<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Client Based VPN Always Connect in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99469#M9783</link>
    <description>&lt;P&gt;What is the user experience that you are looking for and are you using MFA/2FA for your VPN access already today?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note R80.40 Introduced the support for Captive Portal integration with SAML 2.0 and third party Identity Providers, refer:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Content/Topics-IDAG/SAML-Identity-Provider-Configuration.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Content/Topics-IDAG/SAML-Identity-Provider-Configuration.htm&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Oct 2020 07:57:46 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2020-10-19T07:57:46Z</dc:date>
    <item>
      <title>Client Based VPN Always Connect</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99449#M9781</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;Is it possible to enable the always connect functionality on the VPN client to provide users with limited access to some internal network resources but then require users to provide 2FA to access more restricted parts of the internal network?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any information would be appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 06:20:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99449#M9781</guid>
      <dc:creator>stuart2020</dc:creator>
      <dc:date>2020-10-19T06:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: Client Based VPN Always Connect</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99466#M9782</link>
      <description>&lt;P&gt;No - client downloads the topology from the site that defines his access. You would have to use two different entry points with different authentication and different topology for each to make this possible, one limited RA VPN site and one larger RA VPN Site using 2FA.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 07:54:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99466#M9782</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-10-19T07:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: Client Based VPN Always Connect</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99469#M9783</link>
      <description>&lt;P&gt;What is the user experience that you are looking for and are you using MFA/2FA for your VPN access already today?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note R80.40 Introduced the support for Captive Portal integration with SAML 2.0 and third party Identity Providers, refer:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Content/Topics-IDAG/SAML-Identity-Provider-Configuration.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Content/Topics-IDAG/SAML-Identity-Provider-Configuration.htm&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 07:57:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99469#M9783</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-10-19T07:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: Client Based VPN Always Connect</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99474#M9784</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;I was trying to allow users to automatically connect to the VPN when they first login to their laptops remotely. Giving them limited access to some internal applications / systems - e.g. AD, corp Intranet site, holiday booking system etc. If users need to access more sensitive applications / systems - e.g. file server, tier 1 applications etc. They would need to connect with MFA/2FA for enhanced security. Not just allowing the username / password passthrough when logging onto the laptop for limited access. The clients are running a mixture of Windows 10 and Windows 7 OS connecting to Active Directory. We don't have MFA/2FA in production yet, but I have been testing it with an on prem Microsoft NPS server connecting to Azure AD which seems to be working well.&amp;nbsp; The limited access is for&amp;nbsp;convenience and to force end users to connect back to the main network for checking into AD, having new group policies pushed out etc. We use Office 365 for email and some file sharing, so we have a large number of back office staff who never have a requirement to connect back to the main network. This can cause issues with managing the end user experience.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 08:35:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Client-Based-VPN-Always-Connect/m-p/99474#M9784</guid>
      <dc:creator>stuart2020</dc:creator>
      <dc:date>2020-10-19T08:35:31Z</dc:date>
    </item>
  </channel>
</rss>

