- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
sk134312 was updated with a new Identity Collector, Identity Agent (Windows and MacOS) and MUH Agent for the R80.40 release.
The new MUH Agent introduces different approach for identifying users behind the same terminal server / Citrix server.
With this approach, we are resolving current limitation of number of users per server (will now be 256 users per server), and 3rd party applications compatibility issues.
This solution is supported only with R80.40 (or later) Security Gateways.
You will have to uninstall and reinstall the new agent as they have a different implementation and driver.
The previous agent will continue to work with R80.40.
It will be supported soon.
we are working on it.
Good news!
Maybe I just overlooked it in the documentation, but can you tell me something about the new approach, the MUHv2 is using?
sk134312 still links to sk66761 and this sk seems to describe the old MUHv1 behavior with reserved port ranges and manipulated tcp and udp source port numbers using a filter driver.
From page 69ff in CP_R80.40_IdentityAwareness_AdminGuide.pdf, it looks like there are no reserved tcp and udp port ranges anymore, but just "ID Range".
How does it work now?
Thanks in advance for any explanation (or link to the correct documentation).
@Royi_Priov can you explain?
Hi @Tobias_Moritz ,
Indeed our SKs are not yet updated with the new information about MUH2 (the new TS agent).
In few words: this is an agent which will work only with R80.40 (and above) gateways. It is not using source ports for user identity, but tagging the packets with IDs in a different way.
We performed this change for few reasons:
1. Scalability improvements on client side - it will allow having 256 users per TS machine.
2. 3rd party apps compatibility - other apps which also tunnel source port data (such as Anti-Viruses) will not collide with MUH anymore.
3. Scalability improvement on gateway side - the frequent update messages from MUH client to GW were really heavy. Since we are not sensitive to source ports anymore, the updates will be less frequent.
I hope it helps 🙂
You are welcome to tag me if any question is left unanswered.
Hi @Royi_Priov ,
thanks for the fast answer!
I guess when you say "tagging the packets with IDs in a different way" and "allow having 256 users per TS", you mean you add 8 bits to the option field of the IP packet header, inserted by a filter driver, right? This would explain the need for double reboots when upgrading from MUHv1 to MUHv2 (uninstall old driver which rewrites TCP and UDP source ports, reboot, install new driver which modifies IP header option field, reboot).
If I'm right, this approach should work for all layer 4 protocols, not only TCP und UDP like the old one.
Now the question: Am I right? 🤔
Hi @Tobias_Moritz ,
You are right in the high level details 😁
The implementation was done only for TCP and UDP in the driver.
If you need an implementation to other layer 4 protocol, you are welcome to explain the use case.
Hi ,
I'm sure I read it somewhere, that the MUHv2 agent can also work with an r80.30 gateway with a later JHF ?
Can someone confirm if MUHv2 for terminal server requires to connect to R80.40 gateway only or can be supported on R80.30 JHF x?
thanks
Peter
It will be supported soon.
we are working on it.
we too had the requirement from some customer for support of the new agent with R80.30.
Are there any news or a timeline ?
Wolfgang
Hi @Peter_Lyndley , @Wolfgang
It will be added as PRJ-11851 to R80.30 JHF. It is not in T195, but probably the one after.
Indeed , should be part of our upcoming R80.30 ongoing take, should be released by EOM.
Great news.
Wolfgang
8)
Hi @Wolfgang , @Peter_Lyndley , @Tobias_Moritz
MUH2 support for R80.30 was released.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
10 | |
7 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY