@Mick_Ball and @OtakarKlier Thanks for suggestions. But how would i check/determine if some server is not reading security logs correctly. We are using 3 of them. Also there is no exchange server, its O365 that we have.
I did install agent on 1 of them and it seems better, but i will monitor and update
this has become some serious issues in my environment. I have 20 firewalls and 10 ipsec site to site.
the recent issue I just realized is that if a user on GP crossing ipsec tunnel from PA to PA, the user id will be dropped at the destination,
and now all the rules will be denying because it can not see the username.
this is very unstable, since 2017, I have been opening tickets 2~3 times a year and still no solid solution.
Some critical information is missing from your explanation but I will assuming your setup is the following:
1. UserA connects via GP to FirewallA
2. UserA then accesses a resource behind FirewallB
3. FirewallB has an ipsec s2s tunnel to FirewallA and this is how GP users are reaching the resource behind FirewallB
If the above is true, then FirewallB needs to be receiving redistributed GP mappings from FirewallA. FirewallB doesn't magically know about the ip to user mapping of UserA that is known to FirewallA. FirewallB must be told wha the ip to user mapping is by configuring user-id redistribution.
you are right on the setup.
and I have user identification enabled on the tunnel ZONEs, and both firewall A and B are pointed 4 AD servers for monitoring and user id mapping.
but Im guessing I would need the redistribution ?
thanks for your reply.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!