<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Log in fails - Unknown User in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Log-in-fails-Unknown-User/m-p/265014#M1393</link>
    <description>&lt;P&gt;We encountered a mystery this week.&amp;nbsp; Suddenly, clients that were working before could not log in.&amp;nbsp; There no faults on the VPN servers.&amp;nbsp; The client was getting a "negotiation failed" message.&amp;nbsp; Retries and reboots failed.&lt;BR /&gt;&lt;BR /&gt;When you look at the VPN logs using this search string:&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;action:"Failed Log In"&lt;BR /&gt;&lt;BR /&gt;You will find fails and the Mobile Access Details will have:&lt;BR /&gt;&lt;BR /&gt;Reason - Unknown user.&lt;BR /&gt;&lt;BR /&gt;Cause:&amp;nbsp; &lt;BR /&gt;Dependencies: &lt;BR /&gt;1) The client is set to use Default Browser for authentication.&amp;nbsp; That appears to be the workaround by default for 89.00 to fix the issue with Win 11 2H25.&amp;nbsp; Or the browser has been set per&amp;nbsp;sk180395.&lt;BR /&gt;2) The VPN is using SAML authentication&lt;BR /&gt;&lt;BR /&gt;Either by design or user response, when asked if they wish to allow Network Access when they open the VPN site, they clicked Block.&lt;BR /&gt;&lt;BR /&gt;Resolution:&lt;BR /&gt;1)&amp;nbsp; Extreme case, delete cookies and select Allow the next time you are challenged.&lt;BR /&gt;2)&amp;nbsp; For Edge, use this link to get to the setting and add the vpn urls to the allowed sites (something similar is used for Chrome.)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;edge://settings/privacy/sitePermissions/allPermissions/localNetworkAccess&lt;BR /&gt;3)&amp;nbsp; (Untested at this point YMMV) - For corporate sites with GPO management, add it as part of the policy.&amp;nbsp; The key is:&lt;BR /&gt;&lt;BR /&gt;[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\LocalNetworkAccessAllowedForUrls]&lt;BR /&gt;"1"="[*.]myvpn.mycompany.dotwhatever&lt;BR /&gt;&lt;BR /&gt;Caution is required.&amp;nbsp; The index number, in this case, "1" will overwrite whatever is already "1".&amp;nbsp; Therefore, they need to correctly index that string with what they may already be doing.&amp;nbsp; The above is .reg file format.&amp;nbsp; You can make a .reg file to apply that with the reg header&lt;BR /&gt;&lt;BR /&gt;Windows Registry Editor Version 5.00&lt;BR /&gt;&lt;BR /&gt;If you are unsure of the index numbers, you can ask Grok to write a script to test for the values used and select the next.&amp;nbsp; Grok offered this yesterday for Powershell and I have NOT tested or tried it.&amp;nbsp; Buyer beware.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-powershell"&gt;# Define the registry path and new URL(s) to add : From Grok on request
$regPath = "HKLM:\SOFTWARE\Policies\Microsoft\Edge\LocalNetworkAccessAllowedForUrls"
$newUrls = @(
    "https://your-vpn-site.example.com"  # Add more here if needed, one per line
    # "[*.]subdomain.example.com"
)

# Create the key if it doesn't exist
if (!(Test-Path $regPath)) {
    New-Item -Path $regPath -Force | Out-Null
}

# Get current values (sorted by name/index)
$existing = Get-ItemProperty -Path $regPath -ErrorAction SilentlyContinue | 
            Get-Member -MemberType NoteProperty | 
            Where-Object { $_.Name -match '^\d+$' } | 
            Sort-Object { [int]$_.Name }

# Determine the next starting index
$nextIndex = if ($existing) { [int]($existing[-1].Name) + 1 } else { 1 }

# Add new URLs starting from nextIndex
for ($i = 0; $i -lt $newUrls.Count; $i++) {
    $index = $nextIndex + $i
    Set-ItemProperty -Path $regPath -Name $index -Value $newUrls[$i] -Type String
}

Write-Output "Added $($newUrls.Count) URL(s) starting at index $nextIndex."&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;H/T to my co-worker Sunil Shivnani for finding the root cause.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Dec 2025 16:03:15 GMT</pubDate>
    <dc:creator>George_Ellis</dc:creator>
    <dc:date>2025-12-10T16:03:15Z</dc:date>
    <item>
      <title>VPN Log in fails - Unknown User</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Log-in-fails-Unknown-User/m-p/265014#M1393</link>
      <description>&lt;P&gt;We encountered a mystery this week.&amp;nbsp; Suddenly, clients that were working before could not log in.&amp;nbsp; There no faults on the VPN servers.&amp;nbsp; The client was getting a "negotiation failed" message.&amp;nbsp; Retries and reboots failed.&lt;BR /&gt;&lt;BR /&gt;When you look at the VPN logs using this search string:&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;action:"Failed Log In"&lt;BR /&gt;&lt;BR /&gt;You will find fails and the Mobile Access Details will have:&lt;BR /&gt;&lt;BR /&gt;Reason - Unknown user.&lt;BR /&gt;&lt;BR /&gt;Cause:&amp;nbsp; &lt;BR /&gt;Dependencies: &lt;BR /&gt;1) The client is set to use Default Browser for authentication.&amp;nbsp; That appears to be the workaround by default for 89.00 to fix the issue with Win 11 2H25.&amp;nbsp; Or the browser has been set per&amp;nbsp;sk180395.&lt;BR /&gt;2) The VPN is using SAML authentication&lt;BR /&gt;&lt;BR /&gt;Either by design or user response, when asked if they wish to allow Network Access when they open the VPN site, they clicked Block.&lt;BR /&gt;&lt;BR /&gt;Resolution:&lt;BR /&gt;1)&amp;nbsp; Extreme case, delete cookies and select Allow the next time you are challenged.&lt;BR /&gt;2)&amp;nbsp; For Edge, use this link to get to the setting and add the vpn urls to the allowed sites (something similar is used for Chrome.)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;edge://settings/privacy/sitePermissions/allPermissions/localNetworkAccess&lt;BR /&gt;3)&amp;nbsp; (Untested at this point YMMV) - For corporate sites with GPO management, add it as part of the policy.&amp;nbsp; The key is:&lt;BR /&gt;&lt;BR /&gt;[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\LocalNetworkAccessAllowedForUrls]&lt;BR /&gt;"1"="[*.]myvpn.mycompany.dotwhatever&lt;BR /&gt;&lt;BR /&gt;Caution is required.&amp;nbsp; The index number, in this case, "1" will overwrite whatever is already "1".&amp;nbsp; Therefore, they need to correctly index that string with what they may already be doing.&amp;nbsp; The above is .reg file format.&amp;nbsp; You can make a .reg file to apply that with the reg header&lt;BR /&gt;&lt;BR /&gt;Windows Registry Editor Version 5.00&lt;BR /&gt;&lt;BR /&gt;If you are unsure of the index numbers, you can ask Grok to write a script to test for the values used and select the next.&amp;nbsp; Grok offered this yesterday for Powershell and I have NOT tested or tried it.&amp;nbsp; Buyer beware.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-powershell"&gt;# Define the registry path and new URL(s) to add : From Grok on request
$regPath = "HKLM:\SOFTWARE\Policies\Microsoft\Edge\LocalNetworkAccessAllowedForUrls"
$newUrls = @(
    "https://your-vpn-site.example.com"  # Add more here if needed, one per line
    # "[*.]subdomain.example.com"
)

# Create the key if it doesn't exist
if (!(Test-Path $regPath)) {
    New-Item -Path $regPath -Force | Out-Null
}

# Get current values (sorted by name/index)
$existing = Get-ItemProperty -Path $regPath -ErrorAction SilentlyContinue | 
            Get-Member -MemberType NoteProperty | 
            Where-Object { $_.Name -match '^\d+$' } | 
            Sort-Object { [int]$_.Name }

# Determine the next starting index
$nextIndex = if ($existing) { [int]($existing[-1].Name) + 1 } else { 1 }

# Add new URLs starting from nextIndex
for ($i = 0; $i -lt $newUrls.Count; $i++) {
    $index = $nextIndex + $i
    Set-ItemProperty -Path $regPath -Name $index -Value $newUrls[$i] -Type String
}

Write-Output "Added $($newUrls.Count) URL(s) starting at index $nextIndex."&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;H/T to my co-worker Sunil Shivnani for finding the root cause.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 16:03:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Log-in-fails-Unknown-User/m-p/265014#M1393</guid>
      <dc:creator>George_Ellis</dc:creator>
      <dc:date>2025-12-10T16:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Log in fails - Unknown User</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Log-in-fails-Unknown-User/m-p/265015#M1394</link>
      <description>&lt;P&gt;Very helpful&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1178"&gt;@George_Ellis&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 16:38:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Log-in-fails-Unknown-User/m-p/265015#M1394</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-10T16:38:09Z</dc:date>
    </item>
  </channel>
</rss>

