- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hello, everyone.
We currently have a connection problem for users trying to connect via VPN to the GW (Using Endpoint Security).
Initially, everything was working fine with the AD Query method (We have Mobile Access and IA blades enabled).
Now, since we migrated the way AD users work, from AD Query to IDC, we are having problems with a lot of users not being able to connect to the VPN.
We have checked that in the IDC, if there is an association between an IP + User.
But it seems that this information stays in the IDC, and does not send it to the Firewall.
Since when we consult for certain user that is seen in the IDC, it does not appear in the "pdp" commands that we apply in the GW.
We have made connection tests, with local GW accounts, and everything works fine.
Any opinion and/or similar experience you can share?
Regards.
Never had an issue like that before. Question...I assume you are using access roles? If you do pdp monitor user command, do you even see anything?
Andy
Yes, we are working the rules with Access Role.
In the SMS logs, the message "Unknown User" appears.
The strange thing is that the users are seen in the IDC (IP+User Association).
But in the GW Cluster, the user is not seen when searching with the command "pdp ...".
So, because of this, remote users cannot connect.
This happened after migrating from AD Query to IDC.
This is the evidence, from what I see with the "pdp" command in the GW.
The user does not appear in the GW.
But this same user does appear in the IDC.
Make sure LDAP account unit is still there, as thats needed to pull the groups from AD properly, as @PhoneBoy mentioned in another post.
Andy
The account that was used to hook the IDC to the AD still exists.
Is there a way to reboot, do a sniffer or capture, that will help us to know why the AD users do not arrive to the GW, but they do arrive to the IDC?
😕
Reboot wont do anything for this sort of issue. Can you still see same LDAP account unit? Are there any logs for the tested user in smart console? You can do IA debugs TAC gave me while back, hope they give some clues.
Andy
To test with these TAC debug commands, you would have to test punctually, with a user that is affected with his VPN connection, correct?
Is there a way to "delete" his session, in the IDC, to be able to apply the process from 0, with a punctual user?
Thats right. Im not aware if way to debug IC, as its not a process.
It's not in Identity Collector that you need to delete the user, but in PDP on the relevant gateway.
The identities that relate to a given IP address can be revoked using the CLI command: pdp control revoke x.y.z.w
See: https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_IdentityAwareness_AdminGuide...
Hello,
The problem is that users are not "seen" in the GW.
For example:
User: Pepito
IP: 10.10.10.10
This association is seen in the IDC, but in the GW, it is not "seen", that's why I think, that applying the command you suggest, would not help me in this case.
It seems that the relationship between the IDC and the GW is not working well.
If you do pdp monitor ip and then user IP, you dont see anything?
Buddy,
In the GW you do not see the users who have already registered in the IDC.
At the top of this post, I pasted some images of a user.
This user in the IDC, if his IP+User relationship appears, but when you query for this user in the GW, it simply does not see it.
😕
Maybe try restart IC and see what happens.
We are still reviewing this atypical case.
How do you reset the IDC?
I'm going to try the last command you recommended, let's see how it goes.
😉
You dont : - ). You either restart it from task manager or simply reboot computer software is installed on.
Andy
Did you make any progress on this bro? Also, maybe try pdp update all command to see if any difference.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 5 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Myphos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY