Hi there, in this post we’re going to deploy Check Point Remote Access, using LDAP and Check Point database for user authentication. This lab we’ll be running on VMWare workstation (CMA/SMS R81) and eve-ng community edition (Gateways-R80.20 and clients running windows 8).
This lab assumes your already have a topology running, so I won’t be covering how to set up this lab.
The goal is to deploy remote access, for users that are part of a group (Department) in AD and also allow access for users that don’t belong to any group in AD. This is useful, for situations where your AD is unreachable and you still want to allow access to a certain group of users.
One of the features that will help us meet this goal, is Identity Awareness. If you would like to learn how to enable it, read my previous post How “To's - Deploy Check Point Identity Awareness”.
Now let’s begin by creating an LDAP Group. This will allow us to filter access based on user group.
In side panel go to New > More > User/Identity > LDAP Group
![1.png 1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9361i7A501D9F1CA19468/image-size/large?v=v2&px=999)
We’ll select the existing Account Unit, and choose either All Account-Unit’s users or you can specify a specific branch in AD (Organizational Unit).
![2.png 2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9362iD0538D278F8C65D9/image-size/medium?v=v2&px=400)
As we already have a group of users from AD, we’re going to create two users as a backup option in case the AD becomes unreachable.
In side panel go to New > More > User/Identity > User…
![3.png 3.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9363iCD383ECC015862F7/image-size/medium?v=v2&px=400)
For template we’ll choose Default.
Set the username and the password in Authentication tab.
![4.png 4.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9364iEDDE908AA5D70612/image-size/medium?v=v2&px=400)
Now let’s create a user group for all users that require remote access.
In side panel go to New > More > User/Identity > User Group…
![5.png 5.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9365iAFECCF4F0712D4EF/image-size/medium?v=v2&px=400)
Set the name, and add AD_Group and both users.
![6.png 6.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9366i8F1C1281CAF13E87/image-size/medium?v=v2&px=400)
The user part is completed, now let’s configure the VPN part.
By default Check Point allows remote access to all users. Let’s filter this access by specifying the user group created in the VPN Communities object.
![7.png 7.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9367i4611D604175CDF76/image-size/large?v=v2&px=999)
Let’s edit the Remote Access object, in Participant User Groups, add the user group for Remote Access.
![8.png 8.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9370i7EEDF338EC00899E/image-size/medium?v=v2&px=400)
Now let’s enable VPN remote access feature by editing the gateway cluster object. Select Mobile Access and a new window will pop up.
![9.png 9.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9371iAED2755602EA8789/image-size/large?v=v2&px=999)
Leave all the options selected as default. In Web Portal page, change the Main URL to the IP address of the external interface.
![10.png 10.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9372i25D392AC72EAF394/image-size/large?v=v2&px=999)
In Applications page select only Demo.
In Active Directory page, it will detect automatically the active directory domain. Press connect.
![11.png 11.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9373iF0D9EDE78BB27395/image-size/large?v=v2&px=999)
Lastly in Users page, add the user group created earlier.
![12.png 12.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9374i0C45E317DE739D8A/image-size/large?v=v2&px=999)
Next let’s enable the Office Mode feature in cluster members tab. Select the gateway > edit > VPN tab > Office Mode for Remote Access > Allocate IP Address from network CP_default_Office
![13.png 13.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9375iEC13A1070B47002F/image-size/large?v=v2&px=999)
In Identity Awareness tab, select Active Directory Query and Remote Access.
![14.png 14.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9376iF3A30FCA614B41CE/image-size/large?v=v2&px=999)
In IPSec VPN tab, add the RemoteAccess vpn community.
![15.png 15.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9377i6411AE1B554FA15D/image-size/large?v=v2&px=999)
In IP Selection by Remote Peer tab, choose the option Selected address from topology table.
![16.png 16.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9378i97D3CFCC8356F48C/image-size/large?v=v2&px=999)
In VPN Advanced tab, enable Support NAT traversal
![17.png 17.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9379iCAD2E70D117BF6E9/image-size/large?v=v2&px=999)
In VPN Clients > Office Mode, select Offer Office Mode to group (choose the VPN group created)
![18.png 18.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9380iAD0089608CD840BD/image-size/large?v=v2&px=999)
Press ok and let’s create the policy for remote access.
![19.png 19.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9381iA5C8CF0522C15EAA/image-size/large?v=v2&px=999)
Let’s install the policy and test the access.
Download the Check Point remote access client. You can search on Google for "checkpoint remote access" and then it will take you directly to the download page.
![20.png 20.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9382iB9632DED726AED7B/image-size/medium?v=v2&px=400)
![21.png 21.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9383iFBD384119C628B9D/image-size/medium?v=v2&px=400)
The installation process is very intuitive.
Once the installation finishes, let’s configure the vpn site.
![22.png 22.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9384i307E451A4D65BA61/image-size/large?v=v2&px=999)
In Server address or Name type the gateway external IP address
![23.png 23.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9385i47B71F3B790A3B90/image-size/large?v=v2&px=999)
Accept the warning certificate and proceed.
In Login Option Selection select Standard > Username and Password > Finish.
I’ll test the access using a user from the Marketing Department, Finance Department and Local user on Check Point Database.
User: mark
Success
We can see that it was assigned a new IP address from the Check Point remote access pool.
![24.png 24.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9386i1A0C6051D673C9C2/image-size/large?v=v2&px=999)
![25.png 25.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9387i7FE28BD09C2F71BB/image-size/large?v=v2&px=999)
![26.png 26.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9388iF84AA40F6BE97C54/image-size/large?v=v2&px=999)
User: francis
Success
![27.png 27.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9389iAD6834395DED36A2/image-size/large?v=v2&px=999)
![28.png 28.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9390iDF3FE5E2E756028E/image-size/large?v=v2&px=999)
![29.png 29.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9391i751A0ED16647A3AE/image-size/large?v=v2&px=999)
User: mark.cp
Successful
![30.png 30.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9392i1D83FF118C88578D/image-size/large?v=v2&px=999)
![31.png 31.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9393iA6D8977CA491B06A/image-size/large?v=v2&px=999)
![32.png 32.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9394i0FF69879D5AF6C0D/image-size/large?v=v2&px=999)
Now let’s test remote access using the browser.
User:martin
Successful
![33.png 33.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9395iD38160DD7A88CD06/image-size/large?v=v2&px=999)
![34.png 34.png](https://community.checkpoint.com/t5/image/serverpage/image-id/9396i849EDB6BD12CC5A7/image-size/large?v=v2&px=999)
We have deployed successfully Remote Access for Check Point.
I hope you enjoyed this post, leave your comments below and I'll see you on the next one.
Reference:
https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_RemoteAccessVPN_AdminGuide/Topics-VPNRG/Check-Point-VPN.htm