- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi everybody,
We are facing the following issue:
We have a centrally managed Quantum Spark 1595 appliance (referred to as gw-smb) that is connected via cellular radio and uses a dynamic IP address. gw-smb is connected to our headquarters gateway (gw-main) via an IPSec VPN.
On gw-smb, we want to use Identity Awareness. Therefore, we reconfigured our Identity Collectors to send identities not only to gw-main, but also to gw-smb. According to the Identity Collectors, the connection to gw-smb was successfully established — so that part is working.
When the gateways receive an identity from the collector, they perform an LDAP query to the domain controllers defined in the LDAP Account Unit. There is no domain controller at the gw-smb location, so the gateway should use a domain controller at headquarters. However, whenever gw-smb performs an LDAP query, it does not use the IPSec tunnel.
I followed sk26059 to disable the implied rule for LDAP, but the traffic is still sent unencrypted. Then I enabled logging of informative implied rules as described in sk110218. I noticed that the implied rule "enable_ldap_queries" is still being used for the LDAP traffic.
To test whether the implied rule was removed, I added a remote domain controller to the LDAP Account Unit and tested the behavior on gw-main. When I commented out the LDAP server entry as described in sk26059, the traffic between gw-main and the remote domain controller was sent via the IPSec tunnel. When I reverted to the default settings, the traffic was sent directly. So sk26059 works for me on a non-SMB gateway.
I then searched CheckMates and found an article about changing implied_rules.def on locally managed SMBs. I modified the implied_rules.def file under the following paths:
None of these changes worked, even after rebooting gw-smb. The traffic is still sent directly and not via the IPSec tunnel.
Interestingly, when I use telnet on gw-smb to connect to other ports on the domain controller, the connection is routed through the IPSec tunnel. So I assume the encryption domain is not the issue.
What else can I try, or what might I have overlooked?
System Information:
To ensure that LDAP queries on your Quantum Spark 1595 appliance (gw-smb) use the IPSec VPN, try disabling the implied rule for LDAP and creating an explicit rule.
1. Edit the Implied Rules Definition:
- Connect to the command line on your Security Management Server > Expert
- Backup the implied_rules.def file. Refer to sk92281 for guidance on creating customized implied rules.
- Edit the implied_rules.def file and search for the line `#define ENABLE_LDAP_SERVER`.
- Change this line to `/* #define ENABLE_LDAP_SERVER */` to comment it out.
- Save the changes.
2. Create Explicit Rules:
- In SmartConsole >Access Control policy > Define an explicit rule that allows LDAP traffic between the relevant Security Gateways and the LDAP servers.
- Ensure that the rule specifies the use of the IPSec VPN for this traffic.
3. Install the Security Policy:
- After defining the explicit rule, install the Security Policy on the relevant gateways.
4. Verify the Configuration:
- Enable logging for the rule to verify that LDAP traffic is now using the IPSec VPN.
If you continue to experience issues, consider checking the encryption domain configuration to ensure it includes the necessary networks.
I was never big fan of disabling implied rules to begin with. They are there for a reason, but if you absolutely need to do it, I would consult with TAC.
Andy
To ensure that LDAP queries on your Quantum Spark 1595 appliance (gw-smb) use the IPSec VPN, try disabling the implied rule for LDAP and creating an explicit rule.
1. Edit the Implied Rules Definition:
- Connect to the command line on your Security Management Server > Expert
- Backup the implied_rules.def file. Refer to sk92281 for guidance on creating customized implied rules.
- Edit the implied_rules.def file and search for the line `#define ENABLE_LDAP_SERVER`.
- Change this line to `/* #define ENABLE_LDAP_SERVER */` to comment it out.
- Save the changes.
2. Create Explicit Rules:
- In SmartConsole >Access Control policy > Define an explicit rule that allows LDAP traffic between the relevant Security Gateways and the LDAP servers.
- Ensure that the rule specifies the use of the IPSec VPN for this traffic.
3. Install the Security Policy:
- After defining the explicit rule, install the Security Policy on the relevant gateways.
4. Verify the Configuration:
- Enable logging for the rule to verify that LDAP traffic is now using the IPSec VPN.
If you continue to experience issues, consider checking the encryption domain configuration to ensure it includes the necessary networks.
Perfect explanation @Tal_Paz-Fridman
I have followed your instructions and created an explicit rule for the LDAPS traffic. In the VPN column, I tried both the VPN Community and All_GwToGw. Unfortunately, the result is the same. Connections from the Quantum Spark 1595 appliance to the LDAPS port of the Domain Controllers are still sent outside the IPSec tunnel. On a "full Gaia" gateway, it works:
I will follow @the_rock's advice and consult with TAC.
I would definitely do so.
Andy
I should have read the sk92281 more carefully. According to the Security Management Administrator Guide, I needed to edit the implied_rules.def file located at /opt/CPSFWR81CMP-R81.20/lib/implied_rules.def.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY