- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
I'm looking at an issue with Identity awareness AD Query. From looking at the CPview, pdpd & pepd debug files I can see that identities are being gathered and stored on the gateway; PDP monitor has confirmed this. On the central management server, I am able to create access roles with the correct AD account set within & add them to the rulebase. However when testing the rule, my traffic hits the cleanup rule and is skipping the AD rule I have set.
I am struggling to understand why this is happening as the gateway has knowledge of each AD user and associated IP address, as far as I can see all the required services are up. The gateway is also actively receiving events from multiple domain controllers.
Gateway is R80.20 Take 19 IAAS Azure
Management is R80.30
Is anybody able to point me in the right direction?
Hi,
I went back over the LDAP configuration again & found that the information in the LDAP account was correct. However when I took a look at the access roles in use I found they were pointing towards another LDAP account present on the management server, once I changed it to the new LDAP account I had created it started working. I'm now in the process of removing the obsolete LDAP accounts from the management server.
Thanks all for your help.
Thanks for your response @PhoneBoy , yes I believe it is all correct and working. The Account used is a domain administrator & I can see the AD user information such as group membership is being pulled through, both when adding users to access roles on the management server & when running a PDP monitor on the gateway.
It looks like all the required information is present on the gateway but just not being used.
Have you verified the pepd daemon is running?
Here a couple useful commands to test if pepd is doing its job
#pep show stat – shows basic status of PEP
#pep show pdp all – shows status of PDPs
#pep show user query usr <username> – shows identity status of single user. Useful to confirm that the PEP has received identity data from PDP.
#pep show user query cid <IP address> – shows identity status of single IP address
Dave
Hi,
I went back over the LDAP configuration again & found that the information in the LDAP account was correct. However when I took a look at the access roles in use I found they were pointing towards another LDAP account present on the management server, once I changed it to the new LDAP account I had created it started working. I'm now in the process of removing the obsolete LDAP accounts from the management server.
Thanks all for your help.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 13 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY