- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
we have mirgrated from Checkpoint 77.30 Server Firewall to a 5000 Appliance with R80.10. We want use the new Unify Policys. After we activated the new Layer at the Access Control Policy and install the Policy at the Blades we get the Error Message: Layer "Network": Rule XX has "Legacy User Access" in the Source Column which can be configured on layer with Firewall only" We have 14 rules with this error.
What can we do to activate the Unify Policy?
Try using access role in this rule
if you are able to replace your Legacy User Access objects with Access Role objects then the unify policy will work for you.
Unified policies cannot be used with certain legacy features.
Based on what you're describing, you are likely using rules with an action of User Auth or Client Auth.
The only way to use unified policies is to stop using these legacy features and use their more modern equivalents instead (e.g. Access Roles).
More info here: Install policy on R80.10 Security Gateway fails with verification error messages
Legacy User is also being used for rules that control access of Secure Client Connections
I figured there were other instances that I forgot about
That's why I linked to the SK which covers most of them.
Hi Guys,
thanks for your replies. We use the legacy User for the Secure Client Connections like Endpoint VPN. Exist a way to migrate from Legacy User Access to the modern equivalents?
Thanks
If you're using Client Encrypt rules (i.e. where the action is Client Encrypt), you should be using VPN Communities instead, which were introduced more than 15 years ago.
The legacy User Groups should be replaced with Access Roles.
Refer to: Remote Access VPN R80.10 (Part of Check Point Infinity)
This is one of our VPN Policys
And this is my new VPN Policys:
And this is my Access Role:
The Group is a Cehckpoint Internal Group
But after the remove of the Legacy User Group, my Test user cannot use the VPN anymore. I doens´t get any connections.
It's been probably since Secure Client days since I configured a Remote Access VPN, so no shock I got that wrong
You don't even need an Access Role--remove that from the rule.
You define what groups are permitted in the VPN community itself.
If i use this for the groups can i use my granularity for my VPN Connections?
I have a lot of external vpn users and they should only access certain system
Simplest option (which I used when migrating a customer from ASA, ACS, Radius etc to CP R80.10 ) is just create a role for each 3rd party user and make a rule with:
source (eg Role_3rd_party_user_1) |
dest (wherever he should be able to go) |
svc (whatever he should be able to do) |
accept |
log
Easy.
You might want to make an AllUsers Role and make that the entry to a layer containing the 3rd party rules.
D
Have you an example like Sreenshot for this rule?
something like that?
D
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
19 | |
7 | |
6 | |
4 | |
4 | |
4 | |
2 | |
2 | |
2 | |
2 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY