- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hey all,
I have a Check Point R81.20 (JHF 119) Security Gateway deployed on an Open Server for a customer. The customer is looking to implement Browser-Based Authentication (Captive Portal) for known users, with FreeRADIUS as the backend authentication source. The FreeRADIUS server is running on Ubuntu 24.04, and users are defined locally with Cleartext-Password entries.
I have followed the R81.20 Identity Awareness Admin Guide to configure Browser-Based Authentication using RADIUS. However, when a user attempts to authenticate via the Captive Portal, I consistently see “Bad username or password” events in SmartView Logs.
The key observation is that no RADIUS Access-Request packets are sent from the gateway:
- tcpdump on the gateway (any interface, port 1812) shows no outbound RADIUS traffic
- No packet drops are observed on the gateway
- This suggests the authentication failure is occurring locally on the gateway before RADIUS is invoked
Below are the relevant configuration snippets from the Check Point gateway (Browser-Based Authentication settings, RADIUS server object, and Access Control rule).
Authentication Settings
Portal Settings
Freeradius object
I would appreciate any help in this regard:
- Any known R81.20 caveats or prerequisites specific to Browser-Based Authentication with RADIUS?
- Is there a built-in CLI tool to test RADIUS authentication from the gateway, similar to test_ad_connectivity.sh for AD?
Thanks in advance for your help.
Regards,
Abdul Tayyeb R.
Under accessibility settings, is it set to all interfaces or only internal?
True, makes sense. So you dont see anything on port 1812 outbound at all?
You need to configure where the fw has to look for the users. No options are selected user directories
Totally valid point...I missed that from the screenshots, but its 100% required.
I have already selected "External user profiles". Do I need to select something else here? While troubleshooting the issue, I had selected all 3 directory options hoping to resolve the issue, but then I ended up getting a different error as mentioned below:
"An error was detected while trying to authenticate against the AD server. It may be a problem of bad configuration or connectivity. Please refer to the troubleshooting guide for more help"
That could be AD server issue...any relevant logs there?
Does your LDAP account unit work correctly? Able to fetch finger print? Do you see identities in the firewall logs? Able to search LDAP groups and use them in the rulebase from SmartConsole? I would use LDAP users instead of External
There is NO LDAP server in the network. There's only one RADIUS server that has users/contractors defined. And I want these users to be authenticated before they're given Internet access. Is something wrong with my setup?
Yes. LDAP users are enabled but no LDAP directory exists. With Browser-Based Authentication the gateway must first resolve the user in a selected directory before RADIUS is used. Since LDAP lookup fails, authentication stops locally and never reaches RADIUS. Disable LDAP users and use Internal Users or External User Profiles that authenticate via RADIUS.
Makes perfect sense!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 25 | |
| 12 | |
| 11 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 6 | |
| 6 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY