<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius User - Group Assign Issue in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259685#M1593</link>
    <description>&lt;P&gt;You may also need to have Identity Awareness enabled and for "Remote Access":&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31718i94F5899AD82174FF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31717i4188C6CB3C2B975C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can run VPN debug (and IKE debug) to see what response is coming back (which you already see in the packet capture), but also how the VPN daemon is processing it. &amp;nbsp;If there's a processing error, you should see it there.&lt;/P&gt;
&lt;P&gt;Look for the text "CPSC_RADIUS_AUTHENTICATED", and just above that will be the user group mapping messages. &amp;nbsp;You can also search the debug for "RAD_" and any occurrences of your group name. &amp;nbsp;The RADIUS group messages will also be identified with the text "&lt;SPAN&gt;radius_update_user_groups".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;TAC would still like to know what's going on in case something is still not right. &amp;nbsp;Always worth a call.&lt;/P&gt;
&lt;P&gt;When you do get the mappings fixed, you'll want to use Access Role objects to control policy access through the rulebase, and &lt;STRONG&gt;not&lt;/STRONG&gt; use the user group in the Source column (Legacy User Access). &amp;nbsp;You will add the locally-defined user groups (RAD_foo) into the Access Role. &amp;nbsp;With Access Roles, you also don't need to use the RemoteAccess community in the VPN column. &amp;nbsp;Access Roles will allow you to map the same user with any identity source (Remote Access, Identity Collector, whatever) and wherever the user is connected; highly flexible. &amp;nbsp;You can use them anywhere you want/need in your policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Oct 2025 20:20:27 GMT</pubDate>
    <dc:creator>Duane_Toler</dc:creator>
    <dc:date>2025-10-10T20:20:27Z</dc:date>
    <item>
      <title>Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259578#M1586</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;We’re facing an issue with &lt;STRONG&gt;RADIUS group mapping&lt;/STRONG&gt; on a Check Point Remote Access VPN (R81.20).&lt;BR /&gt;Users can authenticate successfully through RADIUS, connect via VPN, and receive an Office Mode IP —&lt;BR /&gt;but &lt;STRONG&gt;they’re not being assigned to any group&lt;/STRONG&gt;, which causes our access policy rules (based on user groups) not to match.&lt;/P&gt;&lt;P&gt;Here’s what we’ve done and verified so far:&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Check Point &lt;STRONG&gt;R81.20&lt;/STRONG&gt; Gateway&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Remote Access VPN (Endpoint Security Client)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;RADIUS authentication via &lt;STRONG&gt;third-party MFA platform&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Authentication protocol: &lt;STRONG&gt;PAP&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Attributes tested: &lt;STRONG&gt;11 (Filter-ID)&lt;/STRONG&gt;, &lt;STRONG&gt;25 (Class)&lt;/STRONG&gt;, &lt;STRONG&gt;26 (Vendor-Specific)&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;STRONG&gt;Configuration Steps&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;&lt;STRONG&gt;RADIUS Server Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Added the RADIUS server under &lt;EM&gt;Servers and OPSEC Applications → New RADIUS Server&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Set protocol = &lt;STRONG&gt;PAP&lt;/STRONG&gt;, version = 2.0&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Defined shared secret matching the MFA server&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;VPN Gateway Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;RADIUS selected as the authentication method under &lt;EM&gt;VPN Clients → Authentication&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;“Allow newer clients that support multiple login options” and “Ask user for password (auto-answer first challenge)” options are checked&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;External User Profile&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Created a &lt;STRONG&gt;&amp;nbsp;External User Profile&lt;/STRONG&gt; with “Match all users”&amp;nbsp; (profile name generic*)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Authentication scheme: &lt;STRONG&gt;RADIUS&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Linked to the same RADIUS server object&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Group Mapping Setup&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Created a user group named RAD_Test (empty group as required)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Verified that the group name matches the attribute value sent by RADIUS&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;GuiDBedit Settings&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Under Global Properties → Radius, confirmed the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;add_radius_groups = true&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;radius_groups_attr = 11&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Also tested with attributes 25 and 26, no change.&lt;BR /&gt;Policy reinstalled after every modification.&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;Observed Behavior&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Authentication succeeds, user connects normally.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Office Mode IP assigned correctly.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In the logs, user appears authenticated but &lt;STRONG&gt;no group membership&lt;/STRONG&gt; is listed.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Access Control rules based on RADIUS group membership never match.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We’ve captured RADIUS packets and verified that the MFA server &lt;STRONG&gt;does send back the attribute&lt;/STRONG&gt; (Filter-ID/Class/VSA) with the expected value.&lt;BR /&gt;Still, Check Point does not map the user to any RAD_ group.&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;Question&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;Has anyone successfully made &lt;STRONG&gt;RADIUS group assignment&lt;/STRONG&gt; work for Remote Access VPN users on &lt;STRONG&gt;R81.20&lt;/STRONG&gt;?&lt;BR /&gt;Is there any hidden setting, known limitation, or workaround ?&lt;/P&gt;&lt;P&gt;Any insights, working examples, or references would be greatly appreciated&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Oct 2025 19:23:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259578#M1586</guid>
      <dc:creator>Numan135363</dc:creator>
      <dc:date>2025-10-09T19:23:06Z</dc:date>
    </item>
    <item>
      <title>Re: Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259581#M1587</link>
      <description>&lt;P&gt;You might need to change the RADIUS attribute we're looking at for the RADIUS groups.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk115875" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk115875&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Oct 2025 21:36:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259581#M1587</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-10-09T21:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259589#M1588</link>
      <description>&lt;P&gt;Apart from sk Phoneboy gave, try running pdp minitor user command as well.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 01:30:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259589#M1588</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-10T01:30:46Z</dc:date>
    </item>
    <item>
      <title>Re: Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259628#M1589</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;We tried class and VSA but still doesn't work .&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-10-10 at 11.56.41.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31705i731F13D4DD540E3F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-10-10 at 11.56.41.png" alt="Screenshot 2025-10-10 at 11.56.41.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-10-10 at 11.46.45.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31706iC325273842974832/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-10-10 at 11.46.45.png" alt="Screenshot 2025-10-10 at 11.46.45.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; This is what radius reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-10-10 at 11.33.56.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31707i132EA2191D606B0F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-10-10 at 11.33.56.png" alt="Screenshot 2025-10-10 at 11.33.56.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-10-10 at 11.33.33.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31708i1AAE239AE1FBA5E6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2025-10-10 at 11.33.33.png" alt="Screenshot 2025-10-10 at 11.33.33.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 11:26:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259628#M1589</guid>
      <dc:creator>Numan135363</dc:creator>
      <dc:date>2025-10-10T11:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259676#M1592</link>
      <description>&lt;P&gt;I would get TAC involved here.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 19:37:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259676#M1592</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-10-10T19:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259685#M1593</link>
      <description>&lt;P&gt;You may also need to have Identity Awareness enabled and for "Remote Access":&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31718i94F5899AD82174FF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31717i4188C6CB3C2B975C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can run VPN debug (and IKE debug) to see what response is coming back (which you already see in the packet capture), but also how the VPN daemon is processing it. &amp;nbsp;If there's a processing error, you should see it there.&lt;/P&gt;
&lt;P&gt;Look for the text "CPSC_RADIUS_AUTHENTICATED", and just above that will be the user group mapping messages. &amp;nbsp;You can also search the debug for "RAD_" and any occurrences of your group name. &amp;nbsp;The RADIUS group messages will also be identified with the text "&lt;SPAN&gt;radius_update_user_groups".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;TAC would still like to know what's going on in case something is still not right. &amp;nbsp;Always worth a call.&lt;/P&gt;
&lt;P&gt;When you do get the mappings fixed, you'll want to use Access Role objects to control policy access through the rulebase, and &lt;STRONG&gt;not&lt;/STRONG&gt; use the user group in the Source column (Legacy User Access). &amp;nbsp;You will add the locally-defined user groups (RAD_foo) into the Access Role. &amp;nbsp;With Access Roles, you also don't need to use the RemoteAccess community in the VPN column. &amp;nbsp;Access Roles will allow you to map the same user with any identity source (Remote Access, Identity Collector, whatever) and wherever the user is connected; highly flexible. &amp;nbsp;You can use them anywhere you want/need in your policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Oct 2025 20:20:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259685#M1593</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-10-10T20:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259713#M1594</link>
      <description>&lt;P&gt;Thank you Duane&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It solved.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2025 16:01:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259713#M1594</guid>
      <dc:creator>Numan135363</dc:creator>
      <dc:date>2025-10-11T16:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Radius User - Group Assign Issue</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259714#M1595</link>
      <description>&lt;P&gt;Great!&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2025 17:01:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-User-Group-Assign-Issue/m-p/259714#M1595</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-11T17:01:59Z</dc:date>
    </item>
  </channel>
</rss>

