- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: ipassignment.conf and LDAP grop
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
ipassignment.conf and LDAP grop
Hello again.
Continuation of a previous post but the old post is marked as resolved (because it was) to allow contributor to receive credit. 😊
In a nutshell - we need to limit access to a network host to a small group of 5 individuals. The solution has to work with NAT (Identity Awareness is out as it doesn't work with NAT). This solution will be used for WFH users - the current OM IP pool is Nat'd to the internal interface of the Check Point.
My solution:
I'd like to configure the ipassignment.conf file to assign a range of IPs to my already existing AD group - then limit access to the resource based on the static IPs. (This will be used for WFH users).
What I've done:
- Created a draft of my ipassignment.conf file
Here is how my ipassignment.conf file will look referencing SK: sk33422
#Gateway Type IP Address User Name
==================================================
IP of gateway range 10.0.0.0-10.0.0.5 Test Group (AD group)
- Created an LDAP Account Unit that points directly to my AD group - so the UID is my group.
- Trying to create an LDAP Group Object that the ipassignment.conf file can reference. The Group's scope is the first option - "All Account-Unit's Users"
Questions:
- Unfortunately, my AD security group contains a space in the name. When I try and create the LDAP group, I'm receiving the error "Object name contains space..." How can I get around this?
- Will this plan work? 🙄
Thank you, and as always - any help is always much appreciated!
Best Regards,
Joe
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Even if you could get past the UI validation in SmartConsole, I suspect that space will be problematic in ipassignment.conf as well.
Change the name to something without a space.
Otherwise, this should work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Even if you could get past the UI validation in SmartConsole, I suspect that space will be problematic in ipassignment.conf as well.
Change the name to something without a space.
Otherwise, this should work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ok cool. Thank you!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please refer to https://support.checkpoint.com/results/sk/sk33422 for what exactly to use based on how the user authenticates.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello PhoneBoy,
see the screenshot of the line added at the end of the file.
user log to the vpn through LDAP with the AD account , his name is on capital letter from active directory but when he wants to connecte on the VPN client, he use small letter like i wrote on the file and it works but still taking the ip from the pool instead of the ipassignment file
Also after checking with vpn ipafile_check $FWDIR/conf/ipassignment.con detail , i get the output on the second screenshot
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's user/password authentication, right?
What if you put it in as it is in AD (i.e. with a Capital)?
If this doesn't work, suggest involving TAC.
