- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi All,
I'd ask for help/advise for the issue with Identity awareness.
I have Checkpoint 3600 R80.40 Take 309 managed by SMC 80.40
I've enabled the IA blade and configured settings/rules.
I've created the rule with single user to be permitted Destination/Service - any.
All networks and machines allowed.
While testing I can see the test user successfully identified with AD name but the rule is not matching.
I've recreated the rule - still not working.
Kind regards,
Paul
Hi Paul, would you mind send us the screenshot of the rule and also tell us what other rule is being matched? Is it possible you have a rule above IA rule that could be catching the traffic?
Not sure in that case, may need more testing, maybe contact TAC and see if they can do remote session. Personally, I would just make sure user is included in right access role group and maybe do tcpdump and/or fw monitor as well to test traffic.
Also, maybe run some pdp commands to see the state:
adlog a dc
pdp monitor ip x.x.x.x
pdp monitor user xxxxx
Hope that helps.
Thank you for sharing useful commands.
AD queries are working fine.
I've raised a TAC.
Hopefully support can fix it.
Check out the Multi User Host detection:
https://community.checkpoint.com/t5/Security-Gateways/Identity-Awareness-Multi-User-Host/m-p/80173/h...
Maybe service accounts login cause the source host to be marked as "multi user host", you can check with "pdp muh status"
It doesn't look like your user has assumed the defined role. You can check from logs by running filter
blade:"Identity Awareness" AND action:"Log In" AND src:x.x.x.x
change x.x.x.x to users IP of course
then you should see what roles are associated with this IP:
Thats actually an EXCELLENT point! I totally forgot about it, but I agree that if thats wrong, the rule would not work.
Thank you for the advice.
That's interesting!
I've found the logs with failed login and error:
"Failed to get users groups for the domain.
Verify that this domain name is configured in your LDAP Account Unit."
Looks like I've chosen the wrong domain.
I'll check the settings an let you know.
Please let us know if you can correct that, I am 99% sure that is the issue. Big thanks to @Kaspars_Zibarts for pointing that out!!
Hello,
Have you solve this issue, we have the same issue
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 41 | |
| 21 | |
| 9 | |
| 7 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY