<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to connect to the account unit LDAP servers behind the IPSec tunnel in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-connect-to-the-account-unit-LDAP-servers-behind-the/m-p/215175#M41097</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have problem accessing the &lt;STRONG&gt;LDAP account unit servers&lt;/STRONG&gt; of the external company that is &lt;STRONG&gt;behind the IPSec tunnel&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;This is my topology:&lt;/P&gt;&lt;PRE&gt;mgmt --&amp;gt; DCGW --&amp;gt; PerimGW ---IPsec--&amp;gt; Fortinet --&amp;gt; ExtLDAPs&lt;BR /&gt;           |&lt;BR /&gt;       IntLDAPs&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;mgmt&lt;/STRONG&gt;: Check Point SMS server, R81.20 JHFA Take 53&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;DCGW&lt;/STRONG&gt;: Check Point DataCenter gateway. Active-Standby cluster. R81.20 JHFA Take 53. Active Identity Awareness (both PDP and PEP). Open servers.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;PerimGW&lt;/STRONG&gt;: Check Point perimeter gateway. Active-Standby cluster. R81.20 JHFA Take 53. Active Identity Awareness (both PDP and PEP). Open servers.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;IntLDAPs&lt;/STRONG&gt;: Internal Active Directory servers used in &lt;STRONG&gt;1st LDAP account unit&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;IPsec&lt;/STRONG&gt;: domain based tunnel, NAT disabled inside the VPN community. IPsec works without any problems; a lot of communication in both directions.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Fortinet&lt;/STRONG&gt;: VPN gateway of the external company&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ExtLDAPs&lt;/STRONG&gt;: Active Directory servers of the external company used in &lt;STRONG&gt;2nd LDAP account unit&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;From two account units only the &lt;STRONG&gt;1st one works as expected&lt;/STRONG&gt;. Regarding the 2nd one which doesn't work at all I observe the following (strange) behavior:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When port &lt;STRONG&gt;389 is used in LDAP account unit&lt;/STRONG&gt; definition, it is not possible to make TCP connection to ExtLDAPs because TCP SYN packet is not sent by PerimGW to the IPSec tunnel (instead it is &lt;STRONG&gt;NATed by PerimGW&lt;/STRONG&gt; to the public VIP address). Making the TCP connection to the port 636 (nc -v server 636) works without any problem (goes to the IPSec tunnel).&lt;/LI&gt;&lt;LI&gt;When port &lt;STRONG&gt;636 is used in LDAP account unit&lt;/STRONG&gt; definition, it is not possible to make TCP connection to ExtLDAPs because TCP SYN packet is not sent by PerimGW to the IPSec tunnel (instead it is &lt;STRONG&gt;NATed by PerimGW&lt;/STRONG&gt; to the public VIP address). Making the TCP connection to the port 389 (nc -v server 389) works without any problem.&lt;/LI&gt;&lt;LI&gt;When I &lt;STRONG&gt;remove one of the LDAP servers from LDAP account unit&lt;/STRONG&gt; definition, both 389 and 636 ports of the not-used server can be accessed by running the "nc -v server port" command.&lt;/LI&gt;&lt;LI&gt;When communication is &lt;STRONG&gt;NATed, no logs&lt;/STRONG&gt; can be seen in SmartConsole. When communication goes to the &lt;STRONG&gt;IPSec tunnel, logs are there&lt;/STRONG&gt;. Turning on implied rules logging doesn't change anything.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Why my perimeter gateway does NAT instead of sendnig the communication to the IPsec tunnel?&lt;BR /&gt;What can I do in order to change this behavior?&lt;/P&gt;</description>
    <pubDate>Fri, 24 May 2024 10:39:17 GMT</pubDate>
    <dc:creator>benko2</dc:creator>
    <dc:date>2024-05-24T10:39:17Z</dc:date>
    <item>
      <title>Unable to connect to the account unit LDAP servers behind the IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-connect-to-the-account-unit-LDAP-servers-behind-the/m-p/215175#M41097</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have problem accessing the &lt;STRONG&gt;LDAP account unit servers&lt;/STRONG&gt; of the external company that is &lt;STRONG&gt;behind the IPSec tunnel&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;This is my topology:&lt;/P&gt;&lt;PRE&gt;mgmt --&amp;gt; DCGW --&amp;gt; PerimGW ---IPsec--&amp;gt; Fortinet --&amp;gt; ExtLDAPs&lt;BR /&gt;           |&lt;BR /&gt;       IntLDAPs&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;mgmt&lt;/STRONG&gt;: Check Point SMS server, R81.20 JHFA Take 53&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;DCGW&lt;/STRONG&gt;: Check Point DataCenter gateway. Active-Standby cluster. R81.20 JHFA Take 53. Active Identity Awareness (both PDP and PEP). Open servers.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;PerimGW&lt;/STRONG&gt;: Check Point perimeter gateway. Active-Standby cluster. R81.20 JHFA Take 53. Active Identity Awareness (both PDP and PEP). Open servers.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;IntLDAPs&lt;/STRONG&gt;: Internal Active Directory servers used in &lt;STRONG&gt;1st LDAP account unit&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;IPsec&lt;/STRONG&gt;: domain based tunnel, NAT disabled inside the VPN community. IPsec works without any problems; a lot of communication in both directions.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Fortinet&lt;/STRONG&gt;: VPN gateway of the external company&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;ExtLDAPs&lt;/STRONG&gt;: Active Directory servers of the external company used in &lt;STRONG&gt;2nd LDAP account unit&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;From two account units only the &lt;STRONG&gt;1st one works as expected&lt;/STRONG&gt;. Regarding the 2nd one which doesn't work at all I observe the following (strange) behavior:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When port &lt;STRONG&gt;389 is used in LDAP account unit&lt;/STRONG&gt; definition, it is not possible to make TCP connection to ExtLDAPs because TCP SYN packet is not sent by PerimGW to the IPSec tunnel (instead it is &lt;STRONG&gt;NATed by PerimGW&lt;/STRONG&gt; to the public VIP address). Making the TCP connection to the port 636 (nc -v server 636) works without any problem (goes to the IPSec tunnel).&lt;/LI&gt;&lt;LI&gt;When port &lt;STRONG&gt;636 is used in LDAP account unit&lt;/STRONG&gt; definition, it is not possible to make TCP connection to ExtLDAPs because TCP SYN packet is not sent by PerimGW to the IPSec tunnel (instead it is &lt;STRONG&gt;NATed by PerimGW&lt;/STRONG&gt; to the public VIP address). Making the TCP connection to the port 389 (nc -v server 389) works without any problem.&lt;/LI&gt;&lt;LI&gt;When I &lt;STRONG&gt;remove one of the LDAP servers from LDAP account unit&lt;/STRONG&gt; definition, both 389 and 636 ports of the not-used server can be accessed by running the "nc -v server port" command.&lt;/LI&gt;&lt;LI&gt;When communication is &lt;STRONG&gt;NATed, no logs&lt;/STRONG&gt; can be seen in SmartConsole. When communication goes to the &lt;STRONG&gt;IPSec tunnel, logs are there&lt;/STRONG&gt;. Turning on implied rules logging doesn't change anything.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Why my perimeter gateway does NAT instead of sendnig the communication to the IPsec tunnel?&lt;BR /&gt;What can I do in order to change this behavior?&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2024 10:39:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-connect-to-the-account-unit-LDAP-servers-behind-the/m-p/215175#M41097</guid>
      <dc:creator>benko2</dc:creator>
      <dc:date>2024-05-24T10:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to the account unit LDAP servers behind the IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-connect-to-the-account-unit-LDAP-servers-behind-the/m-p/215178#M41098</link>
      <description>&lt;P&gt;The outbound LDAP connects from the gateway to the Account Unit LDAP Server are handled by the implied rules by default.&lt;BR /&gt;The implicit rule takes effect before the access policy. Therefore, no logs are written and the VPN domains are not applied.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ImpliedRule.png" style="width: 456px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25865iCC1F64372E259896/image-dimensions/456x73?v=v2" width="456" height="73" role="button" title="ImpliedRule.png" alt="ImpliedRule.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The implied rule does not apply to ports or servers that are not configured in the account unit. The explicit rules take effect and logging / VPN routing is applied.&lt;/P&gt;&lt;P&gt;You can deactivate the implied rule by commenting out the following line in the $FWDIR/lib/implied_rules.def file on the management server.&lt;BR /&gt;#define ENABLE_LDAP_SERVER&lt;/P&gt;&lt;P&gt;Please note that explicit rules must then exist for both the internal and external account units.&lt;/P&gt;&lt;P&gt;Oliver&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2024 12:17:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Unable-to-connect-to-the-account-unit-LDAP-servers-behind-the/m-p/215178#M41098</guid>
      <dc:creator>OliverBayerlein</dc:creator>
      <dc:date>2024-05-24T12:17:20Z</dc:date>
    </item>
  </channel>
</rss>

