In the Servers section, for each Global Catalog, click
Add and
enter the server
Name, IP address (
LDAP
Server), and
Port. For a plaintext
or Start Transport Layer Security (
Start TLS) connection,
use
Port 3268. For an LDAP over SSL connection,
use
Port 3269. If the connection will use
Start TLS or LDAP over SSL, select the
Require SSL/TLS
secured connection check box.
In the
Base DN field, enter
the Distinguished Name (DN) of the point in the Global Catalog server
where the firewall will start searching for group mapping information
(for example,
DC=acbdomain,DC=com).
For the
Type, select
active-directory.
Configure an LDAP server profile to specify how the firewall
connects to the servers (up to four) that contain domain mapping
information.
User-ID uses this information to map DNS domain names to
NetBIOS domain names. This mapping ensures consistent domain/username
references in policy rules.
To improve
availability, use at least two servers for redundancy.
The
steps are the same as for the LDAP server profile you created for
Global Catalogs in the previous step, except for the following fields:
- LDAP Server—Enter the IP address of the
domain controller that contains the domain mapping information.
- Port—For a plaintext or Start TLS connection,
use Port 389. For an LDAP over SSL connection,
use Port 636. If the connection will use
Start TLS or LDAP over SSL, select the Require SSL/TLS
secured connection check box.
- Base DN—Select the DN of the point in
the domain controller where the firewall will start searching for
domain mapping information. The value must start with the string: cn=partitions,cn=configuration (for
example, cn=partitions,cn=configuration,DC=acbdomain,DC=com).
Create a group mapping configuration for each LDAP server
profile you created.
Select .
Click
Add and enter a
Name to
identify the group mapping configuration.
Select the LDAP
Server Profile and
ensure the
Enabled check box is selected.
If the Global Catalog and domain mapping
servers reference more groups than your security rules require,
configure the Group Include List and/or Custom
Group list to limit the groups for which User-ID performs
mapping.
Click OK and Commit.