- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi we have some servers with multi user agent on them, all works fine, now we added two additional nic's to these servers, can we have MUH agent bind all 3 IP addresses with the username?
Right now when we log in, we get an IA event against the first NIC only. Agree that makes sense but we have a use case for needing all 3 if there is a setting somewhere that would allow it?
I checked with R&D and appears we don't do this currently.
Likely possible to do in the future.
Suggest bringing this requirement through your local Check Point office.
An actual topology diagram showing the use case might help.
Specifically, how will Check Point gateways “see” traffic originating from these IP addresses.
To put it simply, there are static routes on the source forcing certain traffic out of certain nics
so imagine webserver A goes out via nic1, and webserverB goes out via nic 2, we would like to lockdown both traffic flows with an IA rule, currently, we can only do this for nic1, as nic2 does not see any username associated with it.
I had customer do this exact thing before, will check if I can find the setting for it tomorrow. I believe its somewhere in smart console, if I recall right.
Andy
I will check to see if I can find some notes about it tomorrow. I looked in smart console, was mistaken, for sure, cant find anything about what you are looking for in there.
Andy
that would be great thanks, yes I checked in global properties nothing in there either. (maybe a registry change?)
Are you using MUH Agent v1 or v2? V2 tags the packets that are sent out with the ID information which may work regardless of egress NIC, though I've not tried it.
yes we are already running V2 agent
OK so all TCP and UDP traffic should be tagged with the user who originated the traffic, is this not reflected in the gateway logs from all 3 IPs?
Thats right, confirmed using my own account just now, the MUH is R81.041.0000 V2, gateway is r81.20 JHF65
Send two packets on tcp 8080, one dst went via nic1 and one via nic2, correct sources showing in log, only difference was the nic1 log had my username and nic2 log username was blank
Thanks for testing, seems like it only binds to the first NIC. This may end up being an RFE.
I know 100% this can work, as customer made it work with help of TAC few years ago. They now manage their own CP environment, but I wont give up trying to find out how it was done. Sadly, I dont have TAC case handy to look up notes from it, but will see if I can dig out my own notes (hope I still have them, as I save pretty much everything lol)
Andy
@Ryan_Ryan Man, Im so sorry, I looked through all my notes and cant find anything about this :(. I texted the customer and since its been a while, he could not recall either how it was done, he just remembered they had to do some changes in guidbedit and windows registry to make it work. But, since @PhoneBoy confirmed its not supported, I suppose thats the aswer mate.
Andy
The current code sends the IPv4 and IPv6 address already.
Adding support for additional addresses should theoretically be possible.
However…an RFE.
When you contact your local office, make sure they route this request via Solution Center.
I checked with R&D and appears we don't do this currently.
Likely possible to do in the future.
Suggest bringing this requirement through your local Check Point office.
thanks all for your responses! greatly appreciated 😁 Will look at getting an RFE put through.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
5 | |
4 | |
4 | |
4 | |
3 | |
3 | |
3 | |
2 | |
2 | |
2 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY