pdp ad

General Syntax

pdp ad

      associate <options>

      disassociate <options>

The 'pdp ad associate' command

Description

For the AD QueryClosed Check Point clientless identity acquisition tool. It is based on Active Directory integration and it is completely transparent to the user. The technology is based on querying the Active Directory Security Event Logs and extracting the user and computer mapping to the network address from them. It is based on Windows Management Instrumentation (WMI), a standard Microsoft protocol. The Check Point Security Gateway communicates directly with the Active Directory domain controllers and does not require a separate server. No installation is necessary on the clients, or on the Active Directory server., adds an identity to the Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. database on the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources..

The group data must be in the AD.

Syntax

pdp ad associate ip <IP Address> u <Username> d <Domain> [m <Computer Name>] [t <Timeout>] [s]

Parameters

Parameter

Description

ip <IP Address>

Specifies the IP address for the identity.

u <Username>

Specifies the username for the identity.

d <Domain>

Specifies the Domain of the ID server.

m <Computer Name>

Specifies the computer that is defined for the identity.

t <Timeout>

Specifies the timeout for the AD Query.

Default timeout is 5 hours.

s

Associates the "u <Username>" and the "m <Computer>" parameters sequentially.

First, adds the "<Computer>" and then adds the "<Username>" to the database.

The 'pdp ad disassociate' command

Description

For the AD Query, removes the identity from the Identity Awareness database on the Security Gateway.

Identity Awareness does not authenticate a user that is removed.

Syntax

pdp ad disassociate ip <IP Address> {u <Username> | m <Computer Name>} [r {override | probed | timeout}]

Parameters

Parameter

Description

ip <IP Address>

Specifies the IP address for the identity.

u <Username>

Specifies the username for the identity.

m <Computer Name>

Specifies the computer that is defined for the identity.

r {override | probed | timeout}

Specifies the reason to show in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. on the Logs & Monitor > Logs tab.