Hi all,
We currently have an environment integrated with Microsoft Entra ID and Check Point, using Identity Awareness with Access Roles.
At the moment, our policy is structured as follows:
We use an inline layer rule.
In the parent rule, we define the VPN C2S network (IP pool) as the source.
In the child rules, we define multiple Access Roles as the source.
Each Access Role maps to Entra ID groups using the naming convention EXT_ID_<group_name>, as described in the admin guide.
However, although this setup is currently allowing traffic, it is effectively working due to the cleanup rule in the inline layer being set to Accept, which we understand is not a correct or secure design.
However, we are evaluating a policy redesign. The idea is to move toward a cleaner rule structure where each Access Role would have its own rule.
That said, a question came up internally:
👉 Is it possible to create a group of Access Roles (similar to a Network Group), so that multiple Access Roles can be combined into a single object and used in one rule?
Has anyone implemented something similar, or is there a recommended workaround or best practice for this scenario?
Thanks in advance for your insights!