Good afternoon.
I have a cluster of 6700 gateways with version R81.20, with remote access features enabled: IPsec VPN, Mobile access, Identity awareness.
The public IP is not assigned directly to the cluster, but a static route to the internal IP of the cluster is configured from Internet routers. Therefore, the Link selection specifies a Statically nated IP.
Domain integration is already set up, that is:
1) deploy Identity collector;
2) Identity collector to DC and gateway;
3) the DC settings are made according to https://support.checkpoint.com/results/sk/sk60501;
4) An LDAP account unit has been created and configured.
Access under domain accounts is successful.
Goal:
It is necessary to differentiate access for remote users connecting from domain machines and non-domain machines.
That is, to provide access to more resources for remote access users who connect from domain machines, and to provide a minimum access to resources for those connected from non-domain machines.
The first thought was to create:
1) Access role (role_work_pc) and there specifying the network (the pool of addresses issued in office mode - n_VPN_Pool_Remote_Access), the domain group of users (remote access users - checkpoint vpn access), as well as the group containing domain machines (Work_PC).
2) Access role (role_home_pc) and there specifying the network (the pool of addresses issued in office mode - n_VPN_Pool_Remote_Access), the domain group of users (remote access users - checkpoint vpn access).
2 rules have been created for the test: the first allows access for the Access role role_work_pc anywhere, the second for role_home_pc allows access only via RDP to one server.
The gateway did not define/assign a group for the working machine (entered into the domain) and did not determine the name, the result of the check for the test user chkptest (logged in to the test domain machine, via VPN and on the domain machine inside the network), the command:
pep s u q usr chkptest
I tried to use the Identity agent, but it did not want to connect to the gateway even with the VPN connected, which is strange, since the Terminal agent connected successfully on another domain machine inside the network.
But besides that, I would not like to install an agent on the machines.
Then I came across https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/C...
And completed the steps except "Optional - UPN with Machine Certificate".
A certificate was requested and installed via a snap-in (mmc) on a Windows 10 domain machine (entered remotely into the domain).
The certificate was issued by a subordinate certification authority, previously both the subordinate and the root certification authority were added via SmartConsole.
Checkpoint VPN 87.50 is installed and a CRL request error occurs when connecting.
The certificate has a standard http CRL distribution point that is created when deploying a Microsoft certification authority.
As an experiment, a NAT rule was created redirecting port 80 to the CRL distribution point from the public IP of the remote access connection, but the result is the same - the error persists.
I turned on the logging of the Implied roles and saw that when trying to connect, a redirect from the gateway to SMS is recorded on port 18264 (this port happens on SMS).
I'm missing something, but I don't understand what, I'd appreciate your help.