<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable implied rules for LDAP in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252630#M12910</link>
    <description>&lt;P&gt;Perfect explanation&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/585"&gt;@Tal_Paz-Fridman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 05 Jul 2025 15:28:33 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-07-05T15:28:33Z</dc:date>
    <item>
      <title>Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252555#M12903</link>
      <description>&lt;P&gt;Hi everybody,&lt;/P&gt;&lt;P&gt;We are facing the following issue:&lt;BR /&gt;We have a centrally managed Quantum Spark 1595 appliance (referred to as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;) that is connected via cellular radio and uses a dynamic IP address.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is connected to our headquarters gateway (&lt;STRONG&gt;gw-main&lt;/STRONG&gt;) via an IPSec VPN.&lt;/P&gt;&lt;P&gt;On&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;, we want to use Identity Awareness. Therefore, we reconfigured our Identity Collectors to send identities not only to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-main&lt;/STRONG&gt;, but also to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;. According to the Identity Collectors, the connection to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;was successfully established — so that part is working.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When the gateways receive an identity from the collector, they perform an LDAP query to the domain controllers defined in the LDAP Account Unit. There is no domain controller at the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;location, so the gateway should use a domain controller at headquarters. However, whenever&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;performs an LDAP query, it does not use the IPSec tunnel.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I followed &lt;A href="https://support.checkpoint.com/results/sk/sk26059" target="_blank" rel="noopener"&gt;sk26059&lt;/A&gt; to disable the implied rule for LDAP, but the traffic is still sent unencrypted. Then I enabled logging of informative implied rules as described in &lt;A href="https://support.checkpoint.com/results/sk/sk110218" target="_self"&gt;sk110218&lt;/A&gt;. I noticed that the implied rule&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;"enable_ldap_queries"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is still being used for the LDAP traffic.&lt;/P&gt;&lt;P&gt;To test whether the implied rule was removed, I added a remote domain controller to the LDAP Account Unit and tested the behavior on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-main&lt;/STRONG&gt;. When I commented out the LDAP server entry as described in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;sk26059&lt;/STRONG&gt;, the traffic between&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-main&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and the remote domain controller was sent via the IPSec tunnel. When I reverted to the default settings, the traffic was sent directly. So&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;sk26059&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;works for me on a non-SMB gateway.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ldap-ssl-vpn-encrypted.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30882iDA0BE0DD263B5DDE/image-size/large?v=v2&amp;amp;px=999" role="button" title="ldap-ssl-vpn-encrypted.png" alt="ldap-ssl-vpn-encrypted.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I then searched CheckMates and found an &lt;A href="https://community.checkpoint.com/t5/SMB-Gateways-Spark/Changing-implied-rules-def-on-locally-managed-SMBs/td-p/40243" target="_self"&gt;article&lt;/A&gt; about changing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;implied_rules.def&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on locally managed SMBs. I modified the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;implied_rules.def&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file under the following paths:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;/pfrm2.0/config1/fw1/lib/&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;/pfrm2.0/opt/fw1/lib/&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;$FWDIR/lib/&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;None of these changes worked, even after rebooting&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;. The traffic is still sent directly and not via the IPSec tunnel.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ldap-ssl-direct.png" style="width: 906px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30883iC38FCC0382005DA1/image-size/large?v=v2&amp;amp;px=999" role="button" title="ldap-ssl-direct.png" alt="ldap-ssl-direct.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Interestingly, when I use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;telnet&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to connect to other ports on the domain controller, the connection is routed through the IPSec tunnel. So I assume the encryption domain is not the issue.&lt;/P&gt;&lt;P&gt;What else can I try, or what might I have overlooked?&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;STRONG&gt;System Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Security Management Server and &lt;STRONG&gt;gw-main&lt;/STRONG&gt;: R81.20 Take 99&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;gw-smb&lt;/STRONG&gt;: R81.10.10 (996002993)&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 03 Jul 2025 12:43:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252555#M12903</guid>
      <dc:creator>mbeyerlein</dc:creator>
      <dc:date>2025-07-03T12:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252628#M12908</link>
      <description>&lt;P&gt;I was never big fan of disabling implied rules to begin with. They are there for a reason, but if you absolutely need to do it, I would consult with TAC.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jul 2025 14:19:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252628#M12908</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-05T14:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252629#M12909</link>
      <description>&lt;P&gt;To ensure that LDAP queries on your Quantum Spark 1595 appliance (gw-smb) use the IPSec VPN, try disabling the implied rule for LDAP and creating an explicit rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Edit the Implied Rules Definition:&lt;BR /&gt;- Connect to the command line on your Security Management Server &amp;gt; Expert&lt;BR /&gt;-&amp;nbsp;Backup the implied_rules.def file. Refer to sk92281 for guidance on creating customized implied rules.&lt;BR /&gt;- Edit the implied_rules.def file and search for the line `#define ENABLE_LDAP_SERVER`.&lt;BR /&gt;- Change this line to `/* #define ENABLE_LDAP_SERVER */` to comment it out.&lt;BR /&gt;- Save the changes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Create Explicit Rules:&lt;BR /&gt;- In SmartConsole &amp;gt;Access Control policy &amp;gt; Define an explicit rule that allows LDAP traffic between the relevant Security Gateways and the LDAP servers.&lt;BR /&gt;- Ensure that the rule specifies the use of the IPSec VPN for this traffic.&lt;/P&gt;
&lt;P&gt;3. Install the Security Policy:&lt;BR /&gt;- After defining the explicit rule, install the Security Policy on the relevant gateways.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4. Verify the Configuration:&lt;BR /&gt;- Enable logging for the rule to verify that LDAP traffic is now using the IPSec VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you continue to experience issues, consider checking the encryption domain configuration to ensure it includes the necessary networks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jul 2025 14:41:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252629#M12909</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2025-07-05T14:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252630#M12910</link>
      <description>&lt;P&gt;Perfect explanation&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/585"&gt;@Tal_Paz-Fridman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jul 2025 15:28:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252630#M12910</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-05T15:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252755#M12930</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have followed your instructions and created an explicit rule for the LDAPS traffic. In the VPN column, I tried both the VPN Community and All_GwToGw. Unfortunately, the result is the same. Connections from the Quantum Spark 1595 appliance to the LDAPS port of the Domain Controllers are still sent outside the IPSec tunnel. On a "full Gaia" gateway, it works:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ldap-ssl-log.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30911i00AACF2494FFD0DB/image-size/large?v=v2&amp;amp;px=999" role="button" title="ldap-ssl-log.png" alt="ldap-ssl-log.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;I will follow &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;'s advice and consult with TAC.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 12:17:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252755#M12930</guid>
      <dc:creator>mbeyerlein</dc:creator>
      <dc:date>2025-07-08T12:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252757#M12931</link>
      <description>&lt;P&gt;I would definitely do so.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 12:25:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252757#M12931</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-08T12:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252769#M12933</link>
      <description>&lt;P&gt;I should have read the sk92281 more carefully. According to the &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Configuring_Implied_Rules_or_Kernel_Tables_for_Security_Gateways_implied_rules.def.htm" target="_self"&gt;Security Management Administrator Guide&lt;/A&gt;, I needed to edit the implied_rules.def file located at &lt;EM&gt;/opt/CPSFWR81CMP-&lt;SPAN class=""&gt;R81.20&lt;/SPAN&gt;/lib/&lt;SPAN class=""&gt;implied&lt;/SPAN&gt;_rules.def&lt;/EM&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 14:34:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/252769#M12933</guid>
      <dc:creator>mbeyerlein</dc:creator>
      <dc:date>2025-07-08T14:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/275345#M13878</link>
      <description>&lt;P&gt;Interestingly, we have a similar case at the moment, but on a gaia-gateway. LDAP-ssl that is initiated by a remote gateway does not enter the VPN-community to the main office (both are on R81.20 T60). A tcptraceroute to port 444 enters the VPN, to port 636 goes outside the VPN. So probably not the encryption domain. This is currently a blocking issue for the implementation of Identity Awareness.&amp;nbsp;&lt;BR /&gt;Disabling the implied rule and create an explicit rule will most likely affect all other gateways.&lt;BR /&gt;Consult with TAC, I presume?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 09:04:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/275345#M13878</guid>
      <dc:creator>Dre_CyPe</dc:creator>
      <dc:date>2026-04-13T09:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: Disable implied rules for LDAP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/275367#M13879</link>
      <description>&lt;P&gt;Anytime you mess with implied rules via .def files, there is a potential to impact other gateways.&lt;BR /&gt;The impact of this particular implied rule is to exclude TCP 636 from being encapsulated in IPsec traffic.&lt;BR /&gt;Unless one of your gateways actually relies on this traffic not going through the VPN, I don't see there being a negative impact to other gateways.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 17:42:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Disable-implied-rules-for-LDAP/m-p/275367#M13879</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-13T17:42:24Z</dc:date>
    </item>
  </channel>
</rss>

