We have set up a GP slit tunnel we allow SSO using LDAP and Certificate based authentication this allows access to everything in the corporate network. However for applications we have specifically listed by service and destination we have created additional authentication rules that force the user to authenticate using a MFA (Entrust) method through the captive portal. We are having issues narrowing down the DFS file share traffic to create a specific authentication rule. Our goal is to only allow corporate network file share access from a Windows 10 client after the additional MFA authentication has been successful. At the moment the traffic is accessible without the additional MFA (ENTRUST) authentication – HELP!
We have a Security policy in place that allows all known GP users access to the vpn_private zone (any/any). We have a no decrypt policy in place for skype traffic all other traffic is decrypted. Finally we have specific authentication policies in place for specific corporate resources based on port/ destination IP
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!