Hey all,
I have a Check Point R81.20 (JHF 119) Security Gateway deployed on an Open Server for a customer. The customer is looking to implement Browser-Based Authentication (Captive Portal) for known users, with FreeRADIUS as the backend authentication source. The FreeRADIUS server is running on Ubuntu 24.04, and users are defined locally with Cleartext-Password entries.
I have followed the R81.20 Identity Awareness Admin Guide to configure Browser-Based Authentication using RADIUS. However, when a user attempts to authenticate via the Captive Portal, I consistently see “Bad username or password” events in SmartView Logs.
The key observation is that no RADIUS Access-Request packets are sent from the gateway:
- tcpdump on the gateway (any interface, port 1812) shows no outbound RADIUS traffic
- No packet drops are observed on the gateway
- This suggests the authentication failure is occurring locally on the gateway before RADIUS is invoked
Below are the relevant configuration snippets from the Check Point gateway (Browser-Based Authentication settings, RADIUS server object, and Access Control rule).
Authentication Settings
Portal Settings
Freeradius object
I would appreciate any help in this regard:
- Any known R81.20 caveats or prerequisites specific to Browser-Based Authentication with RADIUS?
- Is there a built-in CLI tool to test RADIUS authentication from the gateway, similar to test_ad_connectivity.sh for AD?
Thanks in advance for your help.
Regards,
Abdul Tayyeb R.