<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Awareness on Remote Gateway in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/79856#M11651</link>
    <description>Thank you RS_Daniel! you solve my problem too!</description>
    <pubDate>Thu, 26 Mar 2020 19:26:05 GMT</pubDate>
    <dc:creator>MikeB</dc:creator>
    <dc:date>2020-03-26T19:26:05Z</dc:date>
    <item>
      <title>Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74723#M11643</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an issue with Identity Awareness where I want to configure IDA on a remote gateway.&lt;/P&gt;&lt;P&gt;the topology is&amp;nbsp;&lt;/P&gt;&lt;P&gt;AD --&amp;gt; Corporate GW &amp;lt;---S2S VPN---&amp;gt; Remote GW&amp;nbsp;&lt;/P&gt;&lt;P&gt;IDA is working well in the main office where the AD is and the corporate GW has direct access to the AD. when I try to connect the remote Gateway with the AD I get the following error:&lt;/P&gt;&lt;P&gt;"An error was detected while trying to authenticate against the AD server.&amp;nbsp; It may be a problem of bad configuration or connectivity.&amp;nbsp; Please refer to the troubleshooting guide for more help"&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are no instructions in the IDA manual or SK on how to work in such a configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have experience with it or can help troubleshoot?&lt;/P&gt;&lt;P&gt;( I have already contacted support but they aren't very helpful)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 19:27:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74723#M11643</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2020-02-10T19:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74726#M11644</link>
      <description>&lt;P&gt;Shahar,&lt;/P&gt;
&lt;P&gt;maybee it‘s something with the vpn tunnel. Check for connections from your remote gateway to your AD servers. This connections will be initiated with the external IP of your remote gateway. Maybee they are not encrypted or blocked not going the through the tunnel.&lt;/P&gt;
&lt;P&gt;Another way... use identity sharing, you can configure your central gateway to share identities with other gateway and your remote gateway should get the identities from the central gateway.&lt;/P&gt;
&lt;P&gt;The error is shown if you run the IA wizard for the remote gateway ?&lt;BR /&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 20:24:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74726#M11644</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-02-10T20:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74727#M11645</link>
      <description>no error is shown during the creation of the IA wizard,&lt;BR /&gt;I checked all communication and it looks like it is going through the VPN tunnel. We checked ports block with support, we didn't see any drop. We also to allow any service between AD and GW. maybe the back connections from the AD to the GW are blocked. we are still checking but didn't see anything.</description>
      <pubDate>Mon, 10 Feb 2020 22:39:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74727#M11645</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2020-02-10T22:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74774#M11646</link>
      <description>&lt;P&gt;I would recommend the same - identity sharing. Else I stumbled across this one, sounds like yours:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105950" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105950&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;and this might help too&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk113747" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk113747&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We use Identity Collector instead of direct connection to AD which seems much soother from our experience &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 08:33:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74774#M11646</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-02-11T08:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74793#M11647</link>
      <description>&lt;P&gt;Hello Shahar,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had a similar issue in the past. We noticed LDAP queries did not go trough the tunnel because LDAP traffic is accepted by implied rules and is not encrypted. Used workaround was the procedure in&amp;nbsp;&lt;SPAN&gt;sk26059 and create specific rules for that traffic.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;HTH.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 12:39:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74793#M11647</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2020-02-11T12:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74993#M11648</link>
      <description>Thanks for the quick reply, indeed this is what CP says. It seems weird that LDAP is in an implied rule. I think that the best option, in this case, is Identity Sharing instead of modifying inspection rules. Let's see if this one works</description>
      <pubDate>Wed, 12 Feb 2020 14:42:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/74993#M11648</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2020-02-12T14:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/75023#M11649</link>
      <description>&lt;P&gt;If the gateways in question are clusters be careful with identity sharing, because we saw identity sharing causing IPSEC replay attacks because of standby members!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 18:51:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/75023#M11649</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2020-02-12T18:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/75078#M11650</link>
      <description>The main GW which do the identity sharing is a cluster. Is there a way to mitigate it?</description>
      <pubDate>Thu, 13 Feb 2020 10:27:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/75078#M11650</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2020-02-13T10:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness on Remote Gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/79856#M11651</link>
      <description>Thank you RS_Daniel! you solve my problem too!</description>
      <pubDate>Thu, 26 Mar 2020 19:26:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-on-Remote-Gateway/m-p/79856#M11651</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2020-03-26T19:26:05Z</dc:date>
    </item>
  </channel>
</rss>

