- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi,
At two different customers I have the same issue. One is running R81, the other R81.10.
RADIUS is configured for HTTPS/SSH (GAIA level) and for SmartConsole. Same RADIUS server.
All RADIUS users can connect with SSH/HTTPS without any issues.
When opening SmartConsole, some users can connect. Others cannot. All the users are defined with the same RADIUS server.
Checkpoint logs show "Wrong password" even though the user is connecting with SSH with the same password
I did TCPDUMP. Couldn't find the firewall acting differently for different users. Access-Request and then Access-Reject for some of the RADIUS users to SmartConsole. Access-Accept for the the others.
Has anyone encountered this problem?
Thanks
micha
P.S. The only workaround we found is to change the SmartConsole user to a local Checkpoint Password user.
Radius V1 will likely have password length constraints (16 characters or less), perhaps test to confirm that is the issue?
What method is used i.e. Radius 2.0 and PAP or CHAP?
PAP with RADIUS V1.
CHAP didn't work.
Radius V1 will likely have password length constraints (16 characters or less), perhaps test to confirm that is the issue?
sk13740 - RADIUS authentication fails when using passwords longer than 16 characters
Never thought of that.
Changed it to V2 and all users can now authenticate. Thanks!
I always had same experience.
Check which RADIUS version you configured. Change to V2.
For sure, I learned that long time ago. Usually switching from v1 to v2 or other way around works.
Cheers,
Andy
I always found that while PAP is way less secure, it appears to always solve any Radius auth issues when it comes to Check Point.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY