<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Collector - Switch between LAN and WIFI - Active Directory in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167425#M30276</link>
    <description>&lt;P&gt;I see, we're doing machine and user authentication on Cable and WiFi, so if the user moves to WiFi, we're getting an machine authentication update into CheckPoint Identity.&amp;nbsp;&lt;BR /&gt;Like I told you, we're going to run an extended POC in some sites, and see more in depth how it's going.&lt;BR /&gt;Our advantage it would be that on CheckPoint identity, we're OK with Machine identification and User identification it's an bonus.&lt;BR /&gt;(might change through time )&lt;BR /&gt;&lt;BR /&gt;If I would be in your position, I would look into Identity Agent, depending on the number of users, your structure and global spread,&lt;BR /&gt;(because Identity Portal might not be OK, if an application would require Internet Access and might not be related to websites browsing)&lt;BR /&gt;&lt;BR /&gt;If I may ask, from ISE, you get through pxGrid data into Identity Collector, can you tell what IC version you use and what ISE version you are? I'm asking this because, since Checkpoint change the IC code for ISE/pxGrid v2 with R81.040.000 I have seen some issues with that connection towards ISE/pxGrid.&amp;nbsp;&lt;BR /&gt;The main connector we use is R80.119.000 as that is stable since half of year or so &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jan 2023 11:27:13 GMT</pubDate>
    <dc:creator>Sorin_Gogean</dc:creator>
    <dc:date>2023-01-11T11:27:13Z</dc:date>
    <item>
      <title>Identity Collector - Switch between LAN and WIFI - Active Directory</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167406#M30268</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;we have the following problem. We are using Identity Collector with Active Directory.&lt;/P&gt;
&lt;P&gt;When Notebook users detatch there LAN connection and connect to the wifi they will get a new ip address but there is no new active directory authentication. So the users are not identified on the firewall.&lt;/P&gt;
&lt;P&gt;Does anybody have a solution for this problem? Is there maybe a windows way or do we have to force the users to authenticate via portal or make use of the identity agent.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 08:49:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167406#M30268</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2023-01-11T08:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector - Switch between LAN and WIFI - Active Directory</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167414#M30270</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you using any dot1X authentication/authorization solution ?&lt;BR /&gt;We're using ISE for WiFi and Copper ports authorization, so when users move from Cable to WiFi, some ISE events get triggered so we're collecting that through pxGrid . Still we're in a testing phase, we're not fully implemented with Identity.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The only way I would see to tackle this, is to use Identity Agent, but the only problem I have is that the Identity Agent support only a limited number "Identity Agents work well in small deployments, i.e. less than 20,000 users per PDP. By selecting&lt;BR /&gt;which gateway the Identity Agent connects to, you can manage the load" so in some cases it could be an issue.&lt;BR /&gt;One other way - that I didn't try - is to enable browser base authentication, still that is not applicable every time/everywhere.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;BR /&gt;&lt;BR /&gt;PS:&amp;nbsp;&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="100%"&gt;&lt;STRONG&gt;Identity Agents&lt;/STRONG&gt;&lt;BR /&gt;Identities are acquired using full, light or custom configured endpoint agents that are installed on the Endpoint computers.&lt;BR /&gt;Use Case&lt;BR /&gt; High level of security; packet tagging to prevent IP spoofing,&lt;U&gt;&lt;EM&gt; IP change detection&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt; Transparent authentication with Kerberos Single Sign-On&lt;BR /&gt; Connectivity even while roaming to another network&lt;BR /&gt;Session Details&lt;BR /&gt; IP, User, AD Machine in an Active Directory environment&lt;BR /&gt;Authentication Process&lt;BR /&gt; On access acquired from Internal, AD, Kerberos Single Sign-On&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 11 Jan 2023 10:42:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167414#M30270</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-01-11T10:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector - Switch between LAN and WIFI - Active Directory</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167416#M30271</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;we also have a Cisco ISE. But we are authenticating with machine certificates there. So ISE only logs in/out the machine and not the user. This leads to a logout of the user as well when the machine is disconnected from LAN. Without the ISE the user session would not be killed so that, if the user switches back to LAN, the session would stay authenticated.&lt;/P&gt;
&lt;P&gt;As you mentioned above, the only option I see at the moment, is the identity agent, or forcing the users to authenticate via Idenitity Portal.&lt;/P&gt;
&lt;P&gt;Maybe another one has a better solution.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 10:57:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167416#M30271</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2023-01-11T10:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector - Switch between LAN and WIFI - Active Directory</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167425#M30276</link>
      <description>&lt;P&gt;I see, we're doing machine and user authentication on Cable and WiFi, so if the user moves to WiFi, we're getting an machine authentication update into CheckPoint Identity.&amp;nbsp;&lt;BR /&gt;Like I told you, we're going to run an extended POC in some sites, and see more in depth how it's going.&lt;BR /&gt;Our advantage it would be that on CheckPoint identity, we're OK with Machine identification and User identification it's an bonus.&lt;BR /&gt;(might change through time )&lt;BR /&gt;&lt;BR /&gt;If I would be in your position, I would look into Identity Agent, depending on the number of users, your structure and global spread,&lt;BR /&gt;(because Identity Portal might not be OK, if an application would require Internet Access and might not be related to websites browsing)&lt;BR /&gt;&lt;BR /&gt;If I may ask, from ISE, you get through pxGrid data into Identity Collector, can you tell what IC version you use and what ISE version you are? I'm asking this because, since Checkpoint change the IC code for ISE/pxGrid v2 with R81.040.000 I have seen some issues with that connection towards ISE/pxGrid.&amp;nbsp;&lt;BR /&gt;The main connector we use is R80.119.000 as that is stable since half of year or so &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 11:27:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector-Switch-between-LAN-and-WIFI-Active-Directory/m-p/167425#M30276</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-01-11T11:27:13Z</dc:date>
    </item>
  </channel>
</rss>

