<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to validate machine authentication? in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/169149#M5752</link>
    <description>&lt;P&gt;We have this working on Windows for both internal, and VPN connected traffic.&amp;nbsp; It was always working for internal traffic,. but to get it to work for VPN we had to make a couple of changes.&lt;/P&gt;
&lt;P&gt;In the Access Role, we had tried using built-in "Domain Computers" group.&amp;nbsp; When we changed this to a user made security group, and populated that group with our test machines, rules using an Access Role with machine Machine Auth. started working.&amp;nbsp; Up to that point it probably always had been, but we couldn't tell because the test rule was not used.&lt;/P&gt;
&lt;P&gt;I believe the reason why we could tell this was the case, and simultaneously being able to tell that machine auth. was indeed working was to look at one of the "Identity Awareness" records, and looking for the "Source Machine Group" section.&amp;nbsp; I don't think this exists for IA records where machine auth. doesn't occur.&lt;/P&gt;
&lt;P&gt;We also inferred from this record that the reason why we thought that machine auth. was not working over VPN was because of the "Domain Computers" group never appeared in "Source Machine Group", therefore our test rules were never used as the traffic did not match the access role.&amp;nbsp; You can see below that only "All Machines" appears, not "Domain Computers".&amp;nbsp; Changing the access role to use the second of the two AD groups listed below worked for our test rule, adding a second indicator that machine auth. was working.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="machine_auth_log.jpg" style="width: 344px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19302i2677554465A2266C/image-size/large?v=v2&amp;amp;px=999" role="button" title="machine_auth_log.jpg" alt="machine_auth_log.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 25 Jan 2023 16:01:48 GMT</pubDate>
    <dc:creator>Howard_Gyton</dc:creator>
    <dc:date>2023-01-25T16:01:48Z</dc:date>
    <item>
      <title>How to validate machine authentication?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/167109#M5749</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have configured it in my lab using the AD CA.&lt;/P&gt;&lt;P&gt;I think its working, but how to validate?&lt;/P&gt;&lt;P&gt;I have the following log card - is this the only method? Or is there a CLI command?&lt;/P&gt;&lt;P&gt;Id: c0a8c50a-b607-7836-63bb-f01100000000&lt;BR /&gt;Marker: @A@@B@1673222400@C@2394&lt;BR /&gt;Log Server Origin: 192.168.197.10&lt;BR /&gt;Time: 2023-01-09T10:44:33Z&lt;BR /&gt;Id Generated By Indexer:false&lt;BR /&gt;First: false&lt;BR /&gt;Sequencenum: 2&lt;BR /&gt;Client Name: Active Directory Query&lt;BR /&gt;Product Version: R81.10&lt;BR /&gt;Domain Name: lazarus.com&lt;BR /&gt;Source: 192.168.197.100&lt;BR /&gt;Endpoint IP: 192.168.197.100&lt;BR /&gt;Authentication Status: Successful Login&lt;BR /&gt;Identity Source: AD Query&lt;BR /&gt;Session ID: d1b85d8a&lt;BR /&gt;Source Machine Name: win10domain&lt;BR /&gt;Source Machine Group: All Machines; ad_group_machine_auth&lt;BR /&gt;Authentication Method: Machine Authentication (Active Directory)&lt;BR /&gt;Identity Type: machine&lt;BR /&gt;Roles: machine&lt;BR /&gt;Last Update Time: 2023-01-09T10:44:33Z&lt;BR /&gt;Action: Log In&lt;BR /&gt;Type: Log&lt;BR /&gt;Blade: Identity Awareness&lt;BR /&gt;Origin: r81_10_mgmt&lt;BR /&gt;Product Family: Network&lt;BR /&gt;Logid: 131073&lt;BR /&gt;Description: Successful Login: Machine Authentication (Active Directory)&lt;/P&gt;&lt;P&gt;I can see from the endpoint client that it is connected to the VPN Active Site and Danny's one liner shows 1 OM address consumed;&lt;/P&gt;&lt;P&gt;REMOTE ACCESS VPN STATS - Current&lt;BR /&gt;----------------------------------------------------------------------&lt;BR /&gt;Assigned OfficeMode IPs : 0 (Peak: 1)&lt;BR /&gt;Capsule/Endpoint VPN Users : 0 (Peak: 0) using Visitor Mode: 0&lt;BR /&gt;Capsule Workspace Users : 0 (Peak: 0)&lt;BR /&gt;MAB Portal Users : 0 (Peak: 0)&lt;BR /&gt;L2TP Users : 0 (Peak: 0)&lt;BR /&gt;SNX Users : 0 (Peak: 0)&lt;/P&gt;&lt;P&gt;LICENSES&lt;BR /&gt;----------------------------------------------------------------------&lt;BR /&gt;SecuRemote Users : 10000&lt;BR /&gt;Endpoint Connect Users : 0&lt;BR /&gt;Mobile Access Users : 100&lt;BR /&gt;SNX Users : 50&lt;/P&gt;&lt;P&gt;I dont see any users or tunnels under Smartview Monitor (possibly as Im enforcing machine auth only?);&lt;/P&gt;&lt;P&gt;Are there any other cli or gui validation methods?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 12:48:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/167109#M5749</guid>
      <dc:creator>LazarusG</dc:creator>
      <dc:date>2023-01-09T12:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to validate machine authentication?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/167190#M5750</link>
      <description>&lt;P&gt;Pretty sure you wouldn't get an Office Mode address if you weren't successfully authenticated.&lt;BR /&gt;Did you initiate any traffic into the encryption domain?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 00:28:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/167190#M5750</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-10T00:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to validate machine authentication?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/167194#M5751</link>
      <description>&lt;P&gt;Phoneboy makes a good point, try send some traffic to enc domain and see.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 01:13:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/167194#M5751</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-01-10T01:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to validate machine authentication?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/169149#M5752</link>
      <description>&lt;P&gt;We have this working on Windows for both internal, and VPN connected traffic.&amp;nbsp; It was always working for internal traffic,. but to get it to work for VPN we had to make a couple of changes.&lt;/P&gt;
&lt;P&gt;In the Access Role, we had tried using built-in "Domain Computers" group.&amp;nbsp; When we changed this to a user made security group, and populated that group with our test machines, rules using an Access Role with machine Machine Auth. started working.&amp;nbsp; Up to that point it probably always had been, but we couldn't tell because the test rule was not used.&lt;/P&gt;
&lt;P&gt;I believe the reason why we could tell this was the case, and simultaneously being able to tell that machine auth. was indeed working was to look at one of the "Identity Awareness" records, and looking for the "Source Machine Group" section.&amp;nbsp; I don't think this exists for IA records where machine auth. doesn't occur.&lt;/P&gt;
&lt;P&gt;We also inferred from this record that the reason why we thought that machine auth. was not working over VPN was because of the "Domain Computers" group never appeared in "Source Machine Group", therefore our test rules were never used as the traffic did not match the access role.&amp;nbsp; You can see below that only "All Machines" appears, not "Domain Computers".&amp;nbsp; Changing the access role to use the second of the two AD groups listed below worked for our test rule, adding a second indicator that machine auth. was working.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="machine_auth_log.jpg" style="width: 344px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19302i2677554465A2266C/image-size/large?v=v2&amp;amp;px=999" role="button" title="machine_auth_log.jpg" alt="machine_auth_log.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 16:01:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-to-validate-machine-authentication/m-p/169149#M5752</guid>
      <dc:creator>Howard_Gyton</dc:creator>
      <dc:date>2023-01-25T16:01:48Z</dc:date>
    </item>
  </channel>
</rss>

