<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R82 + Windows Server 2025 – LDAPS Connection Fails in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271308#M103472</link>
    <description>&lt;P&gt;From Ai Copilot:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV class="ai-chatbot-conversation-assistant-text css-1m564fq"&gt;
&lt;H2&gt;R82 + Windows Server 2025 – LDAPS Connection Fails: Troubleshooting Guide&lt;/H2&gt;
&lt;P&gt;You are experiencing LDAPS (port 636) connection failures between Check Point R82 (Build 151) and Windows Server 2025, with the error:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;"Gateway could not connect to… Credentials are valid, but LDAP communication with the server failed." and&lt;CODE&gt;cpopenssl s_client -connect DC_FQDN:636&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;returns:&lt;BR /&gt;&lt;CODE&gt;Verify return code: 21 (unable to verify the first certificate)&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You have already followed&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk164834" target="_blank" rel="noopener"&gt;sk164834&lt;/A&gt;. Here are additional troubleshooting steps and explanations based on Check Point documentation and best practices.&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;1. Understanding the Error&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Verify return code: 21 (unable to verify the first certificate)&lt;/STRONG&gt;&lt;BR /&gt;This means the Check Point server cannot validate the certificate chain presented by the Domain Controller (DC). Most often, this is because the DC's certificate chain (including the Root CA and any intermediate CAs) is not trusted by the Check Point server.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H3&gt;2. Required Steps for LDAPS Trust&lt;/H3&gt;
&lt;H4&gt;A. Export the DC's Certificate Chain&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;On the Domain Controller:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Run:
&lt;PRE&gt;&lt;CODE class="language-shell"&gt;certutil -store -v MY
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Identify the certificate used for LDAPS (look for the one with the DC's FQDN as the CN).&lt;/LI&gt;
&lt;LI&gt;Export the full certificate chain (including the Root CA and any intermediates).&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Alternatively, from the Check Point server:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Run:
&lt;PRE&gt;&lt;CODE class="language-shell"&gt;cpopenssl s_client -connect &amp;lt;DC_FQDN&amp;gt;:636
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Copy the certificate text between&lt;CODE&gt;-----BEGIN CERTIFICATE-----&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;and&lt;CODE&gt;-----END CERTIFICATE-----&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;to a file (e.g.,&lt;CODE&gt;dc_cert.cer&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;).&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;B. Import Certificates to Check Point&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;On both the Security Management Server (SMS) and Gateway:&lt;/STRONG&gt;
&lt;OL&gt;
&lt;LI&gt;Copy the exported certificate files to the server.&lt;/LI&gt;
&lt;LI&gt;Import the Root CA and any intermediate CA certificates into the system's trusted store.
&lt;UL&gt;
&lt;LI&gt;For Gaia, use the WebUI:&lt;BR /&gt;&lt;EM&gt;Home &amp;gt; System Management &amp;gt; Certificates &amp;gt; Trusted CA&lt;/EM&gt;&lt;/LI&gt;
&lt;LI&gt;Or, for CLI:
&lt;PRE&gt;&lt;CODE class="language-shell"&gt;cpca_client lscert -kind ICA
# Import using cpca_client or system tools as appropriate
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Restart Check Point services if required.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;C. Verify Certificate Trust&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;After importing, re-run:
&lt;PRE&gt;&lt;CODE class="language-shell"&gt;cpopenssl s_client -connect &amp;lt;DC_FQDN&amp;gt;:636
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;UL&gt;
&lt;LI&gt;The output should now show:
&lt;PRE&gt;&lt;CODE&gt;Verify return code: 0 (ok)
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H3&gt;3. Additional Troubleshooting&lt;/H3&gt;
&lt;H4&gt;A. Check for Stronger Authentication Requirements&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;If you see errors about "LDAP_STRONG_AUTH_REQUIRED" or similar, check the DC's security policy:
&lt;UL&gt;
&lt;LI&gt;On the DC, run&lt;CODE&gt;secpol.msc&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Go to:&lt;BR /&gt;&lt;STRONG&gt;Security Settings &amp;gt; Local Policies &amp;gt; Security Options &amp;gt; Domain controller: LDAP server signing requirements&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Set to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;None&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(for testing) or ensure your Check Point configuration supports signing.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;B. Confirm LDAPS Port and SSL Settings&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Ensure the correct port (636) is used and SSL is enabled in the LDAP Account Unit or Directory Scanner settings.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;C. Policy Installation&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;After making changes, always&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;install policy&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from SmartConsole to apply new settings.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;D. Certificate Fingerprint&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;In SmartConsole, when configuring the LDAP Account Unit, use the "Fetch" button on the Encryption tab to retrieve and trust the DC's certificate fingerprint.&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H3&gt;4. References&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk84620" target="_blank" rel="noopener"&gt;sk84620&lt;/A&gt;&lt;/STRONG&gt;: How to configure Endpoint Security Server to connect to Domain Controller (DC) via LDAPS&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk109756" target="_blank" rel="noopener"&gt;sk109756&lt;/A&gt;&lt;/STRONG&gt;: How to verify LDAP server Certificate Fingerprint obtained from the Domain Controller&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk148312" target="_blank" rel="noopener"&gt;sk148312&lt;/A&gt;&lt;/STRONG&gt;: Authentication randomly fails when using Secure LDAP&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk104785" target="_blank" rel="noopener"&gt;sk104785&lt;/A&gt;&lt;/STRONG&gt;: "Binding to LDAP server: Failed to check ssl" error&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;
&lt;H2&gt;Summary Table&lt;/H2&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Step&lt;/TH&gt;
&lt;TH&gt;Action&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Export Certificates&lt;/TD&gt;
&lt;TD&gt;From DC, export full chain (Root, Intermediate, DC cert)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Import to Check Point&lt;/TD&gt;
&lt;TD&gt;Add to trusted CA store on SMS and Gateway&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Verify&lt;/TD&gt;
&lt;TD&gt;Use&lt;CODE&gt;cpopenssl s_client -connect &amp;lt;DC_FQDN&amp;gt;:636&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;and check for&lt;CODE&gt;Verify return code: 0&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Policy&lt;/TD&gt;
&lt;TD&gt;Install policy after changes&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Security Policy&lt;/TD&gt;
&lt;TD&gt;Check "LDAP server signing requirements" on DC&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;HR /&gt;
&lt;H2&gt;Final Notes&lt;/H2&gt;
&lt;UL&gt;
&lt;LI&gt;This issue is not unique to Windows Server 2025; it is a common trust chain problem with LDAPS.&lt;/LI&gt;
&lt;LI&gt;If you have followed all steps and still see issues, double-check that the full certificate chain is imported and trusted.&lt;/LI&gt;
&lt;LI&gt;If you are using a lab CA, ensure the Root CA is not expired or revoked.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you need step-by-step commands for importing certificates on Gaia, let me know your exact environment (SMS, Gateway, or both) and I can provide tailored instructions.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="css-1lj4tcw"&gt;
&lt;DIV class="css-1ggc6ok"&gt;
&lt;DIV&gt;BE AWARE&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="css-rtx1wd"&gt;Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ai-chatbot-references css-g9n3fs"&gt;
&lt;DIV class="css-131f8vm"&gt;Learn more:&lt;/DIV&gt;
&lt;DIV class="css-zs1iv6"&gt;
&lt;OL class="css-3yupri"&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R82/SmartEndpoint_OLH/EN/Content/Topics-EPSG-R81.20/DirectoryScanner.html" target="_blank" rel="noopener"&gt;R82 Harmony Endpoint Server Administration Guide - DirectoryScanner&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_VSX_AdminGuide/Content/Topics-VSXG/Troubleshooting-General-Steps.htm" target="_blank" rel="noopener"&gt;R82 VSX Administration Guide - Troubleshooting-General-Steps&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk84620" target="_blank" rel="noopener"&gt;sk84620 - How to configure Endpoint Security Server to connect to Domain Controller (DC) via LDAPS&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 19 Feb 2026 13:06:58 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2026-02-19T13:06:58Z</dc:date>
    <item>
      <title>R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271149#M103397</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In my lab environment I'm running:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Check Point R82 – Build 151&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Distributed deployment&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Windows Server 2025&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;LDAPS (port 636)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;AD CS Enterprise Root CA&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Working:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Port 636 reachable&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;I can browse AD structure in SmartConsole&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Failing:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Connection attempts fails with:&lt;BR /&gt;&lt;EM&gt;“Gateway could not connect to… Credentials are valid, but LDAP communication with the server failed.&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I have done the solution steps in&amp;nbsp;sk164834.&lt;BR /&gt;&lt;BR /&gt;On both SMS and Gateway:&lt;/P&gt;&lt;P&gt;cpopenssl s_client -connect DC_FQDN:&lt;SPAN class=""&gt;636&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Returns:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;Verify &lt;SPAN class=""&gt;return&lt;/SPAN&gt; code: &lt;SPAN class=""&gt;21&lt;/SPAN&gt; (unable to verify the first certificate)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Question:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Is anyone able to replicate this behavior on R82 with Windows Server 2025?&lt;BR /&gt;Any tips on additional troubleshooting steps would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 15:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271149#M103397</guid>
      <dc:creator>ghosty</dc:creator>
      <dc:date>2026-02-18T15:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271219#M103429</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16383"&gt;@Vincent_Bacher&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe you may had mentioned in one post you had this windows server 2025 in the lab? Apologies if I am mistaken. I spoke to Casper about this yesterday, but we dont sadly have that image in the lab, so cant set one up to test. Based on remote we did, Im 99.99% sure it is something on that server causing an issue, as we dont even see any drops or traffic even hitting the firewall. We even disabled native windows fw on the server, no joy.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 14:57:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271219#M103429</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T14:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271223#M103430</link>
      <description>&lt;P&gt;Please confirm the Jumbo take applied to the MGMT / gateways and version of IDC if used etc.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 14:53:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271223#M103430</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-02-18T14:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271224#M103431</link>
      <description>&lt;P&gt;Well, you are in luck, my friend. I just checked and looks my colleague did upload windows 2025 image, so give me some time, will let you know in 1 hour tops if it works or not.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 15:00:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271224#M103431</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T15:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271231#M103433</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/83701"&gt;@ghosty&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just set it all up, rebooted, disabled windows fw, exact same issue as you...let me keep working on it and see if I can fix it.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 15:42:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271231#M103433</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T15:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271232#M103434</link>
      <description>&lt;P&gt;I tested with any any allow rule, got exact same issue like you did Casper when we did remote yesterday, so thats how Im 100% sure its windows issue.&lt;/P&gt;
&lt;P&gt;Here is what I ran to make it work (found this after 10 mins on Google lol)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;!--ScriptorStartFragment--&gt;netsh advfirewall set allprofiles state off&lt;!--ScriptorEndFragment--&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 15:52:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271232#M103434</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T15:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271238#M103439</link>
      <description>&lt;P&gt;This did not solve the issue for me, unfortunately.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 16:46:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271238#M103439</guid>
      <dc:creator>ghosty</dc:creator>
      <dc:date>2026-02-18T16:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271239#M103440</link>
      <description>&lt;P&gt;Just running the base version atm.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 16:47:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271239#M103440</guid>
      <dc:creator>ghosty</dc:creator>
      <dc:date>2026-02-18T16:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271240#M103441</link>
      <description>&lt;P&gt;I did reboot after doing it, mind you.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 16:47:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271240#M103441</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T16:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271241#M103442</link>
      <description>&lt;P&gt;Still didn't work after reboot &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 16:54:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271241#M103442</guid>
      <dc:creator>ghosty</dc:creator>
      <dc:date>2026-02-18T16:54:09Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271243#M103444</link>
      <description>&lt;P&gt;Sorry mate, I got nothing else then &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 16:55:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271243#M103444</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T16:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271245#M103446</link>
      <description>&lt;P&gt;No I just suggested some debugs.&lt;/P&gt;
&lt;P&gt;Any news about the issue ?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 17:23:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271245#M103446</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-18T17:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271246#M103447</link>
      <description>&lt;P&gt;Got it, sorry, my bad then.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/83701"&gt;@ghosty&lt;/a&gt;&amp;nbsp;, here is IA debugs I got from TAC while back.&lt;/P&gt;
&lt;P&gt;# cd $FWDIR/log&lt;BR /&gt;# rm pdpd.elg.*&lt;BR /&gt;# echo "=debug_start=" &amp;gt;&amp;gt; $FWDIR/log/pdpd.elg&lt;BR /&gt;(•) To turn pdp debug on:&lt;BR /&gt;# adlog a d on&lt;BR /&gt;# pdp debug on&lt;BR /&gt;# pep debug on&lt;BR /&gt;# pdp debug set all all&lt;BR /&gt;(•) Replicate the issue&lt;BR /&gt;(•) To turn them off:&lt;BR /&gt;# adlog a d off&lt;BR /&gt;# pdp debug unset all all&lt;BR /&gt;# pdp debug off&lt;BR /&gt;# pep debug off&lt;BR /&gt;# pdp d reset&lt;BR /&gt;# pep d unset all all&lt;BR /&gt;Collect debug:&lt;BR /&gt;$FWDIR/log/pdpd.elg&lt;BR /&gt;# tar zcvf pdpd_debugs.tgz pdpd.elg*&lt;BR /&gt;# tar zcvf pepd_debugs.tgz pepd.elg*&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 17:37:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271246#M103447</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T17:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271247#M103448</link>
      <description>&lt;P&gt;Never good idea to run base version without jumbo take. What about IDC? Or you use AD query? Are you able to fetch the fingerprints and branches in the ldap account unit?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 17:40:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271247#M103448</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-02-18T17:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271248#M103449</link>
      <description>&lt;P&gt;Not sure if thats even related, but nevertheless, I always install latest jumbo in my lab the day it comes out.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 17:42:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271248#M103449</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T17:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271250#M103450</link>
      <description>&lt;P&gt;consider increasing the debug file size and number of rotations&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 18:09:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271250#M103450</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-18T18:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271251#M103451</link>
      <description>&lt;P&gt;Yes, good point, Vince.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 18:17:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271251#M103451</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-18T18:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271277#M103454</link>
      <description>&lt;P&gt;Hey Casper,&lt;/P&gt;
&lt;P&gt;Mind sending the output of services.msc from your lab windows? I want to compare it to mine, see if its different.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 03:29:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271277#M103454</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-19T03:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271281#M103456</link>
      <description>&lt;P&gt;Is this question&amp;nbsp;"&lt;SPAN&gt;Are you able to fetch the fingerprints and branches in the ldap account unit? " answered?&lt;BR /&gt;And are the debugs collected?&lt;BR /&gt;&lt;BR /&gt;Asking because in pdpd.elg you can clearly see all details about ldap communication and due to the error message in the starting post i would says pdpd.elg will be helpful to see any hints.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 06:49:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271281#M103456</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-02-19T06:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: R82 + Windows Server 2025 – LDAPS Connection Fails</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271286#M103460</link>
      <description>&lt;P&gt;Yes, fetch is working.&lt;BR /&gt;&lt;BR /&gt;Debug files are attached.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2026 09:46:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R82-Windows-Server-2025-LDAPS-Connection-Fails/m-p/271286#M103460</guid>
      <dc:creator>ghosty</dc:creator>
      <dc:date>2026-02-19T09:46:20Z</dc:date>
    </item>
  </channel>
</rss>

