS+ servers failed&lt;BR /&gt;In ISE Live Logs, AuthZ shows as 0 (no usable profile) even though the rule hits and the profile is applied.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;What's been verified&lt;/P&gt;&lt;P&gt;Verified the shared secret matches on both sides.&lt;BR /&gt;Created a new test key just in case — same result.&lt;BR /&gt;Verified that show aaa tacacs-servers shows the ISE nodes as up.&lt;BR /&gt;Confirmed that the RBA role TACP-15 exists and has “All system features.”&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Even with the Shell Profile in place, ISE shows AuthZ profile applied but Gaia still refuses login with “permission denied.”&lt;/P&gt;&lt;P&gt;Is there anything specific in CheckPoint RBA mappings&amp;nbsp;that I might be missing?&lt;/P&gt;&lt;P&gt;Do ISE Shell Profiles need any attribute other than shell:priv-lvl=15 for Check Point (unlike IOS/NX-OS which only need that one)?&lt;/P&gt;&lt;P&gt;Could this be related to how Gaia interprets the AD group membership via TACACS?&lt;/P&gt;&lt;P&gt;Any advice or pointers would be hugely appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 16:37:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255668#M50039</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-21T16:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255779#M50068</link>
      <description>&lt;P&gt;Is access via the GAiA UI and Console access also effected and which version/JHF is the gateway?&lt;/P&gt;</description>
      <pubDate>Sat, 23 Aug 2025 01:40:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255779#M50068</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-23T01:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255780#M50069</link>
      <description>&lt;P&gt;Hi Chris thank you for replying,&lt;/P&gt;&lt;P&gt;Both Gaia web UI and Console access are effected. Our devices in this particular environment are mostly R81.10 Take 156. I did recently remove old Radius configurations that have not worked thinking that there may have been a conflict between the two. Unfortunately that too did not resolve the underlying issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Aug 2025 02:11:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255780#M50069</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-23T02:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255781#M50070</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/132977"&gt;@Fatalis&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would confirm with tcpdump and fw monitor that you see the communication from the fw itself, not sure what port this is related to, but lets assume, for argument sake its 777, you can try below:&lt;/P&gt;
&lt;P&gt;tcpdump -enni any port 777&lt;/P&gt;
&lt;P&gt;fw monitor -e "accept port(777);"&lt;/P&gt;
&lt;P&gt;See what you get...based on output of those, it should give us better idea.&lt;/P&gt;
&lt;P&gt;Best.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 23 Aug 2025 02:38:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255781#M50070</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-23T02:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255810#M50080</link>
      <description>&lt;P&gt;Hi Rock,&lt;BR /&gt;&lt;BR /&gt;The tcpdump over TACACS port 49 shows a three way handshake between the security gateway and the TACACS server. However, at the very start with tail -f /var/log/messages | grep i tac the following error pops up.&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;PAM-tacplus[…] auth failed: 2 tac_connect:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [Still finishes the three way handshake with the fail]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;with fw monitor we can see it going in and out the designated ports to reach the TACACS server and to come back ie i,I,o,O. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;There is a firewall that sits in front of the TACACS server which picks up on the cluster VIP when running the fw monitor command. Which should be as expected.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Attempting login to that firewall I just mentioned which sits directly Infront of that TACACS server also results in the same errors.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would think it could be related to AD permissions but to my knowledge TACACS ISE will pull the AD group associated with the AD user and then give it the Shell Profile privilege that is configured within ISE for privilege levels&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 03:44:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255810#M50080</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-24T03:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255812#M50081</link>
      <description>&lt;P&gt;Based on all you said, sounds to me that CP side appears to be fine.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 03:49:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255812#M50081</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-24T03:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255813#M50082</link>
      <description>&lt;P&gt;Yeah i’m also coming to that same conclusion just needed some sanity checks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have a scheduled TAC call with Cisco Monday with hopefully more information and a hopefully a resolution.&lt;/P&gt;&lt;P&gt;I’ll post here for any findings or resolutions after the troubleshooting with Cisco&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 03:54:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255813#M50082</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-24T03:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255814#M50083</link>
      <description>&lt;P&gt;Sounds good, please keep us posted.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 03:57:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255814#M50083</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-24T03:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255817#M50086</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;From what I remember, you should not be defining the usernames on the gateway itself. Try deleting one of the users on the gateway and then try that user again via tacacs.&lt;/P&gt;
&lt;P&gt;remove these lines below&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;add user &amp;lt;AD_Username&amp;gt; uid 0 homedir /home/&amp;lt;AD_Username&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;add rba user &amp;lt;AD_Username&amp;gt; roles TACP-15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set user &amp;lt;AD_Username&amp;gt; gid 100 shell /bin/bash&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set user &amp;lt;AD_Username&amp;gt; realname "&amp;lt;AD_Username&amp;gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 06:16:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255817#M50086</guid>
      <dc:creator>Peter_Lyndley</dc:creator>
      <dc:date>2025-08-24T06:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255822#M50090</link>
      <description>&lt;P&gt;Is there a SK for this?&amp;nbsp; It would be really good to know how to integrate ISE so there is R/W and RO accounts.&amp;nbsp; With the ISE 3.x/4.x configuration steps as well.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 11:57:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255822#M50090</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-08-24T11:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255824#M50091</link>
      <description>&lt;P&gt;There are SKs relating to this, for example sk98733 and sk101573&lt;/P&gt;
&lt;P&gt;Note - All&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_tacacs_plus variable"&gt;TACACS+&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;users must log in to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.r_gaia variable"&gt;Gaia&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;OS with the password assigned to the default role&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;TACP-0&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;Note 2.To get their applicable TACP role in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.r_gaia variable"&gt;Gaia&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;OS, after this initial login,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_tacacs_plus variable"&gt;TACACS+&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;users must log in for the second time with the password assigned to their applicable TACP role.&lt;/P&gt;
&lt;P&gt;Also check -&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/TACACS-Gaia-Client.htm?tocpath=User%20Management%7CAuthentication%20Servers%7C_____5" target="_blank"&gt;Configuring Gaia as a TACACS+ Client&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 13:43:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255824#M50091</guid>
      <dc:creator>Peter_Lyndley</dc:creator>
      <dc:date>2025-08-24T13:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255825#M50092</link>
      <description>&lt;P&gt;Thats very good to know&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2124"&gt;@Peter_Lyndley&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 15:24:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255825#M50092</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-24T15:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255828#M50095</link>
      <description>&lt;P&gt;In the current working environment I tried this as well without a matching local user assigned TACP-15 and it wouldn't work. Only until I manually created each user with the assigned role TACP-15 in the firewall were we able to finally able to gain access.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Also tried both ways in the broken environment by removing the users and re-adding the user accounts which resulted in the same errors.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 16:57:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255828#M50095</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-24T16:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255901#M50117</link>
      <description>&lt;P&gt;good to know, thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 14:02:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255901#M50117</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-08-25T14:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255903#M50119</link>
      <description>&lt;P&gt;That pretty much want we all want i.e. don't create any accounts on the gateway.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 14:04:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255903#M50119</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-08-25T14:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255939#M50124</link>
      <description>&lt;P&gt;Latest troubleshooting with TAC I discovered the the Firewall VIP is making it's way to the firewall which sits in front of the TACACS server (i) but never (I, o, O) leaving that firewall to TACACS&lt;BR /&gt;&lt;BR /&gt;I do see return traffic from the source firewall mgmt IP. Just need to figure out why the traffic hits the port on that TACACS border firewall but never leaves to make it's way to that TACACS server. The mgmt IP takes the same exact route and can see that communication back and forth.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 22:50:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255939#M50124</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-25T22:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255940#M50125</link>
      <description>&lt;P&gt;Funny enough I removed the accounts in the working environment and it did in fact work as it was supposed to be intended. I may keep the actual local accounts which auth to TACACS since it'll default our admins into bin/bash. I'll leave the decision up to them once both environments are working&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 22:57:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255940#M50125</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-25T22:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255941#M50126</link>
      <description>&lt;P&gt;Edit- It was taking the accelerated path. Updated fw monitor command and verified that communication is returning back to the VIP&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 23:19:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255941#M50126</guid>
      <dc:creator>Fatalis</dc:creator>
      <dc:date>2025-08-25T23:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255943#M50127</link>
      <description>&lt;P&gt;What did Cisco TAC say?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2025 00:01:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/255943#M50127</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-26T00:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ with Check Point Gaia &amp; Cisco ISE — AuthZ Profile Created but Still Getting Denied</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/257846#M50547</link>
      <description>&lt;P&gt;I've had another go with this but this time with R82 VSX.&amp;nbsp; What I would like to see is a clearly defined instruction guide for Cisco ISE intergration to allow ReadOnly and Admin access. This does not seem to exist (Yes there are some really old Sks).&lt;/P&gt;
&lt;P&gt;Anyway I got to the point where I had to have a user created on&amp;nbsp; GAIA (Not what I want),&amp;nbsp; assigned it TACP-15 role.&amp;nbsp; The when I logged in got hit by virtual system access not allowed, I can't assign virtual systems to the role, some features are not allowed. So stuck.&lt;/P&gt;
&lt;P&gt;How on earth do I get an admin user authenticated against ISE without creating the user locally and also ensure it can access virtual system with admin rights.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This seems to be the link to look at for a standard gateway (Nothing really in there for VSX that I could see)&amp;nbsp;&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/TACACS-Servers-for-Non-Local-Gaia-Users.htm?tocpath=User%20Management%7CAuthentication%20Servers%7C_____6" target="_blank" rel="noopener"&gt;Configuring TACACS+ Servers for Non-Local Gaia Users&lt;/A&gt;&lt;BR /&gt;This takes you to a SK then related to Cisco ACS which went EoL years ago.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Sep 2025 18:55:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TACACS-with-Check-Point-Gaia-amp-Cisco-ISE-AuthZ-Profile-Created/m-p/257846#M50547</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-09-21T18:55:34Z</dc:date>
    </item>
  </channel>
</rss>

