- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Dynamic Objects
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Dynamic Objects
Dear Mates,
Kindly advise me is there any possibility to map dynamically learned IPs via access roles (LDAP) to dynamic objects and can it be used in NAT.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If so, you can probably use the same trick.
Otherwise, you'd have to write a script to periodically update the Dynamic Objects based on what IDA has learned.
Either way Dynamic Objects can be used for NAT.
I am curious about the use case, though.
Can you explain?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you for your prompt reply
My Use Case details as follows.
Currently we are using proxy server to control the internet access within corporate environment.
With our recent checkpoint HW upgrade we are hoping to integrate internet access control function using Active Directory Authentication (identity awareness - Access roles).
But the problem is, I have to create NAT rule for any source to hide the internet traffic behind public interface.
Since the GW learns all the machine IPs via LDAP, Can I use Dynamic objects for this purpose.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Everyone outbound will hit some sort of generic NAT rule.
Guess I'm not seeing the value a dynamic object will add to this.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I think you are trying to make it too complicated. You do know which networks will go to internet. Make the NAT Hide from the beginning.
Use Identity Awareness User Role in the Access rule to allow only certain users to go out. No hustle, no dynamic objects to complicate your policies and troubleshooting.
