- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Guys,
We have a requirement that only specific MAC/company assigned laptops should only be able to connect to company RAVPN to access Internal resources. If a user tries to login via any other system then user should not be able to connect to VPN.
Can we achieve this via any MAC check or MAC binding via Endpoint Client when a user tries to connect to VPN.
In SCV check there is no such direct option to check this.
Apart from MAC if any other checks or Checkpoint config can achieve this then its most welcomed!!
The way organizations typically enforce this is one of:
We don't do enforcement by MAC for Remote Access clients.
Im not aware of such option, but if you have IA enabled and AD integrated, you can always configure access roles and configure ACL that way. I did that for many customers and workes with no issues.
Hi,
but will access roles work for RAVPN policy?
Not only can you build Remote Access policy with Access Roles, you can build Remote Access-specific Access Roles.
The way organizations typically enforce this is one of:
We don't do enforcement by MAC for Remote Access clients.
Hi,
To use Machine certificate the system needs to have an machine entry in AD server, right?
Also does the remote system needs to be a part of company domain or workgroup systems, since the remote systems cannot be a part of domain right?
Yes, the PC should be defined in AD. Look into your Remote Access Admin guide, under "Machine Certificate" section, for example: https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_RemoteAccessVPN_AdminGuide/T...
Hi,
Which certificate needs to be present on the endpoint, CA certificate right?
I have the AD provided CA certificate on the endpoint as my AD is CA & I have generated certificate from there as Trusted CA.
Still error observed. I am referring sk173173 as well.
CertManager::EnumCertificates: __end__ 18:37:30.496. Total time - 0 milliseconds
[ 7200 13432][27 Feb 18:37:30][RaisCertManager] RaisCertManager::CertManager::GetCertByName: Searching the certificate in the machine's store.
[ 7200 13432][27 Feb 18:37:30][RaisCertManager] RaisCertManager::CertManager::GetCertByName: CertManager::GetCertByName: Pushing DN = [CN=poclab-POCDC-CA,DC=poclab,DC=com]
[ 7200 13432][27 Feb 18:37:30][RaisCertManager] RaisCertManager::CertManager::GetCertByName: CertManager::GetCertByName: Pushing DN = [O=CPMGMT..526xt3]
[ 7200 13432][27 Feb 18:37:30][RaisCertManager] RaisCertManager::CertManager::GetCertByName: temp_cert is null!! => No cert was found with the given cert_name= [CN=poclab-POCDC-CA,DC=poclab,DC=com;O=CPMGMT..526xt3]
[ 7200 13432][27 Feb 18:37:30][RaisCertManager] CertManager::GetCertByName: __end__ 18:37:30.496. Total time - 0 milliseconds
[ 7200 13432][27 Feb 18:37:30][IKE] MM4PacketHandler: A matching certificate for the machine was not found. Continue without it.
[ 7200 13432][27 Feb 18:37:30][IKE] **** create_MM5(hybrid authentication): Create packet 5
[ 7200 13432][27 Feb 18:37:30][clips_gen_utils] ClipsGeneralUtils::getSerializedAuthenticationBlob: Entering...
[ 7200 13432][27 Feb 18:37:30][IKE] create_MM5(hybrid authentication): authentication blob (
:clientType (TRAC)
:oldSessionId ()
:protocolVersion (100)
:client_mode (endpoint_security)
:selected_realm_id (vpn_Username_Password)
:secondary_realm_hash (c81e728d9d4c2f636f067f89cc14862c)
:client_logging_data (
:device_id ("{F70FE1F2-D81C-4642-BF49-F2ADF1DC8B43}")
:client_name ("Endpoint Security VPN")
:client_ver (E86.70)
:client_build_number (986104207)
:device_type (PC)
:os_name (Windows)
:os_version (10)
:os_edition (Enterprise)
The certificate that needs to be present is machine specific.
Please refer to the documentation: https://sc1.checkpoint.com/documents/RemoteAccessClients_forWindows_AdminGuide/Content/Topics-RA-VPN...
You can do that using an external DHCP Server. Each endpoint client has its own mac address, so you can tie this mac addres in the DHCP Server and only the mac addresses that is tied in the DHCP Server will be able to receive an ip address.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Thu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY