<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: White Paper - Using RADIUS Authentication for Remote Access VPN in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/White-Paper-Using-RADIUS-Authentication-for-Remote-Access-VPN/m-p/58763#M12253</link>
    <description>&lt;P&gt;I followed this document to the "T" and in R80.30 the generic* user is not being honored by the gateway.&amp;nbsp; Has anyone seen this issue? Is it a known issue?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In prior versions when a user tried to log in, given that the add_radius_groups was set to "true", the user group associated to generic* would be sent to the radius server as part of the login request. Now I am simply getting a "user doesn't belong to remote access community error" and when i hard code the "Authentication" on the gateway to user Radius the user is not able to log in either because the attributes are not being sent along.&amp;nbsp; The same behavior i seen in lab I'm seeing at customer site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LAB SO DOESN"T MATTER IP ADDRESSES ARE NOT SANITIZED:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;19:27:51.323746 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: UDP (17), length: 155) 192.168.50.1.49472 &amp;gt; 192.168.50.55.1812: RADIUS, length: 127&lt;BR /&gt;Access Request (1), id: 0x18, Authenticator: 34025483c7e43062d12e3846302ff6c9&lt;BR /&gt;Username Attribute (1), length: 13, Value: jconcepcion&lt;BR /&gt;0x0000: 6a63 6f6e 6365 7063 696f 6e&lt;BR /&gt;Vendor Specific Attribute (26), length: 24, Value: Vendor: Microsoft (311) [|radius]&lt;BR /&gt;0x0000: 0000 0137 0b12 7cc3 4ddb 54df 1535 4a37&lt;BR /&gt;0x0010: b076 a4 [|radius]&lt;BR /&gt;19:27:51.503001 IP (tos 0x0, ttl 128, id 24824, offset 0, flags [DF], proto: UDP (17), length: 70) 192.168.50.55.1812 &amp;gt; 192.168.50.1.49472: [udp sum ok] RADIUS, length: 42&lt;BR /&gt;Access Reject (3), id: 0x18, Authenticator: 3afb744dbb91ca21d1c38dff25e5af66&lt;BR /&gt;Vendor Specific Attribute (26), length: 22, Value: Vendor: Microsoft (311)&lt;BR /&gt;Vendor Attribute: 2, Length: 14, Value: .E=649 R=0 V=3&lt;BR /&gt;0x0000: 0000 0137 0210 0045 3d36 3439 2052 3d30&lt;BR /&gt;0x0010: 2056 3d33&lt;BR /&gt;19:31:15.985985 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: UDP (17), length: 91) 192.168.50.1.35094 &amp;gt; 192.168.50.55.1812: RADIUS, length: 63&lt;BR /&gt;Access Request (1), id: 0x19, Authenticator: 76309a24680ac47f73e0cfb13c9450fd&lt;BR /&gt;Username Attribute (1), length: 13, Value: jconcepcion&lt;BR /&gt;0x0000: 6a63 6f6e 6365 7063 696f 6e&lt;BR /&gt;Password Attribute (2), length: 18, Value:&lt;BR /&gt;0x0000: 8a11 5436 8b6f 29c1 c75c 13cb c26f 63d4&lt;BR /&gt;Service Type Attribute (6), length: 6, Value: [|radius]&lt;BR /&gt;0x0000: 00 [|radius]&lt;BR /&gt;19:31:15.989658 IP (tos 0x0, ttl 128, id 6831, offset 0, flags [DF], proto: UDP (17), length: 48) 192.168.50.55.1812 &amp;gt; 192.168.50.1.35094: [udp sum ok] RADIUS, length: 20&lt;BR /&gt;Access Reject (3), id: 0x19, Authenticator: 1c66bf4f6ab54a90323b40cd0a474f9d&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jul 2019 02:05:50 GMT</pubDate>
    <dc:creator>Juan_Concepcion</dc:creator>
    <dc:date>2019-07-23T02:05:50Z</dc:date>
    <item>
      <title>White Paper - Using RADIUS Authentication for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/White-Paper-Using-RADIUS-Authentication-for-Remote-Access-VPN/m-p/53659#M12252</link>
      <description>&lt;H3&gt;Author&lt;/H3&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/4095"&gt;@Samuel_Shiflett&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Abstract:&lt;/H3&gt;
&lt;P&gt;This guide will show step by step instructions for configuring Remote Access VPN to utilize RADIUS authentication. There is also an appendix that includes instructions for integrating DUO MFA with a Check Point Remote Access Gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the full list of White Papers, &lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603" target="_blank"&gt;go here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 13:00:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/White-Paper-Using-RADIUS-Authentication-for-Remote-Access-VPN/m-p/53659#M12252</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-07-08T13:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Using RADIUS Authentication for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/White-Paper-Using-RADIUS-Authentication-for-Remote-Access-VPN/m-p/58763#M12253</link>
      <description>&lt;P&gt;I followed this document to the "T" and in R80.30 the generic* user is not being honored by the gateway.&amp;nbsp; Has anyone seen this issue? Is it a known issue?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In prior versions when a user tried to log in, given that the add_radius_groups was set to "true", the user group associated to generic* would be sent to the radius server as part of the login request. Now I am simply getting a "user doesn't belong to remote access community error" and when i hard code the "Authentication" on the gateway to user Radius the user is not able to log in either because the attributes are not being sent along.&amp;nbsp; The same behavior i seen in lab I'm seeing at customer site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LAB SO DOESN"T MATTER IP ADDRESSES ARE NOT SANITIZED:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;19:27:51.323746 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: UDP (17), length: 155) 192.168.50.1.49472 &amp;gt; 192.168.50.55.1812: RADIUS, length: 127&lt;BR /&gt;Access Request (1), id: 0x18, Authenticator: 34025483c7e43062d12e3846302ff6c9&lt;BR /&gt;Username Attribute (1), length: 13, Value: jconcepcion&lt;BR /&gt;0x0000: 6a63 6f6e 6365 7063 696f 6e&lt;BR /&gt;Vendor Specific Attribute (26), length: 24, Value: Vendor: Microsoft (311) [|radius]&lt;BR /&gt;0x0000: 0000 0137 0b12 7cc3 4ddb 54df 1535 4a37&lt;BR /&gt;0x0010: b076 a4 [|radius]&lt;BR /&gt;19:27:51.503001 IP (tos 0x0, ttl 128, id 24824, offset 0, flags [DF], proto: UDP (17), length: 70) 192.168.50.55.1812 &amp;gt; 192.168.50.1.49472: [udp sum ok] RADIUS, length: 42&lt;BR /&gt;Access Reject (3), id: 0x18, Authenticator: 3afb744dbb91ca21d1c38dff25e5af66&lt;BR /&gt;Vendor Specific Attribute (26), length: 22, Value: Vendor: Microsoft (311)&lt;BR /&gt;Vendor Attribute: 2, Length: 14, Value: .E=649 R=0 V=3&lt;BR /&gt;0x0000: 0000 0137 0210 0045 3d36 3439 2052 3d30&lt;BR /&gt;0x0010: 2056 3d33&lt;BR /&gt;19:31:15.985985 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: UDP (17), length: 91) 192.168.50.1.35094 &amp;gt; 192.168.50.55.1812: RADIUS, length: 63&lt;BR /&gt;Access Request (1), id: 0x19, Authenticator: 76309a24680ac47f73e0cfb13c9450fd&lt;BR /&gt;Username Attribute (1), length: 13, Value: jconcepcion&lt;BR /&gt;0x0000: 6a63 6f6e 6365 7063 696f 6e&lt;BR /&gt;Password Attribute (2), length: 18, Value:&lt;BR /&gt;0x0000: 8a11 5436 8b6f 29c1 c75c 13cb c26f 63d4&lt;BR /&gt;Service Type Attribute (6), length: 6, Value: [|radius]&lt;BR /&gt;0x0000: 00 [|radius]&lt;BR /&gt;19:31:15.989658 IP (tos 0x0, ttl 128, id 6831, offset 0, flags [DF], proto: UDP (17), length: 48) 192.168.50.55.1812 &amp;gt; 192.168.50.1.35094: [udp sum ok] RADIUS, length: 20&lt;BR /&gt;Access Reject (3), id: 0x19, Authenticator: 1c66bf4f6ab54a90323b40cd0a474f9d&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2019 02:05:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/White-Paper-Using-RADIUS-Authentication-for-Remote-Access-VPN/m-p/58763#M12253</guid>
      <dc:creator>Juan_Concepcion</dc:creator>
      <dc:date>2019-07-23T02:05:50Z</dc:date>
    </item>
  </channel>
</rss>

