- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Guys,
I'm not able to connect my Smart-1 Cloud to local active directory. I followed the steps in
under the "How to Connect a Local Active Directory to Smart-1 Cloud".
I have confirmed that the gateway can reach the DC. The Maas tunnel state is up (I can push policies to the gateway), I also have another local management server and this can successfully connect to the DC using the same credentials as the LDAP account unit configured in smart-1 Cloud.
A packet capture on the DC shows no traffic from the Gateway when I try to fetch the branches from Smart-1 Cloud. I'm not sure if I need to turn on http/https Proxy on the gateway itself or if I'm missing some other configuration.
Hi,
The fact that you fail to fetch branches shouldn't prevent you from creating Access Role and access your AD. As far as I know, the 'Gateway as a Proxy' feature was developed for 'Access Roles' only. Please try to create an Access Role and access your AD, if you fail to do that as well, please let me know and I will address the relevant owner.
Regards,
Amiad.
If you don't see a gateway to select then either the gateway of management server is not on the correct version. see attached screenshot for reference and the link wolfgang posted.
It worked, with identity collector and manually added branch.
Thanks all.
What version/JHF of gateway?
software version R80.40 - Build 106 - HOTFIX_R80_40_JUMBO_HF_MAIN Take: 83
Hi,
The fact that you fail to fetch branches shouldn't prevent you from creating Access Role and access your AD. As far as I know, the 'Gateway as a Proxy' feature was developed for 'Access Roles' only. Please try to create an Access Role and access your AD, if you fail to do that as well, please let me know and I will address the relevant owner.
Regards,
Amiad.
Thanks Amiad,
That is indeed correct, I was able to create an Access Role and browse through AD. Also for anyone else that is facing the same issue, I also enabled Identity Awareness and while I wasn't able to also connect to AD during blade activation, I ignored it and continued, I manually added my AD in the for Active Directory Query - settings section. when testing, I was able to see the machine hostname and user full name.
Thanks again.
Hi @Amiad_Stern ,
I did follow as you mentioned.
However when I trying to create the Access Role, I unable to access the AD as below:
Is there anything that I'm missing?
Regards,
Fatihah
Hi @Fatihah ,
I'm no longer the owner of Smart-1 Cloud. I'll refer this thread to the relevant owners for them to address your issue.
Regards,
Amiad.
Hi @Amiad_Stern,
Oh I see. Sure and thanks for your help.
Hopefuly, they able to assist me on this issue.
Regards,
Fatihah
Hi @Fatihah,
Apologies for delay. Did you solved the above issue? Is it still relevant?
Hi,
Please note that fetching branch is not supported
You should manually add branch, after it you should be able to create access role.
Hi @dzianiss ,
According to the admin guide you linked the cloud server will use the gateway as a proxy, but it doesn't give me any options for a proxy on the LDAP account unit. Is there a setting that should make my gateway available as a proxy?
Hi @Kevin_Morris ,
Which gateway platform/version are you using?
Also please check version of management and smartconsole build.
Quantum Spark 1600 on R81.10
And which smartconsole build and smart-1 cloud version?
SmartConsole 81.20.9700.451 / Smart-1 Cloud R81.20.
You can only select gateways running R80.20 and above as the proxy.
This does not currently include Quantum Spark devices.
Actually it looks like you can select them if SmartConsole version is 81.20.9700.631. I was using .451 before. Now the question becomes does it actually work. So far I still can't get users and groups from AD.
Quantum Spark 1500 1600 1800 were added to support AD proxy feature with R81.20 security management.
Please check if you accurately configured:
I'm curious when this was added since it's still listed as a known limitation in the relevant SK for R81.10.00: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
The bug ID is SMB-16255.
It's possible this may have been added to R81.10.05 (currently in EA), though I didn't see it mentioned in the feature list.
Hi, AFAIK it was added in R80.20.50. I've tested this version and R81.00. Probably it was not announced in SMB project before R81.20 GA. From my side I can open bug for SMB to include it in resolved issues. I already opened bug for Management Guide - TP-10270.
I can finally confirm this works with the 1600 SMB on R81.10.00 Build 996000575 and SmartConsole version 81.20.9700.631 in Smart-1 Cloud.
hi @Kevin_Morris ,
Trying to configure the same with 1800. Would you please help on this.
what to refer, steps to be taken.
@maddah87 yes this is possible. You have to follow How to Connect a Local Active Directory to Smart-1 Cloud
Your Smart-1 cloud instance has to be on R81.20 and firmware on 1800 appliance R81.xx
It worked, with identity collector and manually added branch.
Thanks all.
If you don't see a gateway to select then either the gateway of management server is not on the correct version. see attached screenshot for reference and the link wolfgang posted.
It was success, on the same day. Branch was added manually and it worked.
Thanks all.
Hi,
I this feature currently available for Spark gateways.
Admin guide says supported Embedded Gaia R80.20.xx and above. struggling configuring the same.
You need to be on R80.20.50 and R81.20 Management with the relevant JHF.
See: https://support.checkpoint.com/results/sk/sk159772
It worked,
Thanks all
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY