<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote VPN Machine Authentication in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229981#M2981</link>
    <description>&lt;P&gt;But is this branch filter about LDAP branches? My understanding is that the root CA does not have visibility of LDAP branches.&lt;/P&gt;</description>
    <pubDate>Thu, 17 Oct 2024 09:45:17 GMT</pubDate>
    <dc:creator>Daniel_3</dc:creator>
    <dc:date>2024-10-17T09:45:17Z</dc:date>
    <item>
      <title>Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229808#M2973</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am currently implementing remote VPN with machine authentication for our company and our customers and partners.&lt;/P&gt;&lt;P&gt;I configured VPN for ourself, an IT provider, and one of our customers. Each has its own VPN gateway.&lt;/P&gt;&lt;P&gt;For the VPN authentication we use Active Directory. Provider and customer have their own AD, completely seperated.&lt;/P&gt;&lt;P&gt;For the machine certificates we used seperate sub CAs but both are using the same root CA.&lt;/P&gt;&lt;P&gt;I also got a user in our customers AD domain since I am one of the firewall admins and we have to do basic login tests after implementing changes which will affect remote VPN. We also use a seperate test client for that which is connected to our customers AD.&lt;/P&gt;&lt;P&gt;Now the issue is, that that my companys client (which is not part of the customers AD) is also able to login to the customers VPN gateway even though my machine name is not registered in the customers AD. So the machine authentication should fail.&lt;/P&gt;&lt;P&gt;There is no machine identity in the logs and it also shows the different AD name but the login is still successful.&lt;/P&gt;&lt;P&gt;My guess is, that this is possible because both are using the same root CA.&lt;/P&gt;&lt;P&gt;I tried to use the branch filter in the root CA settings in SmartConsole but I could not figure out the correct syntax and there seems to be no configuration examples online.&lt;/P&gt;&lt;P&gt;Did anyone use this filter already and got it to work? Or is there another solution for this issue?&lt;/P&gt;&lt;P&gt;We are using R81.20 on firewalls and the client version is E88.30 and E88.70 (Windows and MacOS clients).&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 19:49:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229808#M2973</guid>
      <dc:creator>Daniel_3</dc:creator>
      <dc:date>2024-10-15T19:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229821#M2974</link>
      <description>&lt;P&gt;Are all the gateways managed by the same management or different ones?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 20:45:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229821#M2974</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-15T20:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229823#M2975</link>
      <description>&lt;P&gt;They are managed by separate management servers.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 20:46:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229823#M2975</guid>
      <dc:creator>Daniel_3</dc:creator>
      <dc:date>2024-10-15T20:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229825#M2976</link>
      <description>&lt;P&gt;I assume in each management server, the external CA is imported.&lt;BR /&gt;It looks like this is where you would specify the relevant DN for that organization's certificates.&lt;BR /&gt;I assume each organization (with a different SubCA) has a unique DN for its certificates.&lt;BR /&gt;Could be wrong about that, as this is not a configuration I've seen before.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28087i1435FDC3F235A28D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 20:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229825#M2976</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-15T20:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229836#M2977</link>
      <description>&lt;P&gt;Yes, that is the exact setting I played around with. But I was not able to figure out the syntax to filter out the machines which are not part of the corresponding domain. Login was either still possible for all clients or for none.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 21:42:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229836#M2977</guid>
      <dc:creator>Daniel_3</dc:creator>
      <dc:date>2024-10-15T21:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229838#M2978</link>
      <description>&lt;P&gt;Have you reviewed the certificates issued by the various sites to see their complete DN?&lt;BR /&gt;What should be in this field is a partial DN, and it should be unique to the site in question.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 21:54:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229838#M2978</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-15T21:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229877#M2979</link>
      <description>&lt;P&gt;I already tried the following:&lt;/P&gt;&lt;P&gt;CN=domain.net&lt;/P&gt;&lt;P&gt;CN=IntermediateCA&lt;/P&gt;&lt;P&gt;CN=IssuingCA&lt;/P&gt;&lt;P&gt;For the two CAs I tried both, the partial DN and the full DN.&lt;/P&gt;&lt;P&gt;But I keep getting the error "Name constraints checking failed." on the client.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2024 08:03:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229877#M2979</guid>
      <dc:creator>Daniel_3</dc:creator>
      <dc:date>2024-10-16T08:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229908#M2980</link>
      <description>&lt;P&gt;Have you tried using ldapsearch on the CLI?&lt;BR /&gt;Perhaps that will provide a bit more visibility into what’s going on (and possibly finding the correct syntax).&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2024 13:25:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229908#M2980</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-16T13:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229981#M2981</link>
      <description>&lt;P&gt;But is this branch filter about LDAP branches? My understanding is that the root CA does not have visibility of LDAP branches.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 09:45:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/229981#M2981</guid>
      <dc:creator>Daniel_3</dc:creator>
      <dc:date>2024-10-17T09:45:17Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230033#M2982</link>
      <description>&lt;P&gt;The CA does not, correct, but the certificates themselves have an LDAP path associated with them.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2024 15:42:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230033#M2982</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-17T15:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230119#M2983</link>
      <description>&lt;P&gt;I tried several variations of the LDAP paths now, but still no luck.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 10:13:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230119#M2983</guid>
      <dc:creator>Daniel_3</dc:creator>
      <dc:date>2024-10-18T10:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230173#M2984</link>
      <description>&lt;P&gt;Unfortunately, the only suggestion I can offer here is to open a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 18:22:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230173#M2984</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-18T18:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN Machine Authentication</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230743#M2985</link>
      <description>&lt;P&gt;Ok, yes I have a TAC case open now. Thanks for you efforts to help!&lt;BR /&gt;I will update this thread when I found a solution.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 20:04:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-VPN-Machine-Authentication/m-p/230743#M2985</guid>
      <dc:creator>Daniel_3</dc:creator>
      <dc:date>2024-10-24T20:04:43Z</dc:date>
    </item>
  </channel>
</rss>

