Hello,
I am currently implementing remote VPN with machine authentication for our company and our customers and partners.
I configured VPN for ourself, an IT provider, and one of our customers. Each has its own VPN gateway.
For the VPN authentication we use Active Directory. Provider and customer have their own AD, completely seperated.
For the machine certificates we used seperate sub CAs but both are using the same root CA.
I also got a user in our customers AD domain since I am one of the firewall admins and we have to do basic login tests after implementing changes which will affect remote VPN. We also use a seperate test client for that which is connected to our customers AD.
Now the issue is, that that my companys client (which is not part of the customers AD) is also able to login to the customers VPN gateway even though my machine name is not registered in the customers AD. So the machine authentication should fail.
There is no machine identity in the logs and it also shows the different AD name but the login is still successful.
My guess is, that this is possible because both are using the same root CA.
I tried to use the branch filter in the root CA settings in SmartConsole but I could not figure out the correct syntax and there seems to be no configuration examples online.
Did anyone use this filter already and got it to work? Or is there another solution for this issue?
We are using R81.20 on firewalls and the client version is E88.30 and E88.70 (Windows and MacOS clients).