Using Microsoft Active Directory for Checkpoint NG AI SecureClient



Similar documents
ESET SECURE AUTHENTICATION. Check Point Software SSL VPN Integration Guide

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Check Point FW-1/VPN-1 NG/FP3

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2

Immotec Systems, Inc. SQL Server 2005 Installation Document

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

Product Guide Addendum. SafeWord Check Point User Management Console Version 2.1

For paid computer support call

ESET SECURE AUTHENTICATION. Cisco ASA Internet Protocol Security (IPSec) VPN Integration Guide

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

How To Set Up Checkpoint Vpn For A Home Office Worker

Step by step guide to implement SMS authentication to Cisco ASA Clientless SSL VPN and Cisco VPN

Checkpoint firewall Quick Integration Guide. for PacketFence version 4.6.0

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

PineApp Surf-SeCure Quick

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

ESET SECURE AUTHENTICATION. Cisco ASA SSL VPN Integration Guide

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Configuring User Identification via Active Directory

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Hosted Microsoft Exchange Client Setup & Guide Book

Introduction to Endpoint Security

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

DIGIPASS Authentication for GajShield GS Series

How to Logon with Domain Credentials to a Server in a Workgroup

Purple Sturgeon Standard VPN Installation Manual for Windows XP

ThinManager and Active Directory

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Accessing the Media General SSL VPN

Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

NSi Mobile Installation Guide. Version 6.2

DIGIPASS Authentication for Check Point Security Gateways

Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

ESET SECURE AUTHENTICATION. SonicWall SSL VPN Integration Guide

Hosted Microsoft Exchange Client Setup & Guide Book

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Training module 2 Installing VMware View

Remote Access Technical Guide To Setting up RADIUS

Set Up Setup with Microsoft Outlook 2007 using POP3

Remote Access VPN SSL VPN Access via Internet Explorer

Chapter 7 Managing Users, Authentication, and Certificates

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

Preparing for GO!Enterprise MDM On-Demand Service

Checkpoint Check Point Provider-1 NGX (v4) Practice Test. Version 2.1

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

MAPPING THE WEBDRIVE REFERENCE GUIDE

RMS Cloud - Setup Instructions for Windows Computers

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

This presentation explains how to integrate Microsoft Active Directory to enable LDAP authentication in the IBM InfoSphere Master Data Management

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro

External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

How-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx

Configuring Global Protect SSL VPN with a user-defined port

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Installing and configuring Microsoft Reporting Services

University Computing & Telecommunications Virtual Private Networking: How To/Self- Help Guide Windows 8.1 Operating System.

External Authentication with Netscreen 25 Remote VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

User Guide Microsoft Exchange Remote Test Instructions

Configuring SSL VPN on the Cisco ISA500 Security Appliance

VPN L2TP Application. Installation Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # )

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Using Microsoft Active Directory Server and IAS Authentication

Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC

WirelessOffice Administrator LDAP/Active Directory Support

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Managing Identities and Admin Access

MICROSOFT ISA SERVER 2006

How To Configure Apple ipad for Cyberoam L2TP

Phone: Fax: Box: 230

Multi-factor Authentication using Radius

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Advanced Administration

DISTRICT SCHOOL BOARD OF COLLIER COUNTY. Internet Technology. Setting up VPN Access Windows 7. Revised

RSA SecurID Ready Implementation Guide

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Installing LearningBay Enterprise Part 2

Remote Access Clients for Windows

SSL VPN Setup for Windows

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

NETASQ ACTIVE DIRECTORY INTEGRATION

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Chapter 3 Authenticating Users

Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Transcription:

Using Microsoft Active Directory for Checkpoint NG AI SecureClient Dave Crowfoot www.works4me.com dave@works4me.com This is the solution that I came up with to utilize MS Active directory to authenticate SecureClient users. I do not extend the AD schema or use radius for this solution. I do not use SmartDashboard to administer my AD users. I do not like the way it handles user maintenance and without extending the schema it doesn t work that well anyway. I only use the MS tools for this. Environment used to create and test solution: Compaq Proliant ML530 SecurePlatform NG AI VPN-1 / FW-1 NG AI Separate Management and Enforcement Point Simplified Mode for policies If you have any questions about this solution, please feel free to email at the above address And as always, this works 4 me.

First I created a security group in Users called VPN-Users in the AD cn=vpn-users,cn=users,dc=xxxx,dc=yyy This is an AD group that I put all my allowed VPN users into. Also, this group serves as the one that maintains the amount of SecureClient licenses you own. In SmartDashboard: Go to the Policy Menu / Global Properties From the LDAP Account Management branch, select Use LDAP, click OK Create a host for your Active Directory Server: MSADSrv Go to the Users Icon Right click Templates and select New Template (General Tab) Template Name: VPN User

(Authentication Tab) Authentication Scheme: VPN-1 & Firewall-1 Password Click OK

Go to Manage Menu / Servers. Create a LDAP Account Unit object. (General Tab) Give it a name, i.e., MSAD Check both boxes, CRL retrieval and User management Set Profile to Microsoft_AD

(Servers Tab) Click Add Choose the host that represents your AD Domain controller Leave Port at 389 Login DN: cn=administrator,cn=users,dc=xxxx,dc=yyy Enter administrator password twice Check both boxes, Read data from this server, Write data to this server

(Servers Tab / Encryption Tab) Check Use SSL Click Fetch for Fingerprint Set Encryption to strong and strong for Min and Max

(Objects Management) Select your AD object and fetch the branch Click OK Note: Active Directory only returns cn=users,dc=x wher ex is the AD domain. When users are defined under separate organizational untis those units should Be manually added as branches. When doing so, they MUST be in the format of OU=yyy,OU=yyy,DC=xxxx,DC=zzzz

(Authentication) Use user template: VPN User IKE pre-shared secret encryption key: AD Administrator password

Go to the Users Icon Right click on LDAP Groups and select New LDAP Group Enter a name: VPN-Users Select the account unit you created: MSAD Group s Scope First, select Only Sub Tree and select, cn=users,dc=xxxx,dc=yyy Note: This has to be done first because it is the only way I found to make the next step work correctly. Second, select Only Group in branch and put cn=vpn-users Note: This LDAP group will be used in the source of the Remote Access rule(s)

Open your VPN-1 gateway object and click on the Authentication branch and set the Policy Server Users group to VPN-Users

You can check the properties of a LDAP user by double clicking a user in the LDAP Account Unit. When using MS AD, the template is defined using VPN-1 & Firewall-1 Password If you click OK on these screens, you might get the following because the MS Schema has not been extended. This is why I do not use these tools for user maintenance.

When creating Remote Access rules, you use the LDAP Group VPN-Users Security Desktop Security

In closing, the important notes are: 1. The MS AD group VPN-Users MUST contain all the users that you wish to allow VPN access too regardless of what resources that you wish them to access. 2. The LDAP group VPN-Users is associated with the Policy Server in the Gateway properties. 3. You can add more LDAP groups that are associated with MS AD groups for more granular control over with resources your users have access to. This is what you see in the rules figures above. 4. Using this method of authentication and access control, you never use Checkpoint Groups only LDAP Groups.