- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi, I need some tips/recommendations how to control access from remote offices.
Today one main headquarter with all servers behind with two 3200.
20 small remote offices using 730 SMB firewalls with VPN to the 3200.
I want to control so only Windows AD joined computers have full access through the vpn tunnel.
All other devices should have limited access, for example printers, thin clients etc.
I can see 3 different approaches:
1. Control the vpn traffic in the 3200 firewall with user awareness.
2. Control the vpn traffic in the 730 firewalls (I think they also have user awareness with an Active Directory connection)
3. Setup 802.1x wired authentication in all remote switches and control the traffice with different vlans.
What would you do and why?
Hi Maarten,
Ok so If I enable Identity Awareness on the 3200 firewall and configure Active Directory as an Identity source it can control the vpn traffic that is initiated from a domain-joined computer in the remote office?
I thought it only could control traffic initiated from behind the 3200 firewall.
If it is correct then it is a simple good solution.
Do I need Identity Agens on every remote computers or will it work with clientless Activie Directory queries?
Thanks
Just to expand on this then as you are looking at using Active Directory joined machines then after setting up the IA Collectors then make sure that in the Access Roles that you create that not only do you specify Users but also specify Machines.
The Default Machines setting is Any Machine. If want to enforce AD joined machines then make sure that use the
Specific machines/groups
rather then
Any Machine.
That way the machine must be part of the group(s) that add so would have to be AD joined.
So would be controlling to users over the VPN to specific resources and would have to be from specific machines.
Thanks
But do I need to deploy the Identity Agent och every computer?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 15 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY