<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using RADIUS Groups (RAD_&amp;lt;Group&amp;gt;) to Assign Permissions in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16702#M14136</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using multiple authentications?&lt;/P&gt;&lt;P&gt;I just tested it in a lab.&lt;/P&gt;&lt;P&gt;I&amp;nbsp;got the RAD_group working if i use RADIUS authentication only.&lt;/P&gt;&lt;P&gt;But if i use LDAP for first authentication and RADIUS for second authentication, it does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround i found was to configure the Checkpoint to only authenticate with the RADIUS server and configure the RADIUS sever to do back-end authentication with the active directory.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Mar 2018 23:08:08 GMT</pubDate>
    <dc:creator>Amit_Koren</dc:creator>
    <dc:date>2018-03-08T23:08:08Z</dc:date>
    <item>
      <title>Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16692#M14126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_RemoteAccessVPN_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_RemoteAccessVPN_AdminGuide/137046" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_RemoteAccessVPN_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_RemoteAccessVPN_AdminGuide/137046"&gt;Remote Access VPN R80.10 (Part of Check Point Infinity)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using the above guide to setup RADIUS authentication with a return value that will set my created RAD_Test group like shown here:&lt;/P&gt;&lt;H3 class="" style="color: #333333; background-color: inherit; font-weight: bold; text-decoration: none; font-size: 24px; margin: 0.5cm 0px 0em; padding: 20px 0pt 1px;"&gt;Configuring RADIUS Settings for Users&lt;/H3&gt;&lt;P class="" style="color: #333333; background-color: inherit; font-weight: 300; text-decoration: none; margin: 0.5cm 0cm 3pt; padding: 15px 0pt 0pt;"&gt;To define a RADIUS user group:&lt;/P&gt;&lt;OL class="" style="color: #333333; margin-top: 6pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;In SmartConsole, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Objects&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab, click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;New &amp;gt; More &amp;gt; Users &amp;gt; User Group&lt;/STRONG&gt;.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0cm; padding: 0pt;"&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;New User Group&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Enter the name of the group in this format:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;RAD_&amp;lt;&lt;/STRONG&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;group_name&lt;/EM&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&amp;gt;&lt;/STRONG&gt;.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0cm; padding: 0pt;"&gt;Make sure the group is empty.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;OK&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Install policy.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem is that when I create this RAD_Test user group, I can't use that user group in my security policy to assign permissions to servers/networks. This part is left out of the documentation. I know in the mobile access policy that I can assign services/applications but I need to be able to restrict what the groups can access...not just the service/application they can or cannot use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2017 19:36:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16692#M14126</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2017-12-04T19:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16693#M14127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, I ended up finding it outside of the documentation. Instead of clicking the + in the Source of the policy you have to right click and select 'Add Legacy User Access...'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also cannot drag/drop the User Group from the Objects pane to the right...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2017 19:40:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16693#M14127</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2017-12-04T19:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16694#M14128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can also activate Identity Awareness and use "Access Role" objects to accomplish the same.&lt;/P&gt;&lt;P&gt;If using R80.10 and unified policy the "Legacy User Access" is not supported anymore and you have to stick with "Access Role" objects anyway!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2017 09:16:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16694#M14128</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2017-12-05T09:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16695#M14129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah even though it's in the R80.10 documentation I can't get it to work where it sets the access based on the RADIUS return value...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2017 14:24:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16695#M14129</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2017-12-05T14:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16696#M14130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you share more about your configuration? radius-server-object configuration etc.?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2017 14:31:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16696#M14130</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2017-12-05T14:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16697#M14131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using NPS Microsoft Server and I see it hitting my rules for authentication. I have the Vendor-Specific value set like this as noted in the documentation:&lt;/P&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;To use RADIUS groups, you must define a return attribute in the RADIUS user profile of the RADIUS server. This attribute is returned to the Security Gateway and contains the group name (for example,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: inherit; background-color: inherit; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class=""&gt;RAD_&amp;lt;group to which the RADIUS users belong&amp;gt;&lt;/STRONG&gt;&lt;/SPAN&gt;) to which the users belong.&lt;/P&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;Use these RADIUS attributes (refer to RFC 2865):&lt;/P&gt;&lt;UL class="" style="color: #333333; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;For SecurePlatform - attribute "Class" (25)&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;For other operating systems, including Gaia, Windows, and IPSO- attribute "Vendor-Specific" (26)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have it set to 26 on my NPS, according to the document, but I just noticed in the GuiDBEdit the default is 25 for the&amp;nbsp;&lt;SPAN style="color: #000000; background-color: inherit; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class=""&gt;radius_groups_attr&lt;/STRONG&gt;&lt;/SPAN&gt; setting. I'll udpate that and let you know how that works. Basically, I just followed that document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do have another issues though that I'd like you input. We have office mode setup, for example with 10.10.10.0/24, and when I authenticate I do get an address in that range on my endpoint but I want to be able to get to internal assets at that site that are not within that VPN range. So I need to get to 10.10.100.0/24, 10.10.120.0/24, etc. How do I accomplish this? When I do a route print after connecting to the CP VPN I only get a route for the office mode range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is separate from the RADIUS groups but I noticed that this wouldn't work even if the RADIUS groups worked...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your willingness to help!&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Dec 2017 17:43:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16697#M14131</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2017-12-05T17:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16698#M14132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Heath,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am wondering if you ever got this to work as you intended. One thing to note, the internal networks are setup via the encryption domain. You would need to make sure you have the encryption domain setup appropriately in order to get them into your routes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 21:38:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16698#M14132</guid>
      <dc:creator>Chris_Hoff</dc:creator>
      <dc:date>2018-02-16T21:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16699#M14133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did get the VPN to work but abandoned setting the role based on the RADIUS group as I believe this feature does not work. Not even CP could get this to work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did eventually get the routing figured out. Thanks for the input and for reaching out!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 21:48:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16699#M14133</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2018-02-16T21:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16700#M14134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Regarding the attributes: have you accounting enabled on your radius server objects?&lt;/P&gt;&lt;P&gt;[edit] and btw. did you enable "add_radius_groups" in AdvancedConfiguration of Global Properties?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the office mode setup: how does your encryption domain look like?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Feb 2018 07:05:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16700#M14134</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2018-02-19T07:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16701#M14135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I followed the guidance and we even put on WireShark on the NPS server to see the recieved and return values being sent correctly back to CP but we were never able to see the correct setting of roles on the CP side. We even engaged CP support to take a look and the consensus was "this should work". We tried to play with the return values 25, 26, etc. for the NPS attribute class to no avail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Encryption domain was the entire /24 we wanted to gain access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've abandoned this setup. If you have this working then I'd be interested in anything you could post for future site setups but at this moment we are not actively working on getting this to work. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Feb 2018 15:39:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16701#M14135</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2018-02-19T15:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16702#M14136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using multiple authentications?&lt;/P&gt;&lt;P&gt;I just tested it in a lab.&lt;/P&gt;&lt;P&gt;I&amp;nbsp;got the RAD_group working if i use RADIUS authentication only.&lt;/P&gt;&lt;P&gt;But if i use LDAP for first authentication and RADIUS for second authentication, it does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround i found was to configure the Checkpoint to only authenticate with the RADIUS server and configure the RADIUS sever to do back-end authentication with the active directory.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Mar 2018 23:08:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16702#M14136</guid>
      <dc:creator>Amit_Koren</dc:creator>
      <dc:date>2018-03-08T23:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16703#M14137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm certainly interested in your setup. Could you throw together some screenshots? What version/take are you on? I only had RADUIS setup at the time...I believe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2018 18:11:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16703#M14137</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2018-03-09T18:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16704#M14138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;R77.30 Jumbo take 292. But i did that setup some time ago for a customer with older take.&lt;/P&gt;&lt;P&gt;from the guide:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/14175.htm" title="https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/14175.htm"&gt;VPN for Remote Access Considerations&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="" style="color: #7192e5; background-color: #ffffff; font-weight: bold; text-decoration: none; font-size: 14px; margin: 0.5cm 0cm 3pt; padding: 20pt 0pt 0pt;"&gt;To give access through RADIUS server groups:&lt;/P&gt;&lt;OL class="" style="color: #000000; background-color: #ffffff; margin-top: 6pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;In SmartDashboard, go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Manage &amp;gt; Server and OPSEC Applications&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Servers and OPSEC Applications&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;New &amp;gt; RADIUS&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;The RADIUS Server Properties window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Configure new server properties:&lt;OL class="" style="margin-top: 6pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Name the RADIUS Server object.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;New&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to create a new Host Object.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Host Node&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Enter the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Name&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;IP Address&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;of the new RADIUS Host object, and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;OK&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Service&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;RADIUS&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(on port 1645) or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;NEW-RADIUS&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(on port 1812 service).&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Note&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- The default setting is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;RADIUS&lt;/STRONG&gt;&lt;/STRONG&gt;, however the RADIUS standards group recommends using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;NEW-RADIUS&lt;/STRONG&gt;&lt;/STRONG&gt;, because port 1645 can conflict with the datametrics service running on the same port.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Enter the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Shared Secret&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that you configured on the RADIUS server.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Select the version -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;RADIUS Ver. 1.0 Compatible&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(RFC 2138 compliant) or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;RADIUS Ver. 2.0 Compatible (&lt;/STRONG&gt;&lt;/STRONG&gt;RFC 2865 compliant).&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Select the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Priority,&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;if you use more than one RADIUS Authentication server.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;OK&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Close&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Create a generic* External User Profile:&lt;OL class="" style="margin-top: 6pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Manage &amp;gt; Users and Administrators&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;.&lt;/STRONG&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Users and Administrators&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;New &amp;gt; External User Profile &amp;gt; Match all users&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;External User Profile Properties&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Authentication&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab, select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;RADIUS&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;as the Authentication Scheme.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Select the created RADIUS server (not the node) from the drop-down list.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;OK&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Close&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Define the RADIUS user groups&lt;OL class="" style="margin-top: 6pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Manage &amp;gt; Users &amp;amp; Administrators&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Users and Administrators&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;New &amp;gt; User Group&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Group Properties&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;window opens.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Enter the name of the group in this format:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;RAD_&amp;lt;group to which the RADIUS users belong&amp;gt;&lt;/STRONG&gt;&lt;/STRONG&gt;. Make sure the group is empty.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;OK&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Close&lt;/STRONG&gt;&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Create the required Rule Base rules to allow access to RADIUS users.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Save the changes.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Close all SmartConsole windows.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;On the Security Management Server, use GuiDBedit to change the value of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;add_radius_groups&lt;/STRONG&gt;&lt;/STRONG&gt;&amp;nbsp;attribute from&amp;nbsp;false&amp;nbsp;to&amp;nbsp;true.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Save.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Close GuiDBedit.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Open SmartDashboard.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;Install the policy.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0pt 0pt; padding: 0pt;"&gt;On the RADIUS server, edit the RADIUS users to include a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;class&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;RADIUS attribute on the users&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Return&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;list that corresponds to the user group that they access.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you did step 9 in GuiDBedit otherwise the system will not look for RAD_group.&lt;/P&gt;&lt;P&gt;I kept using class 25. i see no reason to change it.&lt;/P&gt;&lt;P&gt;I would also recommand running Wireshark on the RADIUS server if possible and (enter the preshared key under preferences-&amp;gt;protocol) and see if the RADIUS reply includes a class 25 attribute.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Mar 2018 19:32:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16704#M14138</guid>
      <dc:creator>Amit_Koren</dc:creator>
      <dc:date>2018-03-09T19:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16705#M14139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i have tested the same in Demo LAB , Attaching the configuration snaps including Radius .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Apr 2018 11:19:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16705#M14139</guid>
      <dc:creator>Harshpal_Bhati</dc:creator>
      <dc:date>2018-04-23T11:19:49Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16706#M14140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Guys,&lt;BR /&gt;Anyone got this setup to work using on premise&amp;nbsp;MFA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 04:48:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16706#M14140</guid>
      <dc:creator>Edi_Rozenstein</dc:creator>
      <dc:date>2018-08-01T04:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16707#M14141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Duo uses an on premise proxy/connector to the cloud service. The RADIUS server is basically setup to the Duo proxy which forwards to the actual RADIUS server. If the response is successful then the proxy reaches out to the cloud for the MFA. If that is successful then the RADIUS response is released to the gateway. I would assume it would work similar for totally on-prem solutions like RSA, SafeNet, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have verified the updated instructions from CP for setting up this RADIUS connections with the CP groups does work. I appreciate the response from the original post from everyone that responded.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 14:40:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16707#M14141</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2018-08-01T14:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16708#M14142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only problem with MFA and this has quiet different behaviour from NPS radius server for example in the fact that you cannot make conditions based on AD groups. for instance, if you set RADIUS attributes (class 25 or any other attr) it's basically being sent back for all groups\users associated.&amp;nbsp;Then we need to forward our RADIUS request through the MFA(cause we still need the OTP features from) to another RADIUS server(NPS, RSA etc)which will basically make the conditions based&amp;nbsp;attributes received and AD groups.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 12:41:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16708#M14142</guid>
      <dc:creator>Edi_Rozenstein</dc:creator>
      <dc:date>2018-08-03T12:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16709#M14143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you saying in general with NPS/RADIUS you can't set access for a user in an AD group or you are having a CP problem with using that response to set the access? I can say that we are setting CP permissions based on NPS/RADIUS response through MFA by following the most recent CP documentation utilizing Microsoft NPS, Duo, and CP.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 22:12:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/16709#M14143</guid>
      <dc:creator>Heath</dc:creator>
      <dc:date>2018-08-30T22:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/63710#M14144</link>
      <description>&lt;P&gt;Same concern we have, do you get any success till now ??&amp;nbsp;&lt;BR /&gt;Refer the below Logs:-&amp;nbsp;&lt;BR /&gt;====&lt;BR /&gt;&lt;STRONG&gt;AVP: t=Class(25)&lt;/STRONG&gt; l=46 val=89f1076200000137000102008dac98d30000000000000000…&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 07:00:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/63710#M14144</guid>
      <dc:creator>upmitnetworksec</dc:creator>
      <dc:date>2019-09-26T07:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: Using RADIUS Groups (RAD_&lt;Group&gt;) to Assign Permissions</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/79630#M14145</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;i am configure as the guide of you and after install policy on SMC but remote access vpn fail authen. Can you description step by step configure?&lt;/P&gt;&lt;P&gt;Thank you so much.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 04:40:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-RADIUS-Groups-RAD-lt-Group-gt-to-Assign-Permissions/m-p/79630#M14145</guid>
      <dc:creator>sk25977</dc:creator>
      <dc:date>2020-03-25T04:40:19Z</dc:date>
    </item>
  </channel>
</rss>

