<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Bypassing MFA when authenticating with vpn certificates in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242691#M2339</link>
    <description>&lt;P&gt;I know last time I worked with customer for cert auth for vpn clients, we ended up working with TAC. Its probably your best bet at this point.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Fri, 28 Feb 2025 15:19:51 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-02-28T15:19:51Z</dc:date>
    <item>
      <title>Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242629#M2335</link>
      <description>&lt;P&gt;Hello team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We recently found that using strongswan with vpn certificate and MFA enabled, we can bypass MFA.&lt;/P&gt;&lt;P&gt;Is there a way to prevent connections with strongswan clients ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All versions are concerned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 08:18:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242629#M2335</guid>
      <dc:creator>mistercinux</dc:creator>
      <dc:date>2025-02-28T08:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242630#M2336</link>
      <description>&lt;P&gt;Do not give them certificates and rewoke the ones already issued!&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 08:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242630#M2336</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-02-28T08:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242632#M2337</link>
      <description>&lt;P&gt;Hello G_W_Albrecht&lt;/P&gt;&lt;P&gt;All our users were using certificate authentication, and since we are implementing additional MFA, we configured the gateway to do a push after certificate authentication. if we revoke all certificates we just cut the vpn access of all the remote users.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we are looking for is a way to prevent non checkpoint clients to connect to the security gateway.&lt;/P&gt;&lt;P&gt;What are the best practices authenticating users for remote access ? I always thought that certificate auth was the best.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will the usage of CAPI prevent such 3rd party vpn clients to authenticate ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 08:28:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242632#M2337</guid>
      <dc:creator>mistercinux</dc:creator>
      <dc:date>2025-02-28T08:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242642#M2338</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sorry, maybe i did mix up something - with our CheckPoint deployment, each user gets his own certificate, so what i mentioned above was based on that configuration. Here &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/strongSwan-Client-Support.htm?Highlight=swan" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/strongSwan-Client-Support.htm?Highlight=swan&lt;/A&gt; you find what has to be enabled on CP GW to enable StrongSwan access, so you can disable access by disabling these - e.g. if StrongSwan connects using &lt;CODE&gt;aes256-sha1-modp1024&lt;/CODE&gt; you can disable it on GW.&lt;/P&gt;
&lt;P&gt;I would suggest to open SR# with CP TAC to get suggestios how to achieve this in a simple way !&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 11:02:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242642#M2338</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-02-28T11:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242691#M2339</link>
      <description>&lt;P&gt;I know last time I worked with customer for cert auth for vpn clients, we ended up working with TAC. Its probably your best bet at this point.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 15:19:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242691#M2339</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-28T15:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242692#M2340</link>
      <description>&lt;P&gt;Hi the_Rock,&lt;/P&gt;&lt;P&gt;Thank you for your feedback.&amp;nbsp;&lt;BR /&gt;We already worked with tac and they said that it's working as designed.&lt;BR /&gt;We'll may stop working with certificats if we do not find a way to prevent strongswan clients to bypass mfa :-(.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 15:25:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242692#M2340</guid>
      <dc:creator>mistercinux</dc:creator>
      <dc:date>2025-02-28T15:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242695#M2341</link>
      <description>&lt;P&gt;I cant say for sure if its expected or not, but I have a gut feeling there must be some way to make this work. We can connect offline if you are allowed to do remote and check it out.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 15:30:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242695#M2341</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-28T15:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242700#M2342</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your answer. We'll try it and update the case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 15:48:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242700#M2342</guid>
      <dc:creator>mistercinux</dc:creator>
      <dc:date>2025-02-28T15:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242828#M2343</link>
      <description>&lt;P&gt;There's an option to allow only certain VPN clients to connect in SmartConsole (specifically in Global Properties), but not sure how Strongswan is treated here as it is not explicitly listed.&lt;/P&gt;
&lt;P&gt;In any case, you can configure SCV to do some Windows-specific checks.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/Secure-Configuration-Verification.htm?tocpath=Secure%20Configuration%20Verification%7C_____0#Secure_Configuration_Verification" target="_blank" rel="noopener noreferrer"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/C...&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;If you need to support Mac clients, you will need to&amp;nbsp;enable macOS support and configure a specific policy with:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182226" target="_blank" rel="noopener noreferrer"&gt;https://support.checkpoint.com/results/sk/sk182226&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;If you require SCV, clients that don't support it (like Strongswan) will fail unless you've enabled the option to allow clients without SCV support.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 16:08:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242828#M2343</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-03T16:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Bypassing MFA when authenticating with vpn certificates</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242836#M2344</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you. We'll test this configuration and update this post as soon as we have the results.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Mar 2025 16:23:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Bypassing-MFA-when-authenticating-with-vpn-certificates/m-p/242836#M2344</guid>
      <dc:creator>mistercinux</dc:creator>
      <dc:date>2025-03-03T16:23:12Z</dc:date>
    </item>
  </channel>
</rss>

