Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Rober506
Participant

How to avoid 3th Party VPN Client

Hi,

After some security updates, certain VPN clients using Linux OS and the SNX connector (without Mobile Access Blades, just IPsec VPN) were unable to complete the MFA process using OTP. This issue was resolved by having users access the Mobile Access Portal through Chrome on their Linux devices and use the SNX client to receive the OTP and connect.

However, during this process, some users discovered they could use third-party software clients to establish VPN connections with MFA by using alternative client software.

The third-party client being referenced is available at:
https://github.com/ancwrd1/snx-rs

The concern is: how can I prevent access from non-official clients, especially when their logs appear as "EndpointClient," similar to those of users who use the official Endpoint Client to connect?

Best Regards,

7 Replies
the_rock
Legend
Legend

Apart from SCV feature, maybe below can help? You can use access roles for it, but you do need identity awareness blade enabled.

Andy

 

Screenshot_1.png

Rober506
Participant

It looks interesting I'll investigate more about this, thanks

the_rock
Legend
Legend

I never personally tested it myself, but I am pretty sure it would work.

Andy

0 Kudos
PhoneBoy
Admin
Admin

Short of disabling SNX as an allowed client (which would also disable the official SNX client), not sure of a way to do this.
I would open a TAC case.

0 Kudos
Rober506
Participant

Yes, but I need to keep linux users that uses snx.. One particular issue with this unofficial client is that it appears as official EndPointClient on Windows in the IAw logs 

0 Kudos
PhoneBoy
Admin
Admin

Completely understand.
As I said, best to open a TAC case.
I’m also checking with R&D on the backend.

0 Kudos
the_rock
Legend
Legend

Thats super valid point.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events