<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/80307#M94072</link>
    <description>&lt;P&gt;I would like to push this Topic - i also do have issues with my RSA connections.We replaced our gateways with new hardware and installed R80.30. I cleared node secret for both agents and downloaded the sdconf.rec file from the rsa server. Then copied the file to /var/ace and also changed rights on that file to 777&lt;/P&gt;&lt;P&gt;Its the same setup as descriped and also the same error messages in&lt;/P&gt;&lt;P&gt;vpnd log "[ACE5] au_sd_ace_io_trigger(au=a00e650): ** USER/PW DENIED BY ACE **"&lt;/P&gt;&lt;P&gt;client log "IKE connection failed, error code=-1000. Reason: Access denied - wrong user name or password"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RSA real time monitor has the following output:&lt;/P&gt;&lt;P&gt;Log Level: ERROR&lt;/P&gt;&lt;P&gt;Activity Key: Principal authentication&lt;/P&gt;&lt;P&gt;Description: User "XXX" attempted to authenticate using authenticator "SecureID_Native". The user belongs to security domain "SystemDomain"&lt;/P&gt;&lt;P&gt;Result: Authentication method failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 31 Mar 2020 12:56:56 GMT</pubDate>
    <dc:creator>DanielAmlung</dc:creator>
    <dc:date>2020-03-31T12:56:56Z</dc:date>
    <item>
      <title>RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9585#M94059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was going through integration of securID RSA Auth. Manager with CheckPoint Cluster (2x5200 NGGW's with 77.30 Gaia on it).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Made one object for checkpoint agent on RSA auth. manager console (with ip of CP cluster). What name i have to put here? There is written to put name of securID agent object in CheckPoint smart dashboard. What is that name (securID server object? or someting else?).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="name of rsa agent object" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/67072_securID server name.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured External user profile with &lt;STRONG&gt;match-all-users&lt;/STRONG&gt; option (is this correct? we need to forward all auth request to RSA Auth. manager. In CheckPoint endpoint security vpn client we have three fields (&lt;STRONG&gt;username, PIN and token&lt;/STRONG&gt;)). We have one passphrase (PIN and token), for one user. Is this only one factor or two? I am confused here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="external user group - generic*" class="image-2 jive-image j-img-original" src="/legacyfs/online/checkpoint/67073_external user group.png" /&gt;&lt;/P&gt;&lt;P&gt;I have configured this external user group to be part of new user group securid_user_grupa:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="external user profile as part of user group" class="image-3 jive-image j-img-original" src="/legacyfs/online/checkpoint/67074_external user group1.png" /&gt;&lt;/P&gt;&lt;P&gt;I have put authentication sheme securid for this external user profile:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="external user profile authentication sheme" class="image-4 jive-image j-img-original" src="/legacyfs/online/checkpoint/67075_external user profile authentication.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have put this user group in remote access community for RAVPN connections:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="remoteaccess community with securid user group in it" class="image-5 jive-image j-img-original" src="/legacyfs/online/checkpoint/67076_remoteaccess community.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have put the same &lt;STRONG&gt;sdconf.rec&lt;/STRONG&gt; file on both gw's in cluster (active and standby) on path &lt;STRONG&gt;/var/ace/&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Installed policy and authentication does not work, &lt;STRONG&gt;zero packets going from CP cluster to RSA auth. manager.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;In vpn debug log files there is error&amp;nbsp;&lt;EM style="color: #1f4e79; background: white; font-size: 12.0pt;"&gt;“Access denied - wrong user name or password”.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;It is like CP tries to authenticate users in internal user database in MGMT server.&lt;/P&gt;&lt;P&gt;I off course put in GW&amp;gt;&amp;gt;&amp;gt;VPNClient&amp;gt;Auth.&amp;gt;&amp;gt;&amp;gt;auth sheme to securID (chose securID server object).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I have to do cpstop/cpstart on gw's to make this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eny suggestion? Maybe I have to change in external user profile type to&lt;STRONG&gt; match by domain?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;IMG alt="external user profile details" class="image-6 jive-image j-img-original" src="/legacyfs/online/checkpoint/67077_external user profile details.png" /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Do i have to check this box omit domain name when auth. users?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Everyone for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2018 10:43:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9585#M94059</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-17T10:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9586#M94060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RSA agent host (CPGW cluster) name doubt from RSA guide:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="rsa CP agent host" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/67078_RSA agent host.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2018 10:52:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9586#M94060</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-17T10:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9587#M94061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anybody to help? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2018 18:32:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9587#M94061</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-17T18:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9588#M94062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Milos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume you went through the RA VPN Admin Guide and still cannot find the solution to work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are quite a few step by step tutorials out there, such as &lt;A href="http://what-when-how.com/check-point-ng-vpn-1firewall-1/radius-advanced-authentication-check-point-2/"&gt;this one&lt;/A&gt;&amp;nbsp;or &lt;A href="http://www.deepnetsecurity.com/download/dualshield/docs/Check%20Point%20VPN%20-%20Implementation%20Guide.pdf"&gt;that one&lt;/A&gt;. Both are quite old, so screenshots and parameters might be looking a bit different with the version you are using.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The flow you have described above seems legit, but I suggest you go over the links I am giving you, just in case. If all the configuration details are good, you might need to start troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I advise you the following troubleshooting flow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Make sure basic VPN auth is working for you. To do so, add a local test user account on your management, put it into the VPN auth scheme and check it can authenticate and establish a RA VPN.&lt;/P&gt;&lt;P&gt;2. Repeat the same test with a RADIUS user.&lt;/P&gt;&lt;P&gt;3. If it is still not working for you, check the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;a. Connectivity to RADIUS auth server from FW. Make sure FW can reach RADIUS server without an issue.&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;b. Run a trace during authentication request between FW and RADIUS server. Make sure RADIUS responds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;c. What is the response? If auth error, look at the RADIUS logs to see why it was rejected.&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;d. How FW is talking to RADIUS? Since it is a cluster, does it use VIP or physical IP? Check that RADIUS server does not reject FW request because of IP mismatch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this does not help, let me know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 07:29:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9588#M94062</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-07-18T07:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9589#M94063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You Valeri,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RAVPN works as a charm with cp user/pass.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do not need radius, customer wants only securID (UDP agent -UDP5500 port uses).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 08:34:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9589#M94063</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-18T08:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9590#M94064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, sorry for that mistake. &lt;BR /&gt;However, the troubleshooting steps stand. I can see you are using&lt;A href="https://community.rsa.com/api/core/v3/contents/107523/data?v=1"&gt; this RSA user guide&lt;/A&gt; to configure your system. Assuming you did the configuration as described there on both sides, look into inter-communication between SecureID and FW cluster. The same recommendations as for step 3 above, just for SecureID and not RADIUS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 09:19:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9590#M94064</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-07-18T09:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9591#M94065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One missundersanding here just to clarify:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In EndPoint VPN client we have the following three fields (when chosen securID HW token-as customer has/wants):&lt;/P&gt;&lt;P&gt;&lt;IMG alt="vpn client fields" class="image-1 jive-image" height="324" src="/legacyfs/online/checkpoint/67095_vpn client fields with hw token securid option in connection.png" width="441" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We configured in Smart Dashboard only one factor: securID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are these&amp;nbsp;all three fields regarding this securID auth sheme chosen in Smart Dashboard?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username&lt;/STRONG&gt; confuses me a lot here&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 09:55:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9591#M94065</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-18T09:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9592#M94066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tokens are assigned to particular users, aren't they? Username still stands.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 11:41:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9592#M94066</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-07-18T11:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9593#M94067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can not remove a PIN option/field from CheckPoint EndPoint VPN client&amp;nbsp; (when securID chosen).&lt;/P&gt;&lt;P&gt;On RSA side (auth.manager/server) a token is stick with a username (user) and after that PIN is connected with token.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Theory should be clear. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for some reason zero packets are sent to RSA auth.manager when RAVPN connection is&lt;/P&gt;&lt;P&gt;made (fwmonitor- no packets captured). And vpn debug logs whos wrong username/password (like that there is chosen in VPNclients&amp;gt;&amp;gt;&amp;gt;auth&amp;gt;&amp;gt;&amp;gt;user/pass). I have chosen secureID as auth sheme, not username pass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A customer on RSA side has configured CheckPoint agent host like:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="RSA side CP agent configuration" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/67101_RSA side.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This hostname I am not sure is it correct (a customer put CheckPoint).&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 12:38:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9593#M94067</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-18T12:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9594#M94068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;10.10.7.1 is VIP od CheckPoint Cluster (2x5200 R77.30 GW's)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 12:43:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9594#M94068</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-18T12:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9595#M94069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, so your problem is that the request is not sent to SecureID server. After timeout you have auth error, of course. Check config on MGMT (Objects, IPs and Auth server details) and GW (sdconf, etc) side and of course, make sure FW is not dropping its own traffic to RSA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are lost, it does not hurt to open a support request.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 12:45:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9595#M94069</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-07-18T12:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9596#M94070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CheckPoint cluster and RSA auth. server have full network visibility (all services are allowed).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I opened a ticked/Service request but with no luck (CP did not conclude what is the catch).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do i need to perform CPSTOP and CPSTART to make this work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jul 2018 12:52:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/9596#M94070</guid>
      <dc:creator>Milos_Jovovic</dc:creator>
      <dc:date>2018-07-18T12:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/69490#M94071</link>
      <description>&lt;P&gt;Hi, you able to resolve the issue?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 02:26:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/69490#M94071</guid>
      <dc:creator>Aldwin_Aquino</dc:creator>
      <dc:date>2019-12-06T02:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/80307#M94072</link>
      <description>&lt;P&gt;I would like to push this Topic - i also do have issues with my RSA connections.We replaced our gateways with new hardware and installed R80.30. I cleared node secret for both agents and downloaded the sdconf.rec file from the rsa server. Then copied the file to /var/ace and also changed rights on that file to 777&lt;/P&gt;&lt;P&gt;Its the same setup as descriped and also the same error messages in&lt;/P&gt;&lt;P&gt;vpnd log "[ACE5] au_sd_ace_io_trigger(au=a00e650): ** USER/PW DENIED BY ACE **"&lt;/P&gt;&lt;P&gt;client log "IKE connection failed, error code=-1000. Reason: Access denied - wrong user name or password"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RSA real time monitor has the following output:&lt;/P&gt;&lt;P&gt;Log Level: ERROR&lt;/P&gt;&lt;P&gt;Activity Key: Principal authentication&lt;/P&gt;&lt;P&gt;Description: User "XXX" attempted to authenticate using authenticator "SecureID_Native". The user belongs to security domain "SystemDomain"&lt;/P&gt;&lt;P&gt;Result: Authentication method failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 12:56:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/80307#M94072</guid>
      <dc:creator>DanielAmlung</dc:creator>
      <dc:date>2020-03-31T12:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: RAVPN Checkpoint securID authentication forwarding to RSA authentication manager</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/80950#M94073</link>
      <description>&lt;P&gt;I found a solution for my problem: as suggested here in the Admin Guide "&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SecurityManagement_AdminGuide/html_frameset.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SecurityManagement_AdminGuide/html_frameset.htm&lt;/A&gt;" add the file "sdopts.rec" to the /var/ace folder. The file should contain the CLIENT_IP=(ip) line, where (&lt;EM&gt;ip) &lt;/EM&gt;is the primary IP address of the Security Gateway, as defined on the ACE/Server. This is the IP address of the interface to which the server is routed.&lt;/P&gt;&lt;P&gt;I did that before and it didnt work - after somedays i found a blog post where its written that you need to a space between = and the IP address - CLIENT_IP= (IP) - This did the trick and authentication now works!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 11:50:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/RAVPN-Checkpoint-securID-authentication-forwarding-to-RSA/m-p/80950#M94073</guid>
      <dc:creator>DanielAmlung</dc:creator>
      <dc:date>2020-04-06T11:50:06Z</dc:date>
    </item>
  </channel>
</rss>

