<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need to close port 80 and 443 on external interface in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272414#M103776</link>
    <description>&lt;P&gt;K, excellent!&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2026 18:46:05 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-03-03T18:46:05Z</dc:date>
    <item>
      <title>Need to close port 80 and 443 on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272400#M103767</link>
      <description>&lt;P&gt;Recently updated to R82 JHF 60 and now we have port 80 and 443 admin connections open to our gateway. We do not know why that is occurring as we have made no changes other than applying the JHF. We have a stealth rule for our gateway external interfaces which drop all inbound connections to it. We do not use VPN's or any other remote access technology. We assume there is some implied rule that is creating the behavior but are not sure which one it could be. Any assistance appreciated before we go to TAC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking in the logs we find Access Rule Name: Implied Rule&lt;/P&gt;
&lt;P&gt;Access Rule Number: 0&lt;/P&gt;
&lt;P&gt;There is no Rule 0 configured.&lt;/P&gt;
&lt;P&gt;The most likely rule is 'Accept Web and SSH connections for Gateway Administration' under implied rules but unchecking that makes no difference.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 17:53:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272400#M103767</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2026-03-03T17:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Need to close port 80 and 443 on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272405#M103770</link>
      <description>&lt;P&gt;I would check these gateway settings:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gw-portal.png" style="width: 642px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33566iD979F1163EEC7363/image-size/large?v=v2&amp;amp;px=999" role="button" title="gw-portal.png" alt="gw-portal.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 18:10:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272405#M103770</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2026-03-03T18:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: Need to close port 80 and 443 on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272406#M103771</link>
      <description>&lt;P&gt;Hey Tony,&lt;/P&gt;
&lt;P&gt;See if this post I made while ago is relevant to your situation.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/SASE-and-Remote-Access/Geo-VPN-blocking/m-p/214040#M10593" target="_blank"&gt;https://community.checkpoint.com/t5/SASE-and-Remote-Access/Geo-VPN-blocking/m-p/214040#M10593&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 18:15:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272406#M103771</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-03T18:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Need to close port 80 and 443 on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272407#M103772</link>
      <description>&lt;P&gt;It is set to internal only.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 18:16:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272407#M103772</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2026-03-03T18:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: Need to close port 80 and 443 on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272409#M103773</link>
      <description>&lt;P&gt;I have been tinkering with&amp;nbsp;sk165937&lt;/P&gt;
&lt;P&gt;I was able to close port 80 using:&lt;/P&gt;
&lt;P&gt;multi_portal_allow_redirect 0 but it is not truly disabled, just closed so it will still respond to a port scan.&lt;/P&gt;
&lt;P&gt;Editing implied_rules.def and commenting out ENABLE_PORTAL_HTTP_REDIRECT has no effect (the SK is actually for R81 series)&lt;/P&gt;
&lt;P&gt;I have pushed policy after making changes.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 18:21:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272409#M103773</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2026-03-03T18:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: Need to close port 80 and 443 on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272411#M103774</link>
      <description>&lt;P&gt;I found some notes on the last time this happened with R82. I will post them here.&lt;/P&gt;
&lt;P&gt;Not sure who I was conversing with at the time.&lt;/P&gt;
&lt;P&gt;To close 80 and 443 after update&lt;/P&gt;
&lt;P&gt;Another possible method is enabling the parameter fw_ignore_before_drop_rules. &lt;BR /&gt;What this does is makes it so that your rulebase takes priority over the implied rules for the http portal services.&lt;/P&gt;
&lt;P&gt;You can check the current value by running:&lt;BR /&gt;fw ctl get int fw_ignore_before_drop_rules&lt;/P&gt;
&lt;P&gt;If it is at 0 (default value) then the feature is currently disabled.&lt;/P&gt;
&lt;P&gt;If you want to enable it, you can run:&lt;BR /&gt;fw ctl set int fw_ignore_before_drop_rules 1&lt;/P&gt;
&lt;P&gt;On the management server edit implied_rules.def in /opt/CPSuite82/fw1/lib set to end of rule to drop.&lt;/P&gt;
&lt;P&gt;#define multiportal_real_ports_block_in \&lt;BR /&gt;start_rule_code(MAKE_RULENUM(0,0x62)), \&lt;BR /&gt;tcp, ((inbound, (IS_MY_IPADDR(dst) or IS_LOCAL_CLUSTER_IP(dst)))), \&lt;BR /&gt;(dport in multiportal_real_ports) or (dport = 8880) or (dport = 444) or (dport = 8082), IMPLIED_LOG, drop;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;push policy access control via smart console.&lt;/P&gt;
&lt;P&gt;I spoke with RnD and in turns out there was newly added feature in R82.&lt;/P&gt;
&lt;P&gt;By adding this line into the $FWDIR/conf/user.def.FW1 file, you are able to change *all* implied rules that originally rejected into drops instead.&lt;/P&gt;
&lt;P&gt;#define ENABLE_DROP_INSTEAD_OF_REJECT&lt;/P&gt;
&lt;P&gt;Example of it being in my file:&lt;BR /&gt;#ifndef __user_def__&lt;BR /&gt;#define __user_def__&lt;/P&gt;
&lt;P&gt;//&lt;BR /&gt;// User defined INSPECT code&lt;BR /&gt;//&lt;/P&gt;
&lt;P&gt;#define ENABLE_DROP_INSTEAD_OF_REJECT&lt;/P&gt;
&lt;P&gt;#endif /* __user_def__ */&lt;/P&gt;
&lt;P&gt;I will add an SK in the future to document this procedure. (again I do not know who this was.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 18:33:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272411#M103774</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2026-03-03T18:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Need to close port 80 and 443 on external interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272414#M103776</link>
      <description>&lt;P&gt;K, excellent!&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 18:46:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-close-port-80-and-443-on-external-interface/m-p/272414#M103776</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-03T18:46:05Z</dc:date>
    </item>
  </channel>
</rss>

