- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We have a customer who wants the following setup with remote access
1)Designated user groups in AD should be able to login ( no one else )
I created the attached policy for Login with having the designated the security group part of Remote Access object as participating groups, now whoever is not part of the group is not able to login so this works
2)Then create policies on the basis of those groups different sets of policies when connected through remote access.
I am not able to get the policy to work on specific applications for eg ANZ-VPN should be only able to access RDP services only, EMEA-VPN should be only able to access http/https services ,
Will these access rules be created below the auth policy ( for remote access ) ?
If someone can share snapshots of policy how they achieved this would be awesome or a document .
Setup
GAIA - R81
Smart Cloud Mgmt with a Cluster + duo MFA setup
Any help would be apprecciated
Multiple groups shouldn’t matter.
As long as it matches one of the groups defined in the Access Role it should be included.
Is Remote Access one of the identity sources configured for the relevant gateway in Identity Awareness?
You would create similar rules to the one you've attached with Access Roles that refer to the different groups of users, destinations, and applications.
What precisely did you try and what was the precise result?
Hi ,
Thanks for the reply, i tested the rule which has source as Access Role and allowed port, but it doesn't work .
I believe there is a rule underneath with Office_Mode Pool IP addresses included in 1 Policy, the question is that do i remove the Office Mode as source when we are doing access role in the policies ?
I will test the above scenario as well today and would let u know how it goes.
You should not need to use the Office Mode IPs directly in rules when using Access Roles (unless some Remote Access user isn't covered by an Access Role).
Hi ,
I just tried the above
so removed officemode pool from the policy and defined the specific AD group as access role in source and allowed some applications
but still no go, in the logs, i am seeing it is hitting clean up rule.
My question is what happens if the user is part of multiple groups in AD ? and am i missing something.
Multiple groups shouldn’t matter.
As long as it matches one of the groups defined in the Access Role it should be included.
Is Remote Access one of the identity sources configured for the relevant gateway in Identity Awareness?
Thanks for your help, I tested again today and it is working as expected.
One thing I did was in Gateway Properties>>Remote Access>>Policy was selected as legacy instead of unified, I changed it to unified.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY