- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- MUH2
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
MUH2
Hi,
Am trying to install som MUH2 clients on jumpgates.
The GW is using VSX on R80.30 HFA 236
I get an error saying
"An error was detected while trying to authenticate against the AD server.
It may be a problem of bad configuration or connectivity.
Please refer to the troubleshooting guide for more help"
So checked the installation guide again.
"
To configure Terminal Servers Identity Agents Authentication Settings with all Active Directories:
- Log in to SmartConsole.
- From the left navigation toolbar, click Gateways & Servers.
- Open the Identity Awareness Gateway object.
- In the left tree, go to the Identity Awareness page.
- Near the Terminal Servers, click Settings.
- In the Authentication Settings section, click Settings.
- Select All Gateway's Active Directories (under Security Gateway -> Other - > User Directory).
- Click OK to close the Active Directories window.
- Click OK to close the Terminal Servers window.
- Configure the Account Units Query settings:
- In the left tree of the Security Gateway object, click on the [+] near the Other pane.
- Click the User Directory pane.
- In the Account Units Query section, select All.
- Click OK to close the Gateway Properties window.
- Install the Access Policy.
"
But i honestly dont see the account units query. is the guide incorrect and it should be "user Directories"
the agent itself says connected but the users loged in says not authenticated.
For other identitys we uses the identity collector. so there is ldap account units within the CMA
Regards,
Magnus
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
just to answer my own question: My Problem is solved in https://support.checkpoint.com/results/sk/sk87200
The issue happened for accounts, where sAMA and UPN do not match.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have a somewhat similar issue with the MuHv2 agent, R80.40 Take 118 VSX.
The agent shows connected and using pdp commands on the VS the VM's are seen, but it doesn't show any authenticated user.
I have an SR open. Some things that were tried was making sure the agent was installed with admin rights and disable secure boot on the image but it didn't help.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Greetings Magnus,
What OS are the servers running and what software version is the MDS on?
The MDS must have R80.30 JHF T210 or higher installed and the servers must either be running Windows Server 2016 or Windows Server 2019.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
MDS running R81 HFA36
Server running Windows Server 2019 standard
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hey @Magnus-Holmberg,
Firstly, big fan of your YouTube content! It's been a great resource for me - so thank you!
Secondly, did you ever find a resolution for this issue? I'm not running VSX, but I am hitting a similar issue. The machine authentication is working perfectly, but I am not getting any user-based authentication & I see the same error as your screenshot.
Any advise would be much appreciated.
Thanks,
Aaron.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you 🙂
Yes its working now, but i dont remember what the issue was.
We are going to install it on more servers so i will see if i get the same issue, but so far its working correctly.
We are currently running R81 HFA44 on the MDS.
When it comes to VSX and IA in general, its important to think about how the traffic is going towards ia stuff.
If the traffic is generating from VS or VSX Cluster. (this is something that is easy to miss)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@AaronCP may I return the question to you? Could you find a solution for this?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
just to answer my own question: My Problem is solved in https://support.checkpoint.com/results/sk/sk87200
The issue happened for accounts, where sAMA and UPN do not match.
