<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius MFA NPS extension in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220546#M3573</link>
    <description>&lt;P&gt;We have the Same issue with Gaia.&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220510#M36748" target="_blank" rel="noopener"&gt;Re: Blast-RADIUS - CVE-2024-3596 - Check Point CheckMates&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;there might be a workaround on the windows site.&lt;/P&gt;&lt;DIV class=""&gt;Configure&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;requiremsgauth&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for remote servers&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;This configuration enables NPS Proxy to drop potentially vulnerable response messages without the&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Message-Authenticator&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;attribute.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/topic/kb5040268-how-to-manage-the-access-request-packets-attack-vulnerability-associated-with-cve-2024-3596-a0e2f0b1-f200-4a7b-844f-48d1d5ab9e66" target="_blank" rel="noopener"&gt;KB5040268: How to manage the Access-Request packets attack vulnerability associated with CVE-2024-3596 - Microsoft Support&lt;/A&gt;&lt;BR /&gt;but I 'm no windows admin.&lt;BR /&gt;Regards&lt;BR /&gt;Peter&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Fri, 12 Jul 2024 13:42:53 GMT</pubDate>
    <dc:creator>JP_Rex</dc:creator>
    <dc:date>2024-07-12T13:42:53Z</dc:date>
    <item>
      <title>Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220400#M3565</link>
      <description>&lt;P&gt;I have&amp;nbsp;&lt;SPAN&gt;Quantum Spark 1530 configured with Radius to a Windows Server.&lt;BR /&gt;Firewall is running R81.10.10.&lt;BR /&gt;MFA NPS extension have been upgraded to latest version on NPS server.&lt;BR /&gt;New certificate for NPS have been created and old have been deleted.&lt;BR /&gt;Internal firewall certificates have been reinitialized.&lt;BR /&gt;Time and date on NPS server has been verified.&lt;BR /&gt;Radius timeout have been set to 30 sec.&lt;BR /&gt;NPS server have been rebooted&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When trying to connect with VPN to the firewall, the client prompts the user with incorrect username or password and the user receives 3 text messages from Microsoft with passcodes. All different codes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It seems to me that the firewall sends multiple Radius requests.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any suggestions?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 13:15:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220400#M3565</guid>
      <dc:creator>toha</dc:creator>
      <dc:date>2024-07-11T13:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220409#M3566</link>
      <description>&lt;P&gt;I had the same problem.&lt;/P&gt;&lt;P&gt;The temporary solution was to uninstall the Windows July 9, 2024-KB5040437 update from the NPS server.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 15:05:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220409#M3566</guid>
      <dc:creator>User88083582</dc:creator>
      <dc:date>2024-07-11T15:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220426#M3567</link>
      <description>&lt;P&gt;Note that we only support PAP authentication per:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk166359" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk166359&lt;/A&gt;&lt;BR /&gt;I'd also use tcpdump to capture the traffic to/from the RADIUS server to see if you can find any clues.&lt;BR /&gt;Otherwise, I suggest a TAC case.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 17:16:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220426#M3567</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-11T17:16:08Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220443#M3568</link>
      <description>&lt;P&gt;I had the same problem with the same configuration (CHKPT &amp;lt;- RADIUS -&amp;gt; NPS with MFA NPS extension).&lt;/P&gt;&lt;P&gt;The temporary solution was to uninstall the Windows July 9, 2024-KB5040437 update from the NPS server.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 18:37:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220443#M3568</guid>
      <dc:creator>User88083582</dc:creator>
      <dc:date>2024-07-11T18:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220485#M3569</link>
      <description>&lt;P&gt;This setup has worked for several years&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 09:18:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220485#M3569</guid>
      <dc:creator>toha</dc:creator>
      <dc:date>2024-07-12T09:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220486#M3570</link>
      <description>&lt;P&gt;I dont have that specific update you refer to&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 09:19:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220486#M3570</guid>
      <dc:creator>toha</dc:creator>
      <dc:date>2024-07-12T09:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220492#M3571</link>
      <description>&lt;P&gt;if it is not supported, it may still work - but also could cease to work anytime!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 09:26:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220492#M3571</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-07-12T09:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220507#M3572</link>
      <description>&lt;P&gt;in my case I don't use number matching code, but only Approval notification.&lt;/P&gt;&lt;P&gt;In the new version of the NPS extension it is necessary to use the registry hack&lt;BR /&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-mfa-number-match#nps-extension" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-mfa-number-match#nps-extension&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.&lt;BR /&gt;Create the following String/Value pair:&lt;BR /&gt;Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP&lt;BR /&gt;Value = TRUE or FALSE (I don't remember, I solved it in another company, I have an older version of the extension)&lt;BR /&gt;Restart the NPS Service.&lt;/P&gt;&lt;P&gt;the user must have the Default authentication method to App notification&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you want to test RADIUS communication without MFA, you can temporarily block MFA extension by renaming&lt;/P&gt;&lt;P&gt;AuthorizationDLLs and ExtensionDLLs in&lt;BR /&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AuthSrv\Parameters&lt;/P&gt;&lt;P&gt;and restarting the NPS service&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 11:32:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220507#M3572</guid>
      <dc:creator>User88083582</dc:creator>
      <dc:date>2024-07-12T11:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220546#M3573</link>
      <description>&lt;P&gt;We have the Same issue with Gaia.&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220510#M36748" target="_blank" rel="noopener"&gt;Re: Blast-RADIUS - CVE-2024-3596 - Check Point CheckMates&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;there might be a workaround on the windows site.&lt;/P&gt;&lt;DIV class=""&gt;Configure&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;requiremsgauth&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for remote servers&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;This configuration enables NPS Proxy to drop potentially vulnerable response messages without the&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Message-Authenticator&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;attribute.&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/topic/kb5040268-how-to-manage-the-access-request-packets-attack-vulnerability-associated-with-cve-2024-3596-a0e2f0b1-f200-4a7b-844f-48d1d5ab9e66" target="_blank" rel="noopener"&gt;KB5040268: How to manage the Access-Request packets attack vulnerability associated with CVE-2024-3596 - Microsoft Support&lt;/A&gt;&lt;BR /&gt;but I 'm no windows admin.&lt;BR /&gt;Regards&lt;BR /&gt;Peter&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 12 Jul 2024 13:42:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220546#M3573</guid>
      <dc:creator>JP_Rex</dc:creator>
      <dc:date>2024-07-12T13:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220869#M3574</link>
      <description>&lt;P&gt;This is RADIUS attribute 80. &amp;nbsp;I had a customer that was having MFA failures.&lt;/P&gt;
&lt;P&gt;In a pinch, you can configure the gateways to ignore attribute 80 with the edit in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk42184&lt;/A&gt;&amp;nbsp; (SmartConsole - Global Properties - Advanced - Firewall - Authentication - radius_ignore and set it to "80". &amp;nbsp;Install policy.&lt;/P&gt;
&lt;P&gt;Reset that to "0" when you're able to take care of it through other means.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 21:31:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/220869#M3574</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-07-15T21:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222460#M3575</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;&lt;BR /&gt;After a lot of tweaking also considered to change this attribute in checkpoint radius settings.&lt;BR /&gt;radius_ignore 80, after that Checkpoint mobile VPN client on end devices worked with RADIUS MFA.&lt;BR /&gt;Before we had a attribute 0 and MFA pop-ups didnt show up.&lt;BR /&gt;&lt;BR /&gt;I have a question: What does this attribute do? Does it effect somehow some security risks or not?&lt;BR /&gt;Is there little bit more information what this attribute changes.&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 13:12:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222460#M3575</guid>
      <dc:creator>martinsl</dc:creator>
      <dc:date>2024-08-01T13:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222512#M3576</link>
      <description>&lt;P&gt;Message-Authenticator, which is something being required in response to CVE-2024-3596 (Blast Radius).&lt;BR /&gt;More details in this thread:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220148" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Blast-RADIUS-CVE-2024-3596/m-p/220148&lt;/A&gt;&lt;BR /&gt;While it is not integrated into the JHF yet, there is a hotfix for this available via TAC.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 16:55:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222512#M3576</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-01T16:55:34Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222560#M3577</link>
      <description>&lt;P&gt;hi, have you found a solution to this problem yet?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2024 10:20:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222560#M3577</guid>
      <dc:creator>FirewallerRS</dc:creator>
      <dc:date>2024-08-02T10:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222841#M3578</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/64372"&gt;@FirewallerRS&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm waiting for the official solution for now. I don't have a patch applied to NPS at the moment (Windows July 9, 2024-KB5040437)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2024 13:27:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/222841#M3578</guid>
      <dc:creator>User88083582</dc:creator>
      <dc:date>2024-08-06T13:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223687#M3579</link>
      <description>&lt;P&gt;the next update also broke RADIUS on NPS (August 13, 2024—KB5041160)&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 18:56:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223687#M3579</guid>
      <dc:creator>User88083582</dc:creator>
      <dc:date>2024-08-14T18:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223846#M3581</link>
      <description>&lt;P&gt;Any update? We have the same issue and neither of those patches are applied.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2024 12:42:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223846#M3581</guid>
      <dc:creator>CGG</dc:creator>
      <dc:date>2024-08-16T12:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223882#M3582</link>
      <description>&lt;P&gt;Recommend engaging TAC: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2024 18:24:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223882#M3582</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-16T18:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223907#M3583</link>
      <description>&lt;P&gt;After the installation of KB 5040437 July 9 and also after the installation of KB 5041160 August 13 (cumulative), the two factor authentication via NPS to AZURE did not work anymore. The error was, the authentication factor came via Micrososft Authentication App, but after the confirmation did not work anymore. I was able to solve the problem temporarily by going to the firewall in the global proerties. -&amp;gt; Global Properties-Advanced- FireWall-1-Authentication-Radius- then set radius_ignore to the value 80.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Aug 2024 18:39:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223907#M3583</guid>
      <dc:creator>FirewallerRS</dc:creator>
      <dc:date>2024-08-17T18:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223959#M3584</link>
      <description>&lt;P&gt;the problem is that on Quantum Spark 1600 with fw R81.10.10 (996002993) there is no option which is mentioned in &lt;A href="https://support.checkpoint.com/results/sk/sk42184" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk42184&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;&lt;STRONG&gt;VPN Remote Access - RADIUS attribute to be ignored&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;" does not exists in&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;Advanced Settings&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 09:42:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/223959#M3584</guid>
      <dc:creator>User88083582</dc:creator>
      <dc:date>2024-08-19T09:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Radius MFA NPS extension</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/226680#M3585</link>
      <description>&lt;P&gt;R81.10.15 is out.&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182438" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182438&lt;/A&gt;&lt;/P&gt;&lt;P&gt;this version already contains:&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;VPN Remote Access - RADIUS attribute to be ignored&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;" and is set to ignore attribute 80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tested and works with fully updated NPS server.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Sep 2024 18:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Radius-MFA-NPS-extension/m-p/226680#M3585</guid>
      <dc:creator>User88083582</dc:creator>
      <dc:date>2024-09-15T18:54:34Z</dc:date>
    </item>
  </channel>
</rss>

