<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot reach Azure VM when MFA active in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158054#M6230</link>
    <description>&lt;P&gt;&lt;A href="mailto:AD_Users@Any" target="_blank"&gt;AD_Users@Any&lt;/A&gt;&amp;nbsp;will only work with legacy authentication methods.\&lt;BR /&gt;In general, this should no longer be used.&lt;BR /&gt;The correct way to do this is with an Access Role.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Sep 2022 15:25:27 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-09-26T15:25:27Z</dc:date>
    <item>
      <title>Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/157928#M6225</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a strange issue while connecting to some Azure Cloud VM when using the remote access with MFA.&lt;/P&gt;&lt;P&gt;There is a s2s VPN between the HQ firewall and the Azure Cloud, everything works from LAN clients to the VMs;&lt;/P&gt;&lt;P&gt;People connecting with Remote Access (default AD authentication), can reach the Azure VMs;&lt;/P&gt;&lt;P&gt;People connecting with Remote Access with MFA (Microsoft Authenticator), &lt;U&gt;can't&lt;/U&gt; reach these VMs; All the traffic to the LAN or even to another branch office (s2s) passes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I change the authentication method on the same client I can reach or not the VMs, so I suppose that something happens on "Microsoft side", but I can't understand what.&lt;BR /&gt;The logs on the firewall just show VPN routing when connected without MFA, and drops when using it.&lt;/P&gt;&lt;P&gt;Can you help me?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2022 15:59:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/157928#M6225</guid>
      <dc:creator>AkiYa</dc:creator>
      <dc:date>2022-09-23T15:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/157984#M6226</link>
      <description>&lt;P&gt;Version/JHF level?&lt;BR /&gt;What are the precise rules in the Access Policy that are permitting the two groups of users?&lt;BR /&gt;Are they different rules?&lt;BR /&gt;Please provide a screen shot of log card entries for the two classes of users (masking sensitive data) and the relevant rules.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Sep 2022 21:50:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/157984#M6226</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-09-25T21:50:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/157991#M6227</link>
      <description>&lt;P&gt;Do you use Office Mode for your RAS VPN connectivity? Also, cloud VM, is it part of RAS VPN site? If not, you may need to force all traffic to be routed through the central VPN GW to make it work.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 06:31:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/157991#M6227</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-09-26T06:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158009#M6228</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;the cluster is R80.40 with two 6700 appliances, take 158&lt;/P&gt;&lt;P&gt;The rules are quite simple:&lt;BR /&gt;- &lt;STRONG&gt;Source&lt;/STRONG&gt;: LAN, server_network, OfficeMode_network&lt;BR /&gt;- &lt;STRONG&gt;Destination&lt;/STRONG&gt;: Azure_VMs_network&lt;BR /&gt;- &lt;STRONG&gt;VPN&lt;/STRONG&gt;: Azure_VPN&lt;BR /&gt;- &lt;STRONG&gt;Services&amp;amp;App&lt;/STRONG&gt;: icmp, rdp, HttpandHttps, tcp_(some custom ports)&lt;BR /&gt;- &lt;STRONG&gt;Action&lt;/STRONG&gt;: Accept&lt;/P&gt;&lt;P&gt;The rule above is matched for LAN to Azure connections.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;- &lt;STRONG&gt;Source&lt;/STRONG&gt;: AD_Users@Any&lt;BR /&gt;- &lt;STRONG&gt;Destination&lt;/STRONG&gt;: Azure_VMs_network&lt;BR /&gt;- &lt;STRONG&gt;VPN&lt;/STRONG&gt;: RemoteAccess&lt;BR /&gt;- &lt;STRONG&gt;Services&amp;amp;App&lt;/STRONG&gt;: icmp, rdp, HttpandHttps, tcp_(some custom ports)&lt;BR /&gt;- &lt;STRONG&gt;Action&lt;/STRONG&gt;: Accept&lt;/P&gt;&lt;P&gt;The rule above is matched from VPN remote access users WITHOUT mfa, just normal AD user/psw match&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17883i5DE31113468B5D5E/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- &lt;STRONG&gt;Source&lt;/STRONG&gt;: Any&lt;BR /&gt;- &lt;STRONG&gt;Destination&lt;/STRONG&gt;: Azure_VMs_network&lt;BR /&gt;- &lt;STRONG&gt;VPN&lt;/STRONG&gt;: Any&lt;BR /&gt;- &lt;STRONG&gt;Services&amp;amp;App&lt;/STRONG&gt;: Any&lt;BR /&gt;- &lt;STRONG&gt;Action&lt;/STRONG&gt;: Drop&lt;/P&gt;&lt;P&gt;The rule above is matched from VPN remote access users using mfa.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 849px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17884iAF8142965EEA11A4/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 08:05:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158009#M6228</guid>
      <dc:creator>AkiYa</dc:creator>
      <dc:date>2022-09-26T08:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158014#M6229</link>
      <description>&lt;P&gt;Hi _Val_,&lt;/P&gt;&lt;P&gt;yes I do use Office Mode and no, the cloud VM is not part of the RAS VPN site.&lt;/P&gt;&lt;P&gt;I already tried to set the Endpoint client to force all the traffic to the gateway but it doesn't change the behavior.&lt;/P&gt;&lt;P&gt;What I cannot understand is the relationship between the use of the Azure MFA (or not) and the VPN routing; I suppose that the MFA should be involved in the authentication process only, but I have the feeling that since I'm also connecting to Azure VMs it might be a sort of "mismatch" of the users allowed to access it, but it would be a nonsense to me.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 07:54:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158014#M6229</guid>
      <dc:creator>AkiYa</dc:creator>
      <dc:date>2022-09-26T07:54:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158054#M6230</link>
      <description>&lt;P&gt;&lt;A href="mailto:AD_Users@Any" target="_blank"&gt;AD_Users@Any&lt;/A&gt;&amp;nbsp;will only work with legacy authentication methods.\&lt;BR /&gt;In general, this should no longer be used.&lt;BR /&gt;The correct way to do this is with an Access Role.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 15:25:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158054#M6230</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-09-26T15:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158276#M6231</link>
      <description>&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;we figured out that the problem was about this group: with MFA authentication another group was triggered and since there wasn't the specific rule the traffic was not passing.&lt;/P&gt;&lt;P&gt;Adding a rule with the MFA group did the trick.&lt;/P&gt;&lt;P&gt;But if I understand well I could just use the Access Role and the user should match for both the auth methods, is it right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 08:03:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158276#M6231</guid>
      <dc:creator>AkiYa</dc:creator>
      <dc:date>2022-09-28T08:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot reach Azure VM when MFA active</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158451#M6232</link>
      <description>&lt;P&gt;Yes, assuming the Access Role covers all Remote Access users.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 14:16:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Cannot-reach-Azure-VM-when-MFA-active/m-p/158451#M6232</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-09-29T14:16:58Z</dc:date>
    </item>
  </channel>
</rss>

