<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pros and Cons of different 2fa methods for Remote Access VPN in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15987#M12971</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where is the thread below you want feedback to ? Besides, SNX and RA VPN client are two very different RA solutions, see for differences&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk67820&amp;amp;partition=General&amp;amp;product=Endpoint"&gt;sk67820: Check Point &lt;STRONG&gt;Remote&lt;/STRONG&gt; &lt;STRONG&gt;Access&lt;/STRONG&gt; Solutions&lt;/A&gt;&amp;nbsp;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Nov 2018 09:00:07 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2018-11-14T09:00:07Z</dc:date>
    <item>
      <title>Pros and Cons of different 2fa methods for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15986#M12970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need your feedback about the below thread.&lt;/P&gt;&lt;P&gt;Pros and Cons of different 2fa methods for Remote Access VPN for R80.20.&lt;/P&gt;&lt;P&gt;Option1&lt;/P&gt;&lt;P&gt;User Certificate+Domain username password with SNX&lt;/P&gt;&lt;P&gt;Option2&lt;/P&gt;&lt;P&gt;Domain username password + DynamicID (E-mail method) or SecureID with Remote Access VPN client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR,&lt;BR /&gt;Kostas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 16:45:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15986#M12970</guid>
      <dc:creator>Konstantinos_In</dc:creator>
      <dc:date>2018-11-13T16:45:22Z</dc:date>
    </item>
    <item>
      <title>Re: Pros and Cons of different 2fa methods for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15987#M12971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where is the thread below you want feedback to ? Besides, SNX and RA VPN client are two very different RA solutions, see for differences&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk67820&amp;amp;partition=General&amp;amp;product=Endpoint"&gt;sk67820: Check Point &lt;STRONG&gt;Remote&lt;/STRONG&gt; &lt;STRONG&gt;Access&lt;/STRONG&gt; Solutions&lt;/A&gt;&amp;nbsp;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2018 09:00:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15987#M12971</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-11-14T09:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Pros and Cons of different 2fa methods for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15988#M12972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be interesting to compare 2FA between SNX and Remote Access VPN with client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 08:08:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15988#M12972</guid>
      <dc:creator>Konstantinos_In</dc:creator>
      <dc:date>2018-11-15T08:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: Pros and Cons of different 2fa methods for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15989#M12973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would be more interesting to compare the customers needs to SNX and RA VPN capabilities, as 2FA is supported by both...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 11:34:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15989#M12973</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-11-15T11:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Pros and Cons of different 2fa methods for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15990#M12974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Gunther&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The needs are&lt;/P&gt;&lt;P&gt;1)only corporate laptop joined on the domain must be able to connect&lt;/P&gt;&lt;P&gt;2)most secure multifactor combination&lt;/P&gt;&lt;P&gt;3)less user disruption&lt;/P&gt;&lt;P&gt;4)end users are not administrators on their laptops&lt;/P&gt;&lt;P&gt;5)network vpn access must be the same when laptops are connected on the internal Network&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2018 19:46:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15990#M12974</guid>
      <dc:creator>Konstantinos_In</dc:creator>
      <dc:date>2018-11-22T19:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: Pros and Cons of different 2fa methods for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15991#M12975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RA VPN client with Check Point VPN client certificate and AD account/PW (with cache) is a sure thing to work properly, this will also work when you need to use secondary connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tokens as 2fa will never work with secondary connect as there is nothing to be able to cache and you will get a challenge for each other GW the secondary connect tries to contact. We had a case were there were multiple AD servers scattered throughout the network and the client was connecting to all 8 of them, asking the user 8 times for a challenge...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2018 22:23:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Pros-and-Cons-of-different-2fa-methods-for-Remote-Access-VPN/m-p/15991#M12975</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-22T22:23:14Z</dc:date>
    </item>
  </channel>
</rss>

