<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Getting_Started_Guide_PDP_Broker_HF_v7 .pdf in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/99982#M13086</link>
    <description>&lt;P&gt;we run r80.30 across the board. what is the procedure notes to deploying identity broker on r80.30? we don't want to install it on r80.10 with HF&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Oct 2020 15:51:32 GMT</pubDate>
    <dc:creator>Alex_Mondol</dc:creator>
    <dc:date>2020-10-23T15:51:32Z</dc:date>
    <item>
      <title>Getting_Started_Guide_PDP_Broker_HF_v7 .pdf</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/40877#M13084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scaling identity sharing across management domains and geographical regions is achieved using the PDP Broker architecture element. This document is describing the functionality, installation and related troubleshooting of the PDP Broker. The PDP Broker software&amp;nbsp;HF for R80.10 can be requested contacting Check Point Sales Engineers and will be provided by Check Point Solution Center.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 08:38:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/40877#M13084</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2019-01-22T08:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Getting_Started_Guide_PDP_Broker_HF_v7 .pdf</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/78171#M13085</link>
      <description>&lt;P&gt;Those interested in the PDP Broker should now explore R80.40 for this functionality.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 02:17:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/78171#M13085</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-03-13T02:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: Getting_Started_Guide_PDP_Broker_HF_v7 .pdf</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/99982#M13086</link>
      <description>&lt;P&gt;we run r80.30 across the board. what is the procedure notes to deploying identity broker on r80.30? we don't want to install it on r80.10 with HF&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 15:51:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/99982#M13086</guid>
      <dc:creator>Alex_Mondol</dc:creator>
      <dc:date>2020-10-23T15:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: Getting_Started_Guide_PDP_Broker_HF_v7 .pdf</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100079#M13087</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24495"&gt;@Alex_Mondol&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no availability for this project on versions below R80.40, and also the document on this thread was written for R80.10 RFE which is not recommended to use anymore.&lt;/P&gt;
&lt;P&gt;Identity Broker is a feature which was released as part of R80.40. There is no need to install an additional HF on top of that. I recommend reviewing Identity Awareness R80.40 admin guide for more info.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Oct 2020 09:26:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100079#M13087</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2020-10-25T09:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Getting_Started_Guide_PDP_Broker_HF_v7 .pdf</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100307#M13088</link>
      <description>&lt;P&gt;Thank you for your response.&lt;/P&gt;&lt;P&gt;New Question arrises. We have two VSX Cluster Gateways at two geographical locations separated by at least 1 hr drive time. Each Cluster of 23500 series gateways we have VSXs that incorporate perimeter FWs of the following like Perimeter, BC, Departmental, and VPN. Since we have collapsed these different zones into two clusters or four gateways if we have deployed two Identity Collector Servers (one at each geographical location) who would you recommend becoming PDPs and PEPs? do the gateways now run PDP and PEP on all FWs?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 21:39:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100307#M13088</guid>
      <dc:creator>Alex_Mondol</dc:creator>
      <dc:date>2020-10-27T21:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Getting_Started_Guide_PDP_Broker_HF_v7 .pdf</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100360#M13089</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24495"&gt;@Alex_Mondol&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;[I would assume you've meant there are 2 separate clusters, one per site (overall 4 gateways).]&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I don't think there is an implementation that we consider as a mistake here.&lt;/P&gt;
&lt;P&gt;However, take into consideration that PDP is the one which perform the database operations (communication with IDC, perform group fetch by LDAP, Access roles matching with SmartDashboard configuration) - if both cluster gateways will be configured as PDP, this operation will be done twice.&lt;/P&gt;
&lt;P&gt;The other option is to have only one PDP gateway (one of the cluster gateways) and use Identity Sharing between sites.&lt;/P&gt;
&lt;P&gt;If we are handling a small scale environment (user-wise) - although this is the more resource efficient implementation, I would recommend take the first one (each site configure PDP gateway), to simplify the implementation.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 10:38:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100360#M13089</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2020-10-28T10:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Getting_Started_Guide_PDP_Broker_HF_v7 .pdf</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100425#M13090</link>
      <description>&lt;P&gt;Yes, your assumption is correct&amp;nbsp;&lt;EM&gt;...here are 2 separate clusters, one per site (overall 4 gateways).&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Each cluster runs a perimeter (Blades running: IDS/IPS/AV/ANITBOT/), BC (Blades running: AV/Antibot), and VPN(Blades same as Perimeter) All VSX infrastructure...&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Would a good design be to put a load of resources for&amp;nbsp;&lt;SPAN&gt;PDP is the one which performs the database operations (communication with IDC, perform group fetch by LDAP, Access roles matching with SmartDashboard configuration)&amp;nbsp; onto the BC which doesn't have too significant load on it to be the PDP and share with PEPs of Perimeter and VPN?&amp;nbsp; &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;Currently, we have 23500 boxes with 128gig of memory share between VSX and our CORE-XL count for CPUs are 8&amp;nbsp; for each VS.&amp;nbsp; With these metrics would BC which is less loaded in traffic and inspection points be able to handle the PDP role?&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 19:31:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Getting-Started-Guide-PDP-Broker-HF-v7-pdf/m-p/100425#M13090</guid>
      <dc:creator>Alex_Mondol</dc:creator>
      <dc:date>2020-10-28T19:31:56Z</dc:date>
    </item>
  </channel>
</rss>

