Hi
I have configured it in my lab using the AD CA.
I think its working, but how to validate?
I have the following log card - is this the only method? Or is there a CLI command?
Id: c0a8c50a-b607-7836-63bb-f01100000000
Marker: @A@@B@1673222400@C@2394
Log Server Origin: 192.168.197.10
Time: 2023-01-09T10:44:33Z
Id Generated By Indexer:false
First: false
Sequencenum: 2
Client Name: Active Directory Query
Product Version: R81.10
Domain Name: lazarus.com
Source: 192.168.197.100
Endpoint IP: 192.168.197.100
Authentication Status: Successful Login
Identity Source: AD Query
Session ID: d1b85d8a
Source Machine Name: win10domain
Source Machine Group: All Machines; ad_group_machine_auth
Authentication Method: Machine Authentication (Active Directory)
Identity Type: machine
Roles: machine
Last Update Time: 2023-01-09T10:44:33Z
Action: Log In
Type: Log
Blade: Identity Awareness
Origin: r81_10_mgmt
Product Family: Network
Logid: 131073
Description: Successful Login: Machine Authentication (Active Directory)
I can see from the endpoint client that it is connected to the VPN Active Site and Danny's one liner shows 1 OM address consumed;
REMOTE ACCESS VPN STATS - Current
----------------------------------------------------------------------
Assigned OfficeMode IPs : 0 (Peak: 1)
Capsule/Endpoint VPN Users : 0 (Peak: 0) using Visitor Mode: 0
Capsule Workspace Users : 0 (Peak: 0)
MAB Portal Users : 0 (Peak: 0)
L2TP Users : 0 (Peak: 0)
SNX Users : 0 (Peak: 0)
LICENSES
----------------------------------------------------------------------
SecuRemote Users : 10000
Endpoint Connect Users : 0
Mobile Access Users : 100
SNX Users : 50
I dont see any users or tunnels under Smartview Monitor (possibly as Im enforcing machine auth only?);
Are there any other cli or gui validation methods?
Thanks in advance.