<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8646#M90731</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First, there is no such gateway version R80: you are either using R80.10 or R80.20.&lt;/P&gt;&lt;P&gt;That said for this question it's not terribly relevant.&lt;/P&gt;&lt;P&gt;One relevant question: are you using Identity Collector or ADQuery?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your gateway shows the users it has been told about by the AD server.&lt;/P&gt;&lt;P&gt;A seperate LDAP lookup must be performed on each user (and management) to get the groups associated with each user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Nov 2018 18:16:52 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-11-23T18:16:52Z</dc:date>
    <item>
      <title>Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8644#M90729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, im trying to activate my identity Awareness blade on R80 gateway, in the wizard the connection with my AD result ok, but when Im trying to create a Access Role requesting a list of users of the domain controller, it doesn't&amp;nbsp; work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I use the&amp;nbsp;test_ad_connectivity -x itsvsa.com.ve -o my_test2.txt -s -w command on expert mode, I can see these results:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[Expert@gwr801:0]# cat my_test2.txt&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;(&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :status (SUCCESS_WMI)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :err_msg ("ADLOG_SUCCESS;LDAP_OPERATIONS_ERROR")&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :ldap_status (LDAP_OPERATIONS_ERROR)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :wmi_status (ADLOG_SUCCESS)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :timestamp ("Fri Nov 23 10:37:19 2018")&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using another diagnostic commands, the output shows connection with the active directory, in fact I can observe data for machines on =the domain an users of certainf OUs. but in the Securty Management I can not obtaing the user list, to create access roles based rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;other ouptputs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;STRONG&gt;[Expert@gwr801:0]# adlog a dc&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Domain controllers:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Domain Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Events (last hour)&amp;nbsp;&amp;nbsp; Connection state&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;============================================================================================================&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;itsvsa.com.ve&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.16.13.50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 167&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; has connection&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Ignored domain controllers on this gateway:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;No ignored domain controllers found.&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;[Expert@gwr801:0]# adlog a q a&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.4 --&amp;gt; Users: Ernesto Cabello (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:ernesto.cabello@itsvsa.com.ve"&gt;ernesto.cabello@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;); fortilab (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:fortilab@itsvsa.com.ve"&gt;fortilab@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.50 --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:amazonas@itsvsa.com.ve"&gt;amazonas@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.51 --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:caroni@itsvsa.com.ve"&gt;caroni@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.52 --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:neveri@itsvsa.com.ve"&gt;neveri@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.56 --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:veeam@itsvsa.com.ve"&gt;veeam@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.70 --&amp;gt; Users: Gabriel Salcedo (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:gabriel.salcedo@itsvsa.com.ve"&gt;gabriel.salcedo@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:cesar-pc@itsvsa.com.ve"&gt;cesar-pc@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.73 --&amp;gt; Users: Angel Garcia (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:angel.garcia@itsvsa.com.ve"&gt;angel.garcia@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:desktop-3h34386@itsvsa.com.ve"&gt;desktop-3h34386@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.101 --&amp;gt; Users: Antonio Rodriguez (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:antonio.rodriguez@itsvsa.com.ve"&gt;antonio.rodriguez@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:arodriguez@itsvsa.com.ve"&gt;arodriguez@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.127 --&amp;gt; Users: Javier Orejarena (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:javier.orejarena@itsvsa.com.ve"&gt;javier.orejarena@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:ccert@itsvsa.com.ve"&gt;ccert@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.182 --&amp;gt; Users: Angelica Rangel (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:angelica.rangel@itsvsa.com.ve"&gt;angelica.rangel@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:raranguren@itsvsa.com.ve"&gt;raranguren@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.185 --&amp;gt; Users: Arquimedes Gardie (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:arquimedes.gardie@itsvsa.com.ve"&gt;arquimedes.gardie@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.201 --&amp;gt; Users: Ludexi Ortega (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:ludexi.ortega@itsvsa.com.ve"&gt;ludexi.ortega@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:ortegal@itsvsa.com.ve"&gt;ortegal@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.214 --&amp;gt; Users: Yeritson Pernia (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:yeritson.pernia@itsvsa.com.ve"&gt;yeritson.pernia@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:vmartinez@itsvsa.com.ve"&gt;vmartinez@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 10.16.13.222 --&amp;gt; Users: Janeth Laguado (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:janeth.laguado@itsvsa.com.ve"&gt;janeth.laguado@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;);&amp;nbsp; --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jlaguadorrhh@itsvsa.com.ve"&gt;jlaguadorrhh@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 192.168.200.50 --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:amazonas@itsvsa.com.ve"&gt;amazonas@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN&gt;ip: 192.168.200.51 --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:caroni@itsvsa.com.ve"&gt;caroni@itsvsa.com.ve&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I can see detailed information of the domain via shell, but not on the Security management,&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;thanks for anyone help me.&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2018 15:18:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8644#M90729</guid>
      <dc:creator>Antonio_Rodrigu</dc:creator>
      <dc:date>2018-11-23T15:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8645#M90730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Antonio,&lt;/P&gt;&lt;P&gt;Please make sure that your PC in which you are opening smart console should be also in same domain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2018 16:58:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8645#M90730</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-11-23T16:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8646#M90731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First, there is no such gateway version R80: you are either using R80.10 or R80.20.&lt;/P&gt;&lt;P&gt;That said for this question it's not terribly relevant.&lt;/P&gt;&lt;P&gt;One relevant question: are you using Identity Collector or ADQuery?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your gateway shows the users it has been told about by the AD server.&lt;/P&gt;&lt;P&gt;A seperate LDAP lookup must be performed on each user (and management) to get the groups associated with each user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2018 18:16:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8646#M90731</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-23T18:16:52Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8647#M90732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to allow your workstation IP address to be allowed somewhere (LDAP). SmartConsole is using your internal IP of desktop.&lt;/P&gt;&lt;P&gt;CLI of mamagement is using IP of management server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Nov 2018 17:44:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8647#M90732</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-11-24T17:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8648#M90733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The SmartConsole machine is not connecting to the AD server anymore in R80+, only the management server and the gateway are doing this now.&lt;/P&gt;&lt;P&gt;In a Multi-domain environment the MDS and Domain server are both making connections (at least they were in R80.10, I need to see about this in R80.20).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Nov 2018 23:05:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8648#M90733</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-24T23:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8649#M90734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your support, really, we solve the issue, activating the IP forwarding on my PC, to give connection from the SC to the AD. However, when I run the test, right now the SC list the user for me, to add access control rules, but the test_connection script still sayng the same message, LDAP OPERATIONS ERROR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Nov 2018 00:16:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8649#M90734</guid>
      <dc:creator>Antonio_Rodrigu</dc:creator>
      <dc:date>2018-11-25T00:16:34Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8650#M90735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you Dameon, in fact, R80.10 its the release what I was working on. I activate the ip forwargind on my PC host for the lab and try again, and obtain successful results, listing the users, machines and othe info from the domain controller. But I still seeing the error message LDAP_OPERATIONS_ERROR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Nov 2018 00:23:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8650#M90735</guid>
      <dc:creator>Antonio_Rodrigu</dc:creator>
      <dc:date>2018-11-25T00:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8651#M90736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the error message, is obtained when I run the script $FWDIR/bin/test_ad_connectivity on the gateway, and when I do the same on the SC, obtain a general error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now, I can go ahead with my lab environment, we can build rules on the Url Filter Layer based on Identity captured from the AD. When I procced to the production deployment I probably need checkpoint support if the behavior persist on the real configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks to all&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Nov 2018 00:27:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8651#M90736</guid>
      <dc:creator>Antonio_Rodrigu</dc:creator>
      <dc:date>2018-11-25T00:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8652#M90737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check&amp;nbsp;$FWDIR/log/test_ad_connectivity.elg to see if you can see more details.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Nov 2018 03:15:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8652#M90737</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-25T03:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: Activating Identity Awareness R80 gateway with Active Directory can obtain user list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8653#M90738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is probably because the -w option&amp;nbsp;"&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Specifies that only the WMI connectivity test (no LDAP) should be performed".&amp;nbsp; LDAP worked for me without this option or with -l&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;SPAN style="color: #333333;"&gt;&amp;nbsp;test_ad_connectivity -x itsvsa.com.ve -o my_test2.txt -s -l&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2019 21:36:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Activating-Identity-Awareness-R80-gateway-with-Active-Directory/m-p/8653#M90738</guid>
      <dc:creator>Alexei_Subbotsk</dc:creator>
      <dc:date>2019-03-08T21:36:59Z</dc:date>
    </item>
  </channel>
</rss>

