- Products
- Learn
- Local User Groups
- Partners
- More
Check Point Jump-Start Online Training
Now Available on CheckMates for Beginners!
Why do Hackers Love IoT Devices so Much?
Join our TechTalk on Aug 17, at 5PM CET | 11AM EST
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
The SMB Cyber Master
Boost your knowledge on Quantum Spark SMB gateways!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hello everyone,
we are using AD users for remote access VPN. We have defined some Access Roles for serveral AD Groups, but, we have observed every AD user can log in via VPN client (end point sercurity), regardless the user has a security policy associated or not. If the user is not included in a security policy, of course, they are not able to access to some where, but, they still can do the log in successfully on the VPN client.
So, somehow, we would like to allow the AD authentication for remote access VPN just for those users belonging to the Access Roles or for some specific AD Groups.
How could we do this configuration?
Thanks for your help.
you're right, thanks for clarification 😀
With this configuration anyone can login via VPN client, regardless the configured access rules.
With this configuration the login via vpn client is failing if the user is not member of the shown group. This is to restrict the generally access to the remote access vpn.
Thanks Wolfgang.
I have a doubt about this solution. In case an user is included in two LDAP or Users Local Groups, shoud I define the two LDAP Groups as Participant User Groups?
BR,
Fzahinos.
Hello
but in case you use access role on rules than you need to create ldap group to filter on the remote access community, bit annoying
Fabio
yes you are right, it's little bit confusing.
But you can add only local or ldap groups to the remote access community, it would be better with a normal access role but that's how it works. Maybe one day Check Point will allow access roles with all configurations, but at the moment some things can be done only with ldap-groups
We added there only one ldap-group named "remote_access_allow_general". This is configured in two minutes and then you can forget about ldap-groups 😉
Wolfgang
what do you mean exaclty with "remote_access_allow_general"? anyway if you have different access role group you will need the matching one the remote access community, if not any user anyway will log in (even after without have access to resources)
you're right, thanks for clarification 😀
With this configuration anyone can login via VPN client, regardless the configured access rules.
With this configuration the login via vpn client is failing if the user is not member of the shown group. This is to restrict the generally access to the remote access vpn.
Ok got it what you mean!
Thank you
Fabio
Not sure, you have to try.
Following Mobile Access and Endpoint clients LDAP nested groups are not enforced correctly
it's not supported. But I think this article is meaning the access rules itself and not the group for the remote access community.
Wolfgang
Hi,
I'm unable to either add custom ldap group or delete the default All Users group user Participant Users Group. Am i missing something?
Thanks
Raj
me too
You also need to create a new LDAP Group in the objects. Not a User Access Group.
Hi,
just updating the thread that the issue raised by @PointOfChecking , solved.
In order for VPN to work as an identity source you must enable "Remote Access" checkbox under Identity Awareness properties.
it is also documented in Identity Awareness Admin Guide.
Thanks,
Ilya
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY