Managing Authentication Servers
On the Users & Objects view > User Management section > Authentication Servers page you can define and view different authentication servers where users can define both an external user database and the authentication method for users in that database.
You can configure these types of authentication:
-
RADIUS server - Define the details of a primary and secondary RADIUS server. The Quantum Spark Appliance can connect to these servers and recognize users defined in them and authenticated by them.
Note - In R81.10.10, Two-Factor Authentication is not supported when RADIUS or TACACS is configured for administrator access.
-
TACACS+ server - TACACS+ is an access control mechanism that enables user authentication and authorization of users by a separate server on the network.
Notes:
-
In the R81.10.X releases, this feature is available starting from the R81.10.05 version.
-
The VPN view > Remote Access section > Authentication Servers page does not show the section TACACS+ Servers.
-
-
Active Directory Domain - Define the details of the Active Directory domain that contains your organization's user information. The User Awareness
A Check Point software blade designed to associate users to IP addresses for logging and control purposes. feature can use these details to provide seamless recognition of users for logging purposes and user based policy configuration. This can be used for VPN remote access user authentication. When this is the case, additional configuration is necessary in the VPN view > Remote Access section > Remote Access Users page.
Configuring RADIUS Servers
RADIUS servers can be used for:
-
Defining a database of users with remote access privileges. Such users are both defined and authenticated by the RADIUS server.
-
Defining administrators. See the Users & Objects > User Management section > Administrators page.

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
In the section RADIUS Servers, click Configure.
-
In the Primary tab, enter this information:
-
IP address - The IP address of the RADIUS server.
-
Port - The port number through which the RADIUS server communicates with clients. The default is 1812.
-
Shared secret - The secret (pre-shared information used for message "encryption") between the RADIUS server and the Quantum SparkAppliance.
Select Show to see the shared secret.
Note - You cannot use these characters in a password or shared secret:
{ } [ ] ` ~ | ‘ " \
(maximum number of characters: 255) -
Timeout (seconds) - A timeout value in seconds for communication with the RADIUS server. The timeout default is 3 seconds.
Note - Click Clear if you want to remove information you entered in IP address and Shared secret.
-
-
On the Secondary tab, repeat Step 2 for a Secondary RADIUS server if applicable.
-
Click Apply
The primary and secondary servers (if defined) are added to the RADIUS section on the page.

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
Click the IP address link of the RADIUS server you want to edit.
-
Make the necessary changes.
-
Click Apply

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
Next to the RADIUS server you want to delete, click the Remove link.

-
Click the Users & Objects view > Users Management section > Administrators page.
-
In the line Administrator RADIUS authentication is, click Edit permissions.
-
Select Enable RADIUS authentication for administrators.
-
Select one of these:
-
Use roles defined on RADIUS server
-
Use default role for RADIUS users
-
In the Default Administrators Role, select the applicable role.
-
Optional: Select For Administrators use specific RADIUS group only.
Enter the applicable RADIUS groups.
-
-
-
Click Apply

-
Click the Users & Objects view > Users Management section > Administrators page.
-
Click the link in the sentence Remote access permissions for RADIUS users are disabled.
-
Select Enable RADIUS authentication for User Awareness, Remote Access and Hotspot.
-
Optional: Select For Remote Access use specific RADIUS groups only.
Enter the applicable RADIUS groups.
-
Click Apply
-
Configure the remote access permissions for RADIUS users in the VPN view > Remote Access section > Remote Access Users page.
Configuring TACACS+ Servers
|
Notes:
|

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
In the section TACACS+ Servers, click Configure.
-
In the Primary tab, enter this information:
-
IP address - The IP address of the TACACS+ server.
-
Port - The port number through which the TACACS+ server communicates with clients. The default is 49.
-
Shared secret - The secret (pre-shared information used for message "encryption") between the TACACS+ server and the Quantum Spark Appliance.
Select Show to see the shared secret.
Note - You cannot use these characters in a password or shared secret:
{ } [ ] ` ~ | ‘ " \
(maximum number of characters: 255) -
Timeout (seconds) - A timeout value in seconds for communication with the TACACS+ server. The timeout default is 3 seconds.
Note - Click Clear if you want to remove information you entered in IP address and Shared secret.
-
-
On the Secondary tab, repeat Step 2 for a Secondary TACACS+ server if applicable.
-
Click Apply

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
Next to the TACACS+ server you want to delete, click the Remove link.

-
Click the Users & Objects view > Users Management section > Administrators page.
-
In the line Administrator TACACS+ authentication is, click Edit permissions.
-
Select Enable TACACS+ authentication for administrators.
-
Select one of these:
-
Use roles defined on TACACS+ server
-
Use default role for TACACS+ users
In the Default Administrators Role, select the applicable role.
-
-
Click Apply
Configuring Active Directory Servers

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
In the section Active Directory section, click New.
-
Enter this information:
-
Domain - The domain name.
You cannot create another object with the same Domain as an existing Active Directory domain object.
-
IP address - The IP address of one of the domain controllers of your domain.
-
User name - The user must have administrator privileges to ease the configuration process and create a user based policy using the users defined in the Active Directory.
-
Password - The user's password.
Note - You cannot use these characters in a password or shared secret:
{ } [ ] ` ~ | ‘ " \
(maximum number of characters: 255) -
User DN - Click Discover for automatic discovery of the DN of the object that represents that user or enter the user DN manually.
For example:
CN=John James,OU=RnD,OU=Germany,O=Europe,DC=Acme,DC=com
-
-
Select Use user groups from specific branch only if you want to use only part of the user database defined in the Active Directory.
-
Click New.
-
Enter the branch in the Branch full DN in the text field.
-
Click Apply
-
-
Click Apply

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
In the section Active Directory section, select the Active Directory domain.
-
Click Edit.
-
Make the applicable changes.
You cannot change the Domain.
-
Click Apply

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
In the section Active Directory section, select the Active Directory domain.
-
Click Delete.
-
Click OK in the confirmation message.

-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
In the section Active Directory section, click Configure.
-
Select the applicable option:
-
Automatic synchronization
-
Manual synchronization
Note - With this option, you can synchronize the user database known to the appliance in all locations that this user database can be viewed.
For example:
-
The Users & Objects view > User Management section > Users page.
-
The Access Policy > view > Firewall section > Policy page > Source picker.
You cannot select a user from the Active Directory, only an Active Directory user group.
You can select a local user.
-
-
-
Click Apply

By default, users defined in the Active Directory are not given remote access permissions. Instead, in the VPN > Remote Access section > Remote Access Users page all users defined locally or in Active Directories can be selected to be granted remote access permissions per user.
-
Click the Users & Objects view > Users Management section > Authentication Servers page.
-
In the section Active Directory section, click the link in the sentence Remote access permissions for Active Directory users are set in.
-
Select All users in Active Directory.
With this option, it is not necessary to go to the VPN view > Remote Access section > Remote Access Users page and select specific users.
Note that most Active Directories contain a large list of users and you might not want to grant them all remote access permissions to your organization.
Usually you keep the Selected Active Directory user groups option and configure remote access permissions on the VPN view > Remote Access section > > Remote Access Users page.
-
Click Apply