Good Afternoon everyone and Happy New Year!
As mentioned in my prior post before the holidays, I'd like to limit a network resource to a certain group of users/laptops for auditing purposes. Every user has their own laptop.
While in the office, this would be a fairly easy task by simply assigning static IPs to the 4 users, then creating a Check Point access rule limiting access to this resource to these 4 host machines.
The prickly part is for when these same 4 users WFH. I'm pretty sure I could assign static IPs via Check Point to these 4 users by editing the ipassignment.conf file (correct me if I'm wrong) while still using my normal Check Point IP pool for all other WFH users.
It was suggested that I go the Identity Awareness route as this would scale much better and be much easier to change on the fly by simply adding/deleting members from my AD security group.
Fortunately, I have a non-production Check Point AIO device running R81.20 at our DR site that I can test this out on.
Here are the steps I've taken so far:
- Enabled the Identity Awareness blade on my test Check Point in DR and configured it to use the AD controller at the same site.
- Created an "Access Role" test object. Right now, it only contains my AD user account.
- Enabled Identity Logging under the "Management" tab in the gateway "General Properties."
Created an Access Role object:
Access Role object
Networks:Any
Users:Specific users/groups - Me
Machines:Any
Remote Access Clients:Any
Created an access rule
Source - "Access Role" object
Destination - network resource
VPN - Any
Services & Applications - Any
Action - Drop
- Installed database (not sure if this needed to be done) and installed policy.
- Then I tested by running a ping to the off-limits network resource.
I was able to still ping...
Obviously, I'm missing something.
As always, any help is always appreciated.