Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
toha
Explorer

Radius MFA NPS extension

I have Quantum Spark 1530 configured with Radius to a Windows Server.
Firewall is running R81.10.10.
MFA NPS extension have been upgraded to latest version on NPS server.
New certificate for NPS have been created and old have been deleted.
Internal firewall certificates have been reinitialized.
Time and date on NPS server has been verified.
Radius timeout have been set to 30 sec.
NPS server have been rebooted

When trying to connect with VPN to the firewall, the client prompts the user with incorrect username or password and the user receives 3 text messages from Microsoft with passcodes. All different codes.

It seems to me that the firewall sends multiple Radius requests.

 

Any suggestions?

0 Kudos
9 Replies
User88083582
Participant

I had the same problem.

The temporary solution was to uninstall the Windows July 9, 2024-KB5040437 update from the NPS server.

PhoneBoy
Admin
Admin

Note that we only support PAP authentication per: https://support.checkpoint.com/results/sk/sk166359
I'd also use tcpdump to capture the traffic to/from the RADIUS server to see if you can find any clues.
Otherwise, I suggest a TAC case.

0 Kudos
toha
Explorer

This setup has worked for several years

0 Kudos
G_W_Albrecht
Legend Legend
Legend

if it is not supported, it may still work - but also could cease to work anytime!

 

CCSE / CCTE / CCME / CCSM Elite / SMB Specialist
0 Kudos
User88083582
Participant

I had the same problem with the same configuration (CHKPT <- RADIUS -> NPS with MFA NPS extension).

The temporary solution was to uninstall the Windows July 9, 2024-KB5040437 update from the NPS server.

0 Kudos
toha
Explorer

I dont have that specific update you refer to

0 Kudos
User88083582
Participant

in my case I don't use number matching code, but only Approval notification.

In the new version of the NPS extension it is necessary to use the registry hack
https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-mfa-number-match#nps-extensio...

Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
Create the following String/Value pair:
Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
Value = TRUE or FALSE (I don't remember, I solved it in another company, I have an older version of the extension)
Restart the NPS Service.

the user must have the Default authentication method to App notification

 

if you want to test RADIUS communication without MFA, you can temporarily block MFA extension by renaming

AuthorizationDLLs and ExtensionDLLs in
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AuthSrv\Parameters

and restarting the NPS service

0 Kudos
JP_Rex
Collaborator
Collaborator

We have the Same issue with Gaia.
Re: Blast-RADIUS - CVE-2024-3596 - Check Point CheckMates

there might be a workaround on the windows site.

Configure requiremsgauth for remote servers
This configuration enables NPS Proxy to drop potentially vulnerable response messages without the Message-Authenticator attribute. 
 
0 Kudos
Duane_Toler
Advisor

This is RADIUS attribute 80.  I had a customer that was having MFA failures.

In a pinch, you can configure the gateways to ignore attribute 80 with the edit in https://support.checkpoint.com/results/sk/sk42184  (SmartConsole - Global Properties - Advanced - Firewall - Authentication - radius_ignore and set it to "80".  Install policy.

Reset that to "0" when you're able to take care of it through other means.

 

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events