- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello everyone,
we are using AD users for remote access VPN. We have defined some Access Roles for serveral AD Groups, but, we have observed every AD user can log in via VPN client (end point sercurity), regardless the user has a security policy associated or not. If the user is not included in a security policy, of course, they are not able to access to some where, but, they still can do the log in successfully on the VPN client.
So, somehow, we would like to allow the AD authentication for remote access VPN just for those users belonging to the Access Roles or for some specific AD Groups.
How could we do this configuration?
Thanks for your help.
you're right, thanks for clarification 😀
With this configuration anyone can login via VPN client, regardless the configured access rules.
With this configuration the login via vpn client is failing if the user is not member of the shown group. This is to restrict the generally access to the remote access vpn.
Thanks Wolfgang.
I have a doubt about this solution. In case an user is included in two LDAP or Users Local Groups, shoud I define the two LDAP Groups as Participant User Groups?
BR,
Fzahinos.
Hello
but in case you use access role on rules than you need to create ldap group to filter on the remote access community, bit annoying
Fabio
yes you are right, it's little bit confusing.
But you can add only local or ldap groups to the remote access community, it would be better with a normal access role but that's how it works. Maybe one day Check Point will allow access roles with all configurations, but at the moment some things can be done only with ldap-groups
We added there only one ldap-group named "remote_access_allow_general". This is configured in two minutes and then you can forget about ldap-groups 😉
Wolfgang
what do you mean exaclty with "remote_access_allow_general"? anyway if you have different access role group you will need the matching one the remote access community, if not any user anyway will log in (even after without have access to resources)
you're right, thanks for clarification 😀
With this configuration anyone can login via VPN client, regardless the configured access rules.
With this configuration the login via vpn client is failing if the user is not member of the shown group. This is to restrict the generally access to the remote access vpn.
Ok got it what you mean!
Thank you
Fabio
Not sure, you have to try.
Following Mobile Access and Endpoint clients LDAP nested groups are not enforced correctly
it's not supported. But I think this article is meaning the access rules itself and not the group for the remote access community.
Wolfgang
Hi,
I'm unable to either add custom ldap group or delete the default All Users group user Participant Users Group. Am i missing something?
Thanks
Raj
me too
You also need to create a new LDAP Group in the objects. Not a User Access Group.
Hi,
just updating the thread that the issue raised by @PointOfChecking , solved.
In order for VPN to work as an identity source you must enable "Remote Access" checkbox under Identity Awareness properties.
it is also documented in Identity Awareness Admin Guide.
Thanks,
Ilya
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
3 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY