- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All,
I have a user connecting to the gateway via VPN (SAML authentication). They pass SAML authentication via identity provider but get assigned the wrong IP address. Although they are setup in the 'ipassignment.conf' file, they keep getting an IP address from the general pool that is setup on each cluster member. I have checked the syntax in the ipassignment.conf and satisfied they have been configured correctly.
Is there a logfile anywhere that I can troubleshoot this to check that the ipassignment.conf file is being queried?
Thanks in advance.
The point of pointing you at the debug was to see what username it was seeing in order to find the relevant ipassignment.conf entry.
To see who is connected with what IP, perhaps this will be helpful: https://community.checkpoint.com/t5/SmartConsole-Extensions/Show-VPN-Users/m-p/131493#M200
I dont believe you could search by say file name itself, but what you can do is something like below (in logs and monitor from smart console, just do below search, assuming say OM ip someone gets is 172.16.10.55)
blade:VPN AND src:172.16.11.55
Hope that helps.
Andy
From https://support.checkpoint.com/results/sk/sk113461 it appears you might find this in vpnd.elg.
You'll probably need to enable debugging of this process, however, which is done as follows:
# vpn debug trunc
# vpn debug on TDERROR_ALL_ALL=5
Then review $FWDIR/log/vpnd.elg* for the relevant user.
To disable debug:
vpn debug off
vpn debug ikeoff
As debugs can cause extra load, you may want to do this during off hours or a maintenance window.
See also: https://support.checkpoint.com/results/sk/sk180543
Thanks PhoneBoy -- this has provided some useful info however, not managed to capture the individuals vpn negotiations or address assignment.
Running 81.10 BTW
Have managed to resolve this issue -- the user had changed his name in AD (from Rob to Robert) so the ipassignment.conf file was being ignored.
Would still be useful to find how to debug this.
Thanks
How could these be usefull ? The two provided links are supported in ancient EOL versions only...
Correct, thats what it says, but TAC also used them few times on the phone, so they definitely do apply even in new versions. I suppose the articles were not updated to reflect so.
But in fact they state explicitely the opposite: This solution is about products that are no longer supported and it will not be updated
So i would rather not suggest them to anyone when supported alternatives are available.
I agree, so maybe TAC people should be advised not to use them any longer 😂
No, TAC can use anything, but i think you should avoid refering to unsupported SKs - sk30583: What is FW Monitor? has all of that in an officially supported SK...
Personally, I dont care what they use, as long as problems are fixed 😊
Thanks Andy -- second link is useful 👍
Glad its useful. But, @G_W_Albrecht is correct, it does indeed mention its not officially supported, but TAC used it with me over the phone few times, so must be still "valid" ; - ). Not to sound ironic now, but again, personally, @Net_Works I could care less who I talk to and what methods are used, the end goal is to fix the issue and Im sure thats what every client cares about 🙌
The point of pointing you at the debug was to see what username it was seeing in order to find the relevant ipassignment.conf entry.
To see who is connected with what IP, perhaps this will be helpful: https://community.checkpoint.com/t5/SmartConsole-Extensions/Show-VPN-Users/m-p/131493#M200
Thanks PhoneBoy -- will take a look on Monday 😉
Hi PhoneBoy -- this is a really useful cli output (fw tab -t . . . ) and does provide me with the details of the username which I could have cross referenced with the ipassignment.conf file 👍
Thanks all for your contributions.
Also, not sure if below might be 100% applicable, but worth a look.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
10 | |
7 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY