Hi there, in this post we’re going to deploy Check Point Identity Awareness.
First of all, we’re going to integrate our Active Directory (LDAP/AD) with Check Point Security Solution (CP).
This lab assumes you already have an AD deployed in the same network as the CMA and the Gateway.
We’ll start by creating a user with admin privilege in AD for CP.
![1.png 1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8819i2B93E4E09342B02A/image-size/medium?v=v2&px=400)
![2.png 2.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8820i2BCCF4EBE4333FAD/image-size/medium?v=v2&px=400)
Once the user is created, let’s add an object in SmartConsole (SC) representing the AD.
On side bar click New > Host
![5.png 5.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8853i25C3C8F65488AB2C/image-size/medium?v=v2&px=400)
Now let’s create an LDAP Account Unit that represents branches of user information on one or more AD servers.
On side bar click New > More > Server > LDAP Account Unit…
![6.png 6.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8854iDC063C60717B2835/image-size/medium?v=v2&px=400)
In General tab, fill the required information:
Name: ANYNAME_TO_REFERENCE_AD
Profile: Microsoft_AD
Domain: AD name / Domain name
Account Unit usage: select CRL Retrieval, User Management and Active Directory Query
![7.png 7.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8855i84926E5056E729E6/image-size/medium?v=v2&px=400)
In Servers tab, choose Add…
To get the Login DN, run dsquery user -name cpadmin on AD (Windows Server 2019) cli prompt. It will give a similar output as below:
"CN=cpadmin,OU=ITDepartment,OU=Checkpoint,DC=bulltech,DC=com"
![8.png 8.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8856iEEA46AC6E97CC1E5/image-size/medium?v=v2&px=400)
In Objects Management tab, select the server to connect and choose the option Fetch branches.
![9.png 9.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8857iBADA0CCB196B36C8/image-size/large?v=v2&px=999)
Finally select the following the Authentication schemes:
![10.png 10.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8858i473FDBC7C737FC24/image-size/medium?v=v2&px=400)
Press ok and publish the changes.
At this point we should be able to query the AD for users identities.
Now let’s enable identity awareness by selecting this option on gateway properties.
![11.png 11.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8859i8793BC1A627B4897/image-size/medium?v=v2&px=400)
Select the options AD Query and Browser-Based Authentication
![12.png 12.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8860iFDC6A16263B79D67/image-size/medium?v=v2&px=400)
Now press connect.
![13.png 13.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8861iF23181B82DC5256F/image-size/medium?v=v2&px=400)
Next let’s install the policy to update the changes, so we can test this new feature.
Let’s create a simple rule policy like the one below with one additional layer:
![14.png 14.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8862i507853A436813472/image-size/large?v=v2&px=999)
In Access Control pane, right click on it, and edit the policy.
In Policy Types > Access Control, click on plus signal and add a new layer
![15.png 15.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8863i5F97D8D99F7B01DD/image-size/large?v=v2&px=999)
Disable the Firewall option and enable Applications & URL Filtering
Press ok and create the following rules
To specify the user or group we want filter, we’ll create an access role. For example, let’s allow only one user from marketing department.
In source field, click on plus sign and click on it.
In the new window, click on star sign, and choose Access Role…
![17.png 17.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8865i19A6E2EE7416E2D6/image-size/large?v=v2&px=999)
Give it a name, and query for a user you would to give access. In this case I chose Martin by accessing the Users tab > Specific users/groups.
![18.png 18.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8866i99648EF33F5028B1/image-size/large?v=v2&px=999)
Install the policy and test the access.
![19.png 19.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8867iE15C9E69A812D070/image-size/large?v=v2&px=999)
We can also confirm, that the policy is working has expected by looking at the logs.
![20.png 20.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8868i35567AB337277434/image-size/large?v=v2&px=999)
We see that the user martin, from marketing department was allowed to access the internet, according to our rules:
![21.png 21.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8869i2F426DB4085BF1F1/image-size/large?v=v2&px=999)
As for Florence and Mark, both are being blocked.
![22.png 22.png](https://community.checkpoint.com/t5/image/serverpage/image-id/8870iA96AE7946131FB73/image-size/large?v=v2&px=999)
Hope you enjoyed this post, leave your comments below and I'll see you on the next post.
References:
https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_IdentityAwareness_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_IdentityAwareness_AdminGuide/62050
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_IdentityAwareness_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_IdentityAwareness_AdminGuide/62050