<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Idenity Awareness on VSX Virtual System environment in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/82054#M9272</link>
    <description>The Authentication part is ca completely different thing from Identity awareness.&lt;BR /&gt;The reason you probably need the access from your client to the AD server during setup, is that the managemnt server still needs everything added and setup, the Wizard is just collecting all information to put into the database when done.</description>
    <pubDate>Wed, 15 Apr 2020 22:18:54 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2020-04-15T22:18:54Z</dc:date>
    <item>
      <title>Idenity Awareness on VSX Virtual System environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81845#M9266</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I enable Idenity Awareness on VSX Virtual System( Test2 ) under VSX Gateway, I connected with my LDAP Server without Wizard When use ID Wizard config I got error "SmartDashboard could not connected Server" So i config manual connect LDAP Server that can Query User Database from LDAP Server when i create Access Role user list appeared.&amp;nbsp; Problem is when I Testing with account under Access Roles specific user/group to any dest any service the Policy rule is't any Hit count.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont any config on VSX Gateway without DNS,MGT IP&lt;/P&gt;&lt;P&gt;Q1: Why Idenity Awareness Wizard show&amp;nbsp;"SmartDashboard could not connected Server" I prefer to use Wizard not manual config&lt;BR /&gt;Q2: Why Access Roles not have any hit count?&lt;/P&gt;&lt;P&gt;Q3: How to config Idenity Awareness on VSX Virtual System?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Diagram" style="width: 532px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5567i7EDE9D2E273E4E8B/image-dimensions/532x312?v=v2" width="532" height="312" role="button" title="Idenity Awareness LAB.png" alt="Diagram" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Diagram&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2020 18:24:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81845#M9266</guid>
      <dc:creator>Security_Consul</dc:creator>
      <dc:date>2020-04-14T18:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: Idenity Awareness on VSX Virtual System environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81860#M9267</link>
      <description>&lt;P&gt;First of all it helps if you mention the version you are working with.&lt;BR /&gt;Second point is that you need to know is that the way the connections are setup differs per version.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;R77.xx during setup the connection is made between the Windows machine, running SmartDashboard, to the AD server
&lt;UL&gt;
&lt;LI&gt;Once active the Gateway and the AD server run the actual connection for checking group memberships and also AD server to gateway for login entries to tie the user to an IP.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;R80.10 and up, the initial connection is setup from the SMS to the AD server (Since last month MS only accepts LDAPS connections!!!) For changing things in SmartConsole (adding roles) the management server directly connects to the AD server&lt;/LI&gt;
&lt;LI&gt;R80.20 and up allow the gateway to act as a proxy for the connection between Management server and AD server&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Also keep in mind that the gateway by default will try to login by means of NTLM v1, use 'adlogconfig a' to change this behavior to NTLM v2 (don't forget to push policy directly after changing the setting to take effect!!)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a VSX environment the VS will have it's own connection to the AD server, this is not done by the VSX gateway/cluster, like some other things are done on that level. This way each VS can be used in it's own environment with it's own AD server.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2020 21:16:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81860#M9267</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-04-14T21:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Idenity Awareness on VSX Virtual System environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81891#M9268</link>
      <description>&lt;P&gt;Hi Maarten&lt;/P&gt;&lt;P&gt;Thank for reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;I running GAIA R80.30 with 3.10 kernal.&lt;/P&gt;&lt;P&gt;About LDAPS you meaning every since last month Microsoft AD Server integrate with Checkpoint version above 8.10 have to enable LDAPS? I test offline LAB its have enable SSL or not if have to enable (&lt;EM&gt;Smartdashboard &amp;gt; LDAP Account unit &amp;gt; Servers tab &amp;gt; AD Server &amp;gt; Encryption &amp;gt; Enable Use SSL &amp;gt; OK)&lt;/EM&gt; Right?&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;I actually&amp;nbsp;test enable LDAPS my Access Roles can not Query AD User when i disable that can Query&lt;/P&gt;&lt;P&gt;Next about Proxy as i understood if connection between SMS - AD Server is not same environment (Same Network) should use Proxy selected VS that can routed to AD Server?&amp;nbsp;(&lt;EM&gt;Smartdashboard &amp;gt; LDAP Account unit &amp;gt; Object Management tab &amp;gt; Management Server Needs proxy to reach AD Server &amp;gt; Select VS &amp;gt; OK) Right?&amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Could you tell me why smartdashboard show error when connect with AD Server&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 04:45:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81891#M9268</guid>
      <dc:creator>Security_Consul</dc:creator>
      <dc:date>2020-04-15T04:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Idenity Awareness on VSX Virtual System environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81926#M9269</link>
      <description>The latest update from MS has been set to enforce LDAPS, so when that was installed you should not be able anymore to connect without LDAPS.&lt;BR /&gt;(SmartConsole &amp;gt; LDAP Account unit &amp;gt; Servers tab &amp;gt; AD Server &amp;gt; Encryption &amp;gt; Enable Use SSL &amp;gt; OK) Right!!&lt;BR /&gt;&lt;BR /&gt;Proxy is only needed when the management server is NOT able to connect directly to the AD server, in your case check the logs of your Palo fro drops between SMS and ad server, AD server and gateway and gateway to AD..&lt;BR /&gt;</description>
      <pubDate>Wed, 15 Apr 2020 07:36:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81926#M9269</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-04-15T07:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: Idenity Awareness on VSX Virtual System environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81959#M9270</link>
      <description>&lt;P&gt;Palo side is any allow all same as Checkpoint&lt;/P&gt;&lt;P&gt;Admin PC running Smartdashboard have to communicate with AD Server?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 12:50:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/81959#M9270</guid>
      <dc:creator>Security_Consul</dc:creator>
      <dc:date>2020-04-15T12:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Idenity Awareness on VSX Virtual System environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/82028#M9271</link>
      <description>&lt;P&gt;Admin PC run Smartdashboard have to connect AD Server. AdminPC connecting to VS0 that can route to AD Server that why i successfully connected then VS0 share to VS1 by&amp;nbsp;&lt;SPAN&gt;(Virtual System object - Properties - Other - Legacy Authentication - section Authentication Servers Accessibility (including LDAP) - select "Shared". VS1 also success connected.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Seem like bug or cache when i disable idenity awareness on VS0 and VS1 and I enable idenity awareness again on only VS1 its still successfully connected. first time i tested VS1&amp;nbsp; can not connect before.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 17:53:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/82028#M9271</guid>
      <dc:creator>Security_Consul</dc:creator>
      <dc:date>2020-04-15T17:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: Idenity Awareness on VSX Virtual System environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/82054#M9272</link>
      <description>The Authentication part is ca completely different thing from Identity awareness.&lt;BR /&gt;The reason you probably need the access from your client to the AD server during setup, is that the managemnt server still needs everything added and setup, the Wizard is just collecting all information to put into the database when done.</description>
      <pubDate>Wed, 15 Apr 2020 22:18:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Idenity-Awareness-on-VSX-Virtual-System-environment/m-p/82054#M9272</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-04-15T22:18:54Z</dc:date>
    </item>
  </channel>
</rss>

