- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi,
In my lab environment I'm running:
Check Point R82 – Build 151
Distributed deployment
Windows Server 2025
LDAPS (port 636)
AD CS Enterprise Root CA
Working:
Port 636 reachable
I can browse AD structure in SmartConsole
Failing:
Connection attempts fails with:
“Gateway could not connect to… Credentials are valid, but LDAP communication with the server failed.
I have done the solution steps in sk164834.
On both SMS and Gateway:
cpopenssl s_client -connect DC_FQDN:636
Returns:
Question:
Is anyone able to replicate this behavior on R82 with Windows Server 2025?
Any tips on additional troubleshooting steps would be appreciated.
Thanks.
Still didn't work after reboot 😞
Sorry mate, I got nothing else then 😞
Hey Casper,
Mind sending the output of services.msc from your lab windows? I want to compare it to mine, see if its different.
Will compare later and update you.
I did some search online and below is what it came up with that could potentially block this communication. On my end, ONLY windows defender firewall is disabled. You may want to give that a go.
From Ai Copilot:
You are experiencing LDAPS (port 636) connection failures between Check Point R82 (Build 151) and Windows Server 2025, with the error:
"Gateway could not connect to… Credentials are valid, but LDAP communication with the server failed." and
cpopenssl s_client -connect DC_FQDN:636returns:Verify return code: 21 (unable to verify the first certificate)
You have already followed sk164834. Here are additional troubleshooting steps and explanations based on Check Point documentation and best practices.
On the Domain Controller:
certutil -store -v MY
Alternatively, from the Check Point server:
cpopenssl s_client -connect <DC_FQDN>:636
-----BEGIN CERTIFICATE-----and-----END CERTIFICATE-----to a file (e.g.,dc_cert.cer).cpca_client lscert -kind ICA
# Import using cpca_client or system tools as appropriate
cpopenssl s_client -connect <DC_FQDN>:636
Verify return code: 0 (ok)
secpol.msc| Step | Action |
|---|---|
| Export Certificates | From DC, export full chain (Root, Intermediate, DC cert) |
| Import to Check Point | Add to trusted CA store on SMS and Gateway |
| Verify | Usecpopenssl s_client -connect <DC_FQDN>:636and check forVerify return code: 0 |
| Policy | Install policy after changes |
| Security Policy | Check "LDAP server signing requirements" on DC |
If you need step-by-step commands for importing certificates on Gaia, let me know your exact environment (SMS, Gateway, or both) and I can provide tailored instructions.
I decided to use IDC instead. It works great.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 14 | |
| 10 | |
| 8 | |
| 7 | |
| 6 | |
| 5 | |
| 4 | |
| 4 | |
| 4 |
Tue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityWed 20 May 2026 @ 11:00 AM (CEST)
The New DDoS Reality: Autonomy, Scale, and the Future of DefenceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityWed 20 May 2026 @ 11:00 AM (CEST)
The New DDoS Reality: Autonomy, Scale, and the Future of DefenceFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY