- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-02-2020 01:19 PM - edited 10-02-2020 01:20 PM
Hello folks!
Whenever this question is posed, the response is always a question: "Why do you want multiple gateways on the same firewall?".
Customer wants to use SAML Idp (Azure MFA) which is fine unless you need a fallback authentication profile since SAML is not supported in an Authentication Sequence. The customer also insists that contractors (me) use a locally defined account. Since I can't define a sequence to accomplish this I was wondering if anyone knows if multiple gateways behind one IP are finally supported. One for SAML, one for everything else, with different levels of access in policy.
Other vendors seems to support this functionality but that's not really an answer...
Thoughts?
02-03-2022 12:24 PM - edited 09-02-2022 05:58 AM
Hi, I have been looking for the same answer, by enabling SAML on the vpn you end up loosing functionality and you must have a mix of SAML and AD groups to keep being able to segment the VPN.
I have been browsing the community and found that you can possibly configure different gateways using loopback addresses, however no documentation I have found. After many tests and tries i was finally able to configure different gateways using NAT. However they only work with SSL.
If you wish to segment admin users from regular users without AD groups, this might be a good solution, since admin users do not require much bandwidth for admin related tasks.
HTH
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!