- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi
i'am using Checkpoint 9100 with R80.20 as SMS. I would like to assign each user IP address with a mac address. That's mean, if i take a IP address of my neighboor i can't access to network or internet
can we do this in checkpoint ?
MAC addresses are not something you can “assign” as they are determined by the hardware the user is using.
We also don’t do any enforcement based on MAC address, therefore no ability to bind a user to a MAC.
MAC addresses are not something you can “assign” as they are determined by the hardware the user is using.
We also don’t do any enforcement based on MAC address, therefore no ability to bind a user to a MAC.
What type of user exactly?
Andy
When i said bind ip address with mac address, i mean if the IT department give the ip : 192.168.76.89 to computer_user_1, so i want to bind this ip address with the mac address of the computer computer_user_1.
Some users IP address are able to access some categories of sites, so if someone is absent, some users are able to table their ip address to reach those categories sites ..;
The closest thing I can think of would be below.
Andy
@the_rock thanks for your reply, but it's vpn client for the remoter users. What i want is for the local network.
As Phoneboy said, thats not sadly possible, sorry.
Andy
A Check Point gateway can do this enforcement irrespective of the IP address with Identity Awareness and App Control/URL Filtering.
That assumes the policy is enforced on a Check Point gateway, of course.
How can i do that in checkpoint gateway ?
Maybe access role? Not sure, let @PhoneBoy confirm.
A lot more information about the environment would be necessary to give you specific answers.
In general, though, you need to configure access to the relevant identity sources, create Access Roles, and create the relevant access rules using those Access Roles.
Supported identity sources include:
More on the above can be found here: https://sc1.checkpoint.com/documents/Identity_Awareness_Clients_Admin_Guide/Content/Topics-IA-Client...
See also: https://support.checkpoint.com/results/sk/sk86441
See also the podcast I did talking about Identity Awareness Best Practices, the notes for which link to more detailed sessions on the topic: https://community.checkpoint.com/t5/CheckMates-Go-Cyber-Security/S06E08-Identity-Awareness-Best-Prac...
Thanks @PhoneBoy for these idea, i will read all of this and hope find solutions.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY