- Products
 - Learn
 - Local User Groups
 - Partners
 - More
 
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hello, everyone.
We currently have a connection problem for users trying to connect via VPN to the GW (Using Endpoint Security).
Initially, everything was working fine with the AD Query method (We have Mobile Access and IA blades enabled).
Now, since we migrated the way AD users work, from AD Query to IDC, we are having problems with a lot of users not being able to connect to the VPN.
We have checked that in the IDC, if there is an association between an IP + User.
But it seems that this information stays in the IDC, and does not send it to the Firewall.
Since when we consult for certain user that is seen in the IDC, it does not appear in the "pdp" commands that we apply in the GW.
We have made connection tests, with local GW accounts, and everything works fine.
Any opinion and/or similar experience you can share?
Regards.
Never had an issue like that before. Question...I assume you are using access roles? If you do pdp monitor user command, do you even see anything?
Andy
Yes, we are working the rules with Access Role.
In the SMS logs, the message "Unknown User" appears.
The strange thing is that the users are seen in the IDC (IP+User Association).
But in the GW Cluster, the user is not seen when searching with the command "pdp ...".
So, because of this, remote users cannot connect.
This happened after migrating from AD Query to IDC.
This is the evidence, from what I see with the "pdp" command in the GW.
The user does not appear in the GW.
But this same user does appear in the IDC.
Make sure LDAP account unit is still there, as thats needed to pull the groups from AD properly, as @PhoneBoy mentioned in another post.
Andy
The account that was used to hook the IDC to the AD still exists.
Is there a way to reboot, do a sniffer or capture, that will help us to know why the AD users do not arrive to the GW, but they do arrive to the IDC?
😕
To test with these TAC debug commands, you would have to test punctually, with a user that is affected with his VPN connection, correct?
Is there a way to "delete" his session, in the IDC, to be able to apply the process from 0, with a punctual user?
Thats right. Im not aware if way to debug IC, as its not a process.
It's not in Identity Collector that you need to delete the user, but in PDP on the relevant gateway.
The identities that relate to a given IP address can be revoked using the CLI command: pdp control revoke x.y.z.w
See: https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_IdentityAwareness_AdminGuide... 
Hello,
The problem is that users are not "seen" in the GW.
For example:
User: Pepito
IP: 10.10.10.10
This association is seen in the IDC, but in the GW, it is not "seen", that's why I think, that applying the command you suggest, would not help me in this case.
It seems that the relationship between the IDC and the GW is not working well.
If you do pdp monitor ip and then user IP, you dont see anything?
Buddy,
In the GW you do not see the users who have already registered in the IDC.
At the top of this post, I pasted some images of a user.
This user in the IDC, if his IP+User relationship appears, but when you query for this user in the GW, it simply does not see it.
😕
Maybe try restart IC and see what happens.
We are still reviewing this atypical case.
How do you reset the IDC?
I'm going to try the last command you recommended, let's see how it goes.
😉
You dont : - ). You either restart it from task manager or simply reboot computer software is installed on.
Andy
Did you make any progress on this bro? Also, maybe try pdp update all command to see if any difference.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count | 
|---|---|
| 29 | |
| 15 | |
| 14 | |
| 13 | |
| 7 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 3 | 
Wed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY