<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Awareness - RADIUS Accounting mode in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15110#M2561</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;no, userAccountControl is LDAP attribute use to signalize a status of a user account (for example account is lockout, see more detail here: &lt;A class="link-titled" href="http://jackstromberg.com/2013/01/useraccountcontrol-attributeflag-values/" title="http://jackstromberg.com/2013/01/useraccountcontrol-attributeflag-values/"&gt;http://jackstromberg.com/2013/01/useraccountcontrol-attributeflag-values/&lt;/A&gt;). I would expect that when CP firewall receives RADIUS account-request with information about a username, it connects to LDAP database and check whether the user exists within LDAP database. This is usually done by initiating ldap search request towards a LDAP database. If user is found, the firewall also receives additional user attributes like userAccountControl or memberOf attributes, that can be used to further authorize a user. In case a user has lockout flag set, a CP firewall should not allow a user to access a network. That is my understanding. From my lab I know that userAccountControl attribute is ignored by CP firewall (or maybe I have misconfigured something). The same thing happens also when I tried to use Check Point ldap attributes like fw1day (see CP_R80.10_SecurityManagement_AdminGuide.pdf page 195). This attribute should control when a user can access a network. This attribute seems to be also ignored by CP firewall. So, the question is whether this should work or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for any help that you are able to provide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Apr 2018 15:40:16 GMT</pubDate>
    <dc:creator>Zdenek_Rottenbe</dc:creator>
    <dc:date>2018-04-24T15:40:16Z</dc:date>
    <item>
      <title>Identity Awareness - RADIUS Accounting mode</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15108#M2559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I performed testing of Identity Awareness in my lab (RADIUS Accounting mode only) and found some problems I am not able to explain. I would really appreciate any comments to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- userAccountControl LDAP attribute is ignored by IA. If a user is locked out, it is allowed to access a network. Is this correct behaviour or I misconfigured something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- the same thing happen when I tried to authorize user based on fw1user (objectClass) LDAP attributes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- direct mapping of user/machine to group directly on CP firewall by issuing command 'pdp radius groups set -u 26 -a 1 -c 9 -d ","' does not work correctly in case several Vendor-Specific RADIUS AV pairs are included within RADIUS accounting-request. How can I correctly used the command to assign group membership if the following attributes comes to CP firewall within one accounting-request?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco-AVPair = "ssid=ssid01"&lt;BR /&gt;Cisco-AVPair = "vlan-id=30"&lt;BR /&gt;Cisco-AVPair = "nas-location=unspecified"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to assign group membership based on the first AV pair.&lt;/P&gt;&lt;P&gt;Thank you very much for any comments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case somebody is interested, I included all my findings from the lab in attached document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;ZR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2018 19:39:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15108#M2559</guid>
      <dc:creator>Zdenek_Rottenbe</dc:creator>
      <dc:date>2018-04-16T19:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - RADIUS Accounting mode</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15109#M2560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;userAccountControl sent as part of the RADIUS Accounting request?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If it's not, then based on the fact you're attempting to fetch groups from the RADIUS accounting requests, it probably won't even see it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Apr 2018 05:03:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15109#M2560</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-04-21T05:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - RADIUS Accounting mode</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15110#M2561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;no, userAccountControl is LDAP attribute use to signalize a status of a user account (for example account is lockout, see more detail here: &lt;A class="link-titled" href="http://jackstromberg.com/2013/01/useraccountcontrol-attributeflag-values/" title="http://jackstromberg.com/2013/01/useraccountcontrol-attributeflag-values/"&gt;http://jackstromberg.com/2013/01/useraccountcontrol-attributeflag-values/&lt;/A&gt;). I would expect that when CP firewall receives RADIUS account-request with information about a username, it connects to LDAP database and check whether the user exists within LDAP database. This is usually done by initiating ldap search request towards a LDAP database. If user is found, the firewall also receives additional user attributes like userAccountControl or memberOf attributes, that can be used to further authorize a user. In case a user has lockout flag set, a CP firewall should not allow a user to access a network. That is my understanding. From my lab I know that userAccountControl attribute is ignored by CP firewall (or maybe I have misconfigured something). The same thing happens also when I tried to use Check Point ldap attributes like fw1day (see CP_R80.10_SecurityManagement_AdminGuide.pdf page 195). This attribute should control when a user can access a network. This attribute seems to be also ignored by CP firewall. So, the question is whether this should work or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for any help that you are able to provide.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ZR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2018 15:40:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15110#M2561</guid>
      <dc:creator>Zdenek_Rottenbe</dc:creator>
      <dc:date>2018-04-24T15:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - RADIUS Accounting mode</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15111#M2562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The RADIUS piece is used for authentication.&lt;/P&gt;&lt;P&gt;Authorization is, of course, a different matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As near as I can tell, we do not read the&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;userAccountControl attribute.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;However, we can&amp;nbsp;&lt;EM&gt;create&lt;/EM&gt; it when using UserDirectory (with a default setting).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;I suppose it's possible to create a group where the userAccountControl attribute is set a particular way and create a rule denying access to that group.&lt;BR /&gt;However, not sure this is possible.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2018 17:51:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-RADIUS-Accounting-mode/m-p/15111#M2562</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-04-24T17:51:54Z</dc:date>
    </item>
  </channel>
</rss>

