- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Remote VPn certificate based authentication is...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Remote VPn certificate based authentication issue.
We have configured Certificate based authentication but we are getting message on VPN client that "User Account Expired 31 Dec 2020"
When user connect from Client to VPN, it shows user Certificate but whne he connect, it give above error message.
We have already added Root CA in Trusted CA and issuing CA in Subordinate CA.
Generated CSR and got the Certificate from Internal CA
Selected Personal Certificate in Authetication in VPN Client as well in Mobile Access.
In Mobile access, Portal setting added another internal CA certification.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is this field set properly for the user account in question?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Actually user which we are tring to connect is on AD not locally.. We have other users where there Account was expired on 31 dec 2020 which are on locally on checkpoint.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Below is the Message in Traffic logs
Main Mode Sent Notification to Peer: Client Encrypt Notification: User account expired on 31-Dec-2020.
User account expired on 31-Dec-2020. ---This data is picked up from the checkpoint only in the backend but not sure from where?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It might be in the generic* user that you need to change the expiration on.
The only way to find this user (if it's indeed defined in your environment) is via SmartDashboard (not SmartConsole).
Otherwise, I suggest contacting TAC.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks, After changing the expiration on generic* user, message has gone but getting another message now on Endpoint security client that "Main Mode Sent Notification to Peer: Client Encrypt Notification: Access denied - wrong user name or password "
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Even if you are using AD for authentication, some settings are inherit from default password templates. Check following:
LDAP Account Unit -> double click on correct AU -> Authentication -> Section "Users' default values". If "use user template" checkbox is ticked, then see which user template is used.
Search for this user template in "User Templates" within object explorer. Open affected template and right in General tab you can see Expiration of this template (which is valid for all users, not just locally configured).
If inside the user template you have "According to Global Properties", head to Global Properties -> User Accounts and there you should see Expiration.
Jozko Mrkvicka
