<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive portal for linux SSH or Terminal windows in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/49076#M87093</link>
    <description>Yes, it will. &lt;BR /&gt;Refer to: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115961" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115961&lt;/A&gt;</description>
    <pubDate>Thu, 28 Mar 2019 18:07:05 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-03-28T18:07:05Z</dc:date>
    <item>
      <title>Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48120#M87081</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;Is anyone aware if any mechanism&amp;nbsp;exists to leverage Identity awareness when I would like to pass through Firewall with captive Portal enabled while using SSH or Linux with no GUI Terminal?&lt;/P&gt;&lt;P&gt;With browser Yes it's pretty much possible; but what if the GUI is not available?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Blason R&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 14:53:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48120#M87081</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2019-03-21T14:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48127#M87082</link>
      <description>&lt;P&gt;Captive Portal is made for Browser Based Auth only - you could do a RFE here: &lt;A href="https://www.checkpoint.com/rfe/rfe.htm" target="_blank" rel="noopener"&gt;&lt;FONT size="3" face="arial,helvetica,sans-serif"&gt;Products and Feature Suggestions&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 15:09:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48127#M87082</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-03-21T15:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48128#M87083</link>
      <description>&lt;P&gt;Okies and thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 15:11:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48128#M87083</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2019-03-21T15:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48209#M87084</link>
      <description>Identity Awareness has an API.&lt;BR /&gt;Perhaps you can script up something that gives your Linux machine an identity?</description>
      <pubDate>Fri, 22 Mar 2019 05:09:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48209#M87084</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-22T05:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48213#M87085</link>
      <description>&lt;P&gt;Thanks buddy!!&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 05:33:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48213#M87085</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2019-03-22T05:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48229#M87086</link>
      <description>&lt;P&gt;In the older times there was a possibility to telnet to port 259 on the gateway. This worked via a rule with "Client Auth" as action...&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Client_Authentication.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/355iB00B0D3348014FBA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Client_Authentication.PNG" alt="Client_Authentication.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This very old document gives a good description of how to configure&lt;/P&gt;&lt;P&gt;&lt;A href="http://downloads.checkpoint.com/dc/download.htm?ID=12297" target="_blank"&gt;http://downloads.checkpoint.com/dc/download.htm?ID=12297&lt;/A&gt;&lt;/P&gt;&lt;P&gt;But with "Client Auth" there are some limitations shown in&amp;nbsp;&lt;SPAN&gt;sk115961&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We had customers using this with R77.30, but never tried on R80.xx&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 07:51:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48229#M87086</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-03-22T07:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48231#M87087</link>
      <description>&lt;P&gt;You can find another answer in &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115242&amp;amp;partition=Advanced&amp;amp;product=SSL" target="_self"&gt;sk115242&lt;/A&gt;: The Linux user can use the supported SNX build for Linux CLI implementation from&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90240" target="_blank" rel="noopener"&gt;sk90240&lt;/A&gt; (&lt;STRONG&gt;Build&amp;nbsp;800007075&lt;/STRONG&gt;) instead of the Captive Portal ! See also &lt;A href="http://supportcontent.checkpoint.com/documentation_download?ID=22821" target="_blank" rel="noopener"&gt;SSL Network Extender E75&amp;nbsp;CLI Support for Mobile Access Blade Release Notes.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 08:08:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48231#M87087</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-03-22T08:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48297#M87088</link>
      <description>Client Auth has been deprecated. That said, there are a few use cases where Client Auth still makes sense (like this one).</description>
      <pubDate>Fri, 22 Mar 2019 15:40:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48297#M87088</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-22T15:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48568#M87089</link>
      <description>&lt;P&gt;Well, the use case here is; since we have a customer whose servers are placed in DMZ and then users can access the DMZ servers and then since those are servers have outbound https access opens they do SSL Tunneling to certain sites and access it. I understand we can harden it on SSH bu disabling SSH Port forwarding but I see cases where the user has setup Squid proxy on a server and since the server has ANY Access to http/https they are able to access the internet through it.&lt;/P&gt;&lt;P&gt;Hence even if they take SSH of the server wondering if Captive portal could have been a better option for accessing the Internet?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 04:05:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48568#M87089</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2019-03-26T04:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48766#M87090</link>
      <description>SSH can also be a SOCKS proxy as well, so there's another potential hole to close.</description>
      <pubDate>Tue, 26 Mar 2019 22:18:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/48766#M87090</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-26T22:18:11Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/49032#M87091</link>
      <description>&lt;P&gt;RDP sessions to jump hosts in SCADA environments is another use case.&amp;nbsp; I used to configure Client Auth with RSA MFA just for that purpose.&amp;nbsp; Is this no loner possible in R80?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 13:41:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/49032#M87091</guid>
      <dc:creator>Ken_Dickey</dc:creator>
      <dc:date>2019-03-28T13:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/49061#M87092</link>
      <description>&lt;P&gt;Client Auth still exists in R80.x but if memory serves, it can cause weird issues with your policy if you are using layers. We still have Client Auth rules in a couple of policies and I seem to remember testing things on a lab GW and being given some error when I tried to mix layers and Client Auth rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, while the feature is still there, it may interfere with your ability to make use of newer Check Point features.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 15:38:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/49061#M87092</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2019-03-28T15:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/49076#M87093</link>
      <description>Yes, it will. &lt;BR /&gt;Refer to: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115961" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115961&lt;/A&gt;</description>
      <pubDate>Thu, 28 Mar 2019 18:07:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/49076#M87093</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-28T18:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal for linux SSH or Terminal windows</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/58357#M87094</link>
      <description>&lt;P&gt;Going back to "&lt;SPAN&gt;Captive Portal is made for Browser Based Auth only".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;While this is perfectly true, browser communication in the end is just HTTP GET and HTTP POST requests.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If we would to capture a HTTP session between a, let's say Windows supported&amp;nbsp;&lt;/SPAN&gt;browser, and the IDA portal auth, with Fiddler or similar, and then extract and replicate the HTTP post of the authentication itself, and then script that into the linux cli box ?&lt;/P&gt;&lt;P&gt;Would this work ?&lt;/P&gt;&lt;P&gt;Afaik, Captive portal does not require any ongoing resources (keep-alive window open / cookies validation /etc) and once the IP and username have been linked on the FW side, it remains so until the configured session timeout.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 14:43:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-for-linux-SSH-or-Terminal-windows/m-p/58357#M87094</guid>
      <dc:creator>Bogdan_Tatomir1</dc:creator>
      <dc:date>2019-07-16T14:43:40Z</dc:date>
    </item>
  </channel>
</rss>

