- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Check Point R81.20
Good afternoon, when you uncheck the box "Allow older clients to connect to this gateway" in the cluster settings in section VPN Clients, L2TP + IPSec is disabled.
The question is, is it possible to somehow limit the standard authentication profile to connect, for example, only local checkpoint users?
Or is there any way to uncheck this box and still have L2TP+IPSec working?
The idea is to leave only the authentication methods we created for connecting via Check Point Endpoint Security VPN, or to limit the standard authentication method to local Check Point users (not domain ones) and to have the ability to connect via L2TP + IPSec
Thanks in advance
I dont believe you can, but I could be mistaken...maybe best to confirm with TAC.
Considering L2TP + IPsec support goes back to the days of SecuRemote, I suspect it's considered an "older client" and would be disabled by that option.
Also of note that L2TP requires the use of Legacy Authentication, as noted in the documentation: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/C...
I suspect what you're trying to do is an RFE.
Yes, you can control which users authenticate by:
***************************
My situation is that I need L2TP + IPsec, but I also need to disable the standard authentication method, or limit the standard authentication method to local users only. In my case, there is no need to restrict L2TP+IPSec to local users only; this is more a question for the standard authentication method.
Yes, I have 3 custom profiles, and users can only connect through them, but at the moment, since this checkbox "Allow older clients to connect to this gateway" is checked, they can choose the standard method and log in using their username and password (without 2FA)
Ok...and if you uncheck that option, then works as expected?
Yes, it is impossible to connect using the standard authentication method, but L2TP+IPSec, which I need, also doesn’t work.
Wait, just to make sure Im not missing anything...are you saying IF that setting is on to allow older clients to connect, user/pass auth does not work?
No, this checkbox works as it should in terms of limiting the default authentication method, I just want to understand if it is possible to limit this default authentication method to connections from local users only.
I dont believe you can, but I could be mistaken...maybe best to confirm with TAC.
OK, thank you for help!!!
No problem!
Considering L2TP + IPsec support goes back to the days of SecuRemote, I suspect it's considered an "older client" and would be disabled by that option.
Also of note that L2TP requires the use of Legacy Authentication, as noted in the documentation: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/C...
I suspect what you're trying to do is an RFE.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 29 | |
| 16 | |
| 16 | |
| 15 | |
| 9 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 |
Wed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY