hello guys,
a customer of mine is asking my team to develop a vpn ssl - remote access to their infrastructure - using authentication with personal certificate (released by their CA - AD).
we developed an enviroment with 80.30 standalone FW, setup the remote office mode and every setting needed.
we also trusted the CA as OPSEC server.
in the setting of auth i chose certificate to match with a CA signed certificate.
but every time we perform some test they fail... i opened a TAC and talked to an engineer and review the config that seems ok to them.
The only thing that is not ok is the personal certificate, but as my customer is using a 3rd party remote client, checkpoint do not provide any info about this config or the certificate (how to develop it).
so... my question for this forum is: did any of you incurred in the same problem and find a solution?
the client is the Windows10 native l2tp client; the CA is a windows server 2018 or 2020.
thanks a lot,
Andrea