- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi,
At two different customers I have the same issue. One is running R81, the other R81.10.
RADIUS is configured for HTTPS/SSH (GAIA level) and for SmartConsole. Same RADIUS server.
All RADIUS users can connect with SSH/HTTPS without any issues.
When opening SmartConsole, some users can connect. Others cannot. All the users are defined with the same RADIUS server.
Checkpoint logs show "Wrong password" even though the user is connecting with SSH with the same password
I did TCPDUMP. Couldn't find the firewall acting differently for different users. Access-Request and then Access-Reject for some of the RADIUS users to SmartConsole. Access-Accept for the the others.
Has anyone encountered this problem?
Thanks
micha
P.S. The only workaround we found is to change the SmartConsole user to a local Checkpoint Password user.
Radius V1 will likely have password length constraints (16 characters or less), perhaps test to confirm that is the issue?
What method is used i.e. Radius 2.0 and PAP or CHAP?
PAP with RADIUS V1.
CHAP didn't work.
Radius V1 will likely have password length constraints (16 characters or less), perhaps test to confirm that is the issue?
sk13740 - RADIUS authentication fails when using passwords longer than 16 characters
Never thought of that.
Changed it to V2 and all users can now authenticate. Thanks!
I always had same experience.
Check which RADIUS version you configured. Change to V2.
For sure, I learned that long time ago. Usually switching from v1 to v2 or other way around works.
Cheers,
Andy
I always found that while PAP is way less secure, it appears to always solve any Radius auth issues when it comes to Check Point.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 19 | |
| 10 | |
| 9 | |
| 8 | |
| 7 | |
| 6 | |
| 4 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY