

Choose a WiKID domain to the network client.Create a name such as "Checkpoint Firewall/VPN".Next we add a specific network client for the Checkpoint firewall/vpn: You should be able to leave the settings as is and click 'Initialize'.Click on the 'Configuration' tab in the WiKIDAdmin web interface.On the WiKID Server, be sure to enable Radius: Give this server a priority if multiple Radius servers are configured.Select 'Radius version 1.0 Compatible'.If need be, you can change to port 1645 on WiKID but it is not recommended. 'New Radius should use port 1812, which is the default for WiKID. In the 'Service' field select 'New Radius'.In the 'Host' field enter the host name that was configured above.In the 'Comment' field enter comments of your choice, such as 'WiKID Radius interface'.In the 'Name' field assign a name for the Radius server.

A Radius Server Properties window should be displayed. Click on 'New', from the menu select Radius.For clarity, enter "WiKID two-factor authentication" or some such for a comment.Ĭonfigure the WiKID Strong Authentication Radius interface in the Check Point Policy Editor. In the Workstation Properties window, enter the workstation name, IP Address, choose 'Host' for Type.Click on 'Manage' then 'Network Objects'.Start by adding the workstation object for a Radius server in the Check Point Policy Editor: This document provides information on how to enable the Radius interface on FireWall-1 to accept one-time passwords from the WiKID Strong Authentication System. We assume that you have already installed Check Point VPN-1/FireWall-1.
