<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Agent IP exclusion in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143305#M22247</link>
    <description>&lt;P&gt;Consult with TAC if the workaround proposed in&amp;nbsp;&lt;SPAN&gt;sk111374 is valid for your use case (or self test).&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Mar 2022 01:09:21 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2022-03-09T01:09:21Z</dc:date>
    <item>
      <title>Identity Agent IP exclusion</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143285#M22243</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;One of my customers recently started using a new remote access solution (from another vendor), which terminates on two "connectors" inside the corporate network.&lt;BR /&gt;Some of these remote users are also running the Identity Agent on their computer.&lt;BR /&gt;From the gateways's perspective, all of them are sharing the same two internal IP addresses.&lt;BR /&gt;This group of Identity Agents are thus competing for these IP's ownership, and make IA go crazy on the gateway.&lt;/P&gt;&lt;P&gt;I know the Identity Collector can be configured to exclude/ignore some specific IPs.&lt;BR /&gt;As far as I can see, no such provision has been made for the Identity Agent.&lt;/P&gt;&lt;P&gt;I guess I could try to solve this by blocking the Identity Agent from connecting to the gateway.&lt;BR /&gt;Is there a cleaner and more elegant way to do it?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 18:47:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143285#M22243</guid>
      <dc:creator>nmelay</dc:creator>
      <dc:date>2022-03-08T18:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent IP exclusion</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143305#M22247</link>
      <description>&lt;P&gt;Consult with TAC if the workaround proposed in&amp;nbsp;&lt;SPAN&gt;sk111374 is valid for your use case (or self test).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 01:09:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143305#M22247</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-09T01:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent IP exclusion</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143310#M22249</link>
      <description>&lt;P&gt;Thanks Chris for checking on this.&lt;BR /&gt;This SK seems unrelated though: it's about AD Query conflicting with Identity Agent, and how to prevent it from doing so.&lt;BR /&gt;Here, only Identity Agents are in use.&lt;/P&gt;&lt;P&gt;In this setup, I actually want to disable any form of IA from occurring from the connectors IPs, as the user access policy security is handled by the third party product.&lt;BR /&gt;A few users just happen to be running the Identity Agent on their computers (so that they get correctly identified when they're&amp;nbsp; actually on site, vs remotely connected).&lt;/P&gt;&lt;P&gt;Is seems like the only identity sources that allow any kind of filtering are AD Query and Identity Collector.&lt;/P&gt;&lt;P&gt;Then again, I guess I just need to prevent the Identity Agent from being able to reach the gateway in the first place.&lt;BR /&gt;I'll just try this before getting involved with TAC.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Mar 2022 01:56:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143310#M22249</guid>
      <dc:creator>nmelay</dc:creator>
      <dc:date>2022-03-09T01:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent IP exclusion</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143520#M22295</link>
      <description>&lt;P&gt;Not sure if this works, but have you tried setting gateway properties -&amp;gt; Identity Awareness -&amp;gt; Identity Agent Settings -&amp;gt; Agent Access -&amp;gt; Accessibility: "According to the Firewall policy" in combination with appropriate rules allowing your on-site client networks and denying these twoe remote access connector IPs?&lt;/P&gt;
&lt;P&gt;If this does not work because of implied rules, maybe you can disable implied rule for "Accept Identity Awareness control connections" in Global Properties -&amp;gt; Firewall and configure all needed rules for your Identity Awareness setup manually (including rules for Identity Sharing if in use)?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 14:57:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-IP-exclusion/m-p/143520#M22295</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2022-03-11T14:57:04Z</dc:date>
    </item>
  </channel>
</rss>

