<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Domain Controller Redundancy in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25345#M5131</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;That’s a big problem of LDAPS configuration in Check Point Account Unit, as there is no check of when certificate expires and a warning upfront.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;That’s why I prefer LDAP in this case (at least if everything is internal traffic), even though we send it in clear.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Sep 2018 16:43:01 GMT</pubDate>
    <dc:creator>Norbert_Bohusch</dc:creator>
    <dc:date>2018-09-10T16:43:01Z</dc:date>
    <item>
      <title>Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25340#M5126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I was just wondering how domain controller redundancy works in Checpoint policy. You create LDAP Account Unit for a domain and add in your 2 ldap server objects (domain controllers).&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70119_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;Then on the "Objects Management" tab you can only choose 1 of these 2 servers&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/70120_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today the cert on irbdc04 changed which meant ldaps queries stopped working until the fingerprint was fetched. The customer asked us, "why didnt the other domain controller take over serving authentication queries".&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I'm wondering even though I have 2 servers defined in the ldap account unit, but only 1 defined Objects management tab does this mean that if irbdc04 is not working there is no ldap server redundancy? At what point will phdc03 take over serving requests?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2018 12:15:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25340#M5126</guid>
      <dc:creator>John_Colfer</dc:creator>
      <dc:date>2018-09-07T12:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25341#M5127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i would use CP Identity Collector here - see&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108235&amp;amp;partition=General&amp;amp;product=Identity"&gt;sk108235 Identity Collector - Technical Overview&lt;/A&gt; for details !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2018 12:21:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25341#M5127</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-09-07T12:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25342#M5128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The question is about authentication, not about Identity Awareness.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2018 12:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25342#M5128</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-09-07T12:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25343#M5129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We had EXACTLY the same issue like you a year ago and it looks that priority does nothing in this case because LDAP is reachable, but cannot fetch anything = no issue at all for Check Point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in case first LDAP is not reachable (telnet 636 not possible), it will go to the other LDAP in priority list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case first LDAP was reachable (can you confirm ?) and thats all fine accorrding Check Point design.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2018 16:20:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25343#M5129</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-09-07T16:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25344#M5130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jozko&lt;/P&gt;&lt;P&gt;Yeah the ldap server was reachable (the server was up), but the fingerprint on the cert had changed so it could not retrieve anything. So does that mean that if the server is up and reachable it will not use the next server in the list, even though it cannot query the directory?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 14:36:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25344#M5130</guid>
      <dc:creator>John_Colfer</dc:creator>
      <dc:date>2018-09-10T14:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25345#M5131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;That’s a big problem of LDAPS configuration in Check Point Account Unit, as there is no check of when certificate expires and a warning upfront.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;That’s why I prefer LDAP in this case (at least if everything is internal traffic), even though we send it in clear.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 16:43:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25345#M5131</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2018-09-10T16:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25346#M5132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, exactly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2018 20:35:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25346#M5132</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-09-10T20:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25347#M5133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Norbert. I suggested this to customer but they prefer not to send usernames/passwords in the clear. Is there any other way around this? Is this issue addressed in a subsequent version?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2018 08:49:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/25347#M5133</guid>
      <dc:creator>John_Colfer</dc:creator>
      <dc:date>2018-09-12T08:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/96875#M19052</link>
      <description>&lt;P&gt;Does anyone know if the fingerprint is cached for a period of time on the gateways?&amp;nbsp; &amp;nbsp; &amp;nbsp;Our DC's are configured to auto-renew their certificates annually.&amp;nbsp; &amp;nbsp;But I don't know how much time(if any) we have after the certificates are renewed on the DC's to Fetch the new fingerprint and push policy?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 16:07:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/96875#M19052</guid>
      <dc:creator>Scott_Bily</dc:creator>
      <dc:date>2020-09-16T16:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/97072#M19078</link>
      <description>&lt;P&gt;This is indeed good question, I second that.&lt;/P&gt;
&lt;P&gt;The best would be to test it in LAB to see real world scenario. I suspect that fingerprint is not cached, it could depends how often you are downloading CRLs from DC, or what is requesting from gateway to DC.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2020 05:54:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/97072#M19078</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2020-09-20T05:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Controller Redundancy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/97099#M19082</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14797"&gt;@Scott_Bily&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The fingerprint is not cached on the gateway. Fingerprint will be installed on the gateway if you fetched from LDAPS-server and did a policy install. Until you change the policy nothing is changed on the gateway. If the fingerprint changes on the LDAP-server you have to refectory again and install policy.&lt;/P&gt;
&lt;P&gt;There is only one way to overcome the fingerprint problem following&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk42905&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt; LDAP failing with "SSL finger print does not match"&lt;/A&gt;&amp;nbsp;, but with a little bit lower security.&lt;/P&gt;
&lt;P&gt;As a security company Check Point should should solve such a small problem.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2020 17:56:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Domain-Controller-Redundancy/m-p/97099#M19082</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-09-20T17:56:35Z</dc:date>
    </item>
  </channel>
</rss>

