- Products
- Learn
- Local User Groups
- Partners
- More
Check Point WAF TechTalk:
Introduction and New Features
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
CheckMates Go:
CheckMates Fest
Hi we have some servers with multi user agent on them, all works fine, now we added two additional nic's to these servers, can we have MUH agent bind all 3 IP addresses with the username?
Right now when we log in, we get an IA event against the first NIC only. Agree that makes sense but we have a use case for needing all 3 if there is a setting somewhere that would allow it?
I checked with R&D and appears we don't do this currently.
Likely possible to do in the future.
Suggest bringing this requirement through your local Check Point office.
An actual topology diagram showing the use case might help.
Specifically, how will Check Point gateways “see” traffic originating from these IP addresses.
To put it simply, there are static routes on the source forcing certain traffic out of certain nics
so imagine webserver A goes out via nic1, and webserverB goes out via nic 2, we would like to lockdown both traffic flows with an IA rule, currently, we can only do this for nic1, as nic2 does not see any username associated with it.
I had customer do this exact thing before, will check if I can find the setting for it tomorrow. I believe its somewhere in smart console, if I recall right.
Andy
I will check to see if I can find some notes about it tomorrow. I looked in smart console, was mistaken, for sure, cant find anything about what you are looking for in there.
Andy
that would be great thanks, yes I checked in global properties nothing in there either. (maybe a registry change?)
Are you using MUH Agent v1 or v2? V2 tags the packets that are sent out with the ID information which may work regardless of egress NIC, though I've not tried it.
yes we are already running V2 agent
OK so all TCP and UDP traffic should be tagged with the user who originated the traffic, is this not reflected in the gateway logs from all 3 IPs?
Thats right, confirmed using my own account just now, the MUH is R81.041.0000 V2, gateway is r81.20 JHF65
Send two packets on tcp 8080, one dst went via nic1 and one via nic2, correct sources showing in log, only difference was the nic1 log had my username and nic2 log username was blank
Thanks for testing, seems like it only binds to the first NIC. This may end up being an RFE.
I know 100% this can work, as customer made it work with help of TAC few years ago. They now manage their own CP environment, but I wont give up trying to find out how it was done. Sadly, I dont have TAC case handy to look up notes from it, but will see if I can dig out my own notes (hope I still have them, as I save pretty much everything lol)
Andy
@Ryan_Ryan Man, Im so sorry, I looked through all my notes and cant find anything about this :(. I texted the customer and since its been a while, he could not recall either how it was done, he just remembered they had to do some changes in guidbedit and windows registry to make it work. But, since @PhoneBoy confirmed its not supported, I suppose thats the aswer mate.
Andy
The current code sends the IPv4 and IPv6 address already.
Adding support for additional addresses should theoretically be possible.
However…an RFE.
When you contact your local office, make sure they route this request via Solution Center.
I checked with R&D and appears we don't do this currently.
Likely possible to do in the future.
Suggest bringing this requirement through your local Check Point office.
thanks all for your responses! greatly appreciated 😁 Will look at getting an RFE put through.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 63 | |
| 38 | |
| 23 | |
| 12 | |
| 11 | |
| 10 | |
| 10 | |
| 9 | |
| 9 | |
| 8 |
Thu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementTue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionTue 07 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Check Point WAF and IO River: Multi-CDN Security in ActionWed 08 Apr 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: The Cloud Firewall with near 100% Zero Day prevention - In 7 LanguagesWed 08 Apr 2026 @ 07:00 PM (CST)
ERM al Descubierto: Amenazas Ocultas que Pondrán a Prueba tu Empresa en 2026Fri 10 Apr 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 45: Harmony SASE updateThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementTue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY