<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Identity Awareness with AD not possible in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244667#M12310</link>
    <description>&lt;P&gt;Customer uses VPN with the GAiA cluster of the main site as center and SMB appliances (locally &amp;amp; SMP managed) on remote sites. As the SMBs also need to connect by VPN to a FortiGate, their external IPs have been removed from Encryption Domain using the Advanced Settings. This configuration was build with help of CP TAC and works as expected.&lt;/P&gt;
&lt;P&gt;But now the customer wants to use IA for his users with an AD server at the main site - but IA packets use the external IP of the SMB and are not routed thru VPN to the main site, making the needed communication impossible.&lt;/P&gt;
&lt;P&gt;Did anyone already encounter such an obstacle and found a way to resolve it ? &lt;/P&gt;</description>
    <pubDate>Tue, 25 Mar 2025 10:05:28 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2025-03-25T10:05:28Z</dc:date>
    <item>
      <title>Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244667#M12310</link>
      <description>&lt;P&gt;Customer uses VPN with the GAiA cluster of the main site as center and SMB appliances (locally &amp;amp; SMP managed) on remote sites. As the SMBs also need to connect by VPN to a FortiGate, their external IPs have been removed from Encryption Domain using the Advanced Settings. This configuration was build with help of CP TAC and works as expected.&lt;/P&gt;
&lt;P&gt;But now the customer wants to use IA for his users with an AD server at the main site - but IA packets use the external IP of the SMB and are not routed thru VPN to the main site, making the needed communication impossible.&lt;/P&gt;
&lt;P&gt;Did anyone already encounter such an obstacle and found a way to resolve it ? &lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 10:05:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244667#M12310</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-03-25T10:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244674#M12312</link>
      <description>&lt;P&gt;I recall another option in Advanced Settings that caters to similar.&lt;/P&gt;
&lt;P&gt;Will share a screenshot accordingly, but applicability to central managed devices would need to be checked/confirmed with TAC perhaps.&lt;/P&gt;
&lt;P&gt;"VPN site to site global settings - Use internal IP address for encrypted connections from local gateway."&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 11:33:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244674#M12312</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-03-25T11:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244677#M12315</link>
      <description>&lt;P&gt;This is locally managed and VPN site to site global settings are already used as advised by TAC:&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;"Do not encrypt connections originating from the local gateway" in VPN-&amp;gt;Community resolved the Forti VPN issue and does disable "Use internal IP address for encrypted connections from local gateway" = TRUE automatically, so the ping from WebGUI thru the VPN tunnel does not work, only from CLI using ping -I &amp;lt;Local Address&amp;gt; it succeeds.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 11:49:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244677#M12315</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-03-25T11:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244692#M12320</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Maybe you are looking for this:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk60701" target="_self"&gt;How to configure an alternate IP Address for Identity Awareness communication channel&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Be careful before you change anything in the database. Save/backup everything &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 13:54:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244692#M12320</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-03-25T13:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244696#M12321</link>
      <description>&lt;P&gt;Thank you, forgot about that sk ! But it can not work - as written above, customer has SMB appliances (locally &amp;amp; SMP managed), so changing the SMS database does not help as the SMS only manages the main GAiA GW, but not the SMBs.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 14:12:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244696#M12321</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-03-25T14:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244701#M12322</link>
      <description>&lt;P&gt;Indeed, I always forget that, you have always tricky and detailed questions... and SMB-s &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 14:22:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244701#M12322</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2025-03-25T14:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244714#M12323</link>
      <description>&lt;P&gt;Remember - this is the SMB Gateways (Spark) board &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; With GAiA this would be no issue at all as you could use the Encryption Domain per VPN Community feature and define different Communities for VPNs to CP and Forti. But that is impossible &amp;lt;yet with SMBs...&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 15:42:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244714#M12323</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-03-25T15:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244810#M12332</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can you please attach the topology?&lt;/P&gt;
&lt;P&gt;Why did you exclude the external IP?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 11:58:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244810#M12332</guid>
      <dc:creator>Dafna</dc:creator>
      <dc:date>2025-03-26T11:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with AD not possible</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244821#M12333</link>
      <description>&lt;P&gt;Customer has ca 73 SMBs locally Managed by SMP that each have a tunnel to a Fortigate (that is the reason why the external IP &lt;STRONG&gt;must&lt;/STRONG&gt; be excluded (can send you a PM with SR# - this was configured by TAC)) and to the main Site GAiA cluster who sits in front of the AD.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Mar 2025 12:45:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Identity-Awareness-with-AD-not-possible/m-p/244821#M12333</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-03-26T12:45:47Z</dc:date>
    </item>
  </channel>
</rss>

