<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port 444 SSL Extender in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138158#M20962</link>
    <description>&lt;P&gt;Well, I did NOT advise you to change it...I said you COULD...lol. After all, its your firewall. I can only suggest things mate : - )&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jan 2022 18:36:51 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2022-01-11T18:36:51Z</dc:date>
    <item>
      <title>Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138055#M20932</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;I just updated from R80.40 to R81 so I did a follow up external port scan (GRC shields Up) to see if everything looked as&lt;/P&gt;&lt;P&gt;expected. It picked up on port 444 stating it is 'closed'. All other ports are 'stealth'.&lt;/P&gt;&lt;P&gt;I remember in the past this happening and I was able to disable a service and get it back to 'stealth'.&lt;/P&gt;&lt;P&gt;The current 'closed' port has to do with SSL Extender VPN. We do not use VPN in any capacity and therefore&lt;/P&gt;&lt;P&gt;it is not used. If I check the gateway settings the only blades I have active are Firewall and Anti-SPAM &amp;amp; Email Security.&lt;/P&gt;&lt;P&gt;Any ideas on what clicky box I need to find to get back to full stealth?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 18:59:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138055#M20932</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-10T18:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138057#M20933</link>
      <description>&lt;P&gt;Thats a bit odd, if you dont even have the blade enabled. Hm...let me look into that for you.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 19:27:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138057#M20933</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-01-10T19:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138076#M20935</link>
      <description>&lt;P&gt;Port 443 would have been used by SSL VPN and Visitor Mode as well as by IA blades Browser Auth &amp;nbsp;and TS Agent - but port 444 is not used by CP at all...&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 11:24:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138076#M20935</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-01-11T11:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138081#M20936</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24239"&gt;@Tony_Graham&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check which process is running on the port:&lt;BR /&gt;netstat -tulpn | grep ":444"&lt;BR /&gt;&lt;BR /&gt;Now the process and the process ID should be output at the last position.&lt;BR /&gt;Depending on the process, you decide what needs to be disabled.&lt;BR /&gt;&lt;BR /&gt;Furthermore, this should not be a problem if there is a stealth rule on the firewall that prevents access to port 444.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 11:46:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138081#M20936</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2022-01-11T11:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138096#M20940</link>
      <description>&lt;P&gt;Guys are definitely right, port 444 would not even be used by the firewall.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 13:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138096#M20940</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-01-11T13:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138098#M20941</link>
      <description>&lt;P&gt;Hello Tony,&lt;/P&gt;
&lt;P&gt;You sure you are scanning the correct IP Address? Port 444 could just be an snpp protocol or something else. As other comments on this post you can verify in the FW CLI for netstat or do a pgrep 444 or ps aux | grep 444 and confirm if is running any PID, if you can to kill process use kill and (PID)&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 13:28:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138098#M20941</guid>
      <dc:creator>K_montalvo</dc:creator>
      <dc:date>2022-01-11T13:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138099#M20942</link>
      <description>&lt;P&gt;Have you performed visitor mode customizations historically like those referenced in&amp;nbsp;&lt;SPAN&gt;sk111974?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 13:34:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138099#M20942</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-01-11T13:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138119#M20943</link>
      <description>&lt;P&gt;netstat -tulpn | grep ":444"&lt;/P&gt;&lt;P&gt;returns nothing of value.&lt;/P&gt;&lt;P&gt;There is a stealth rule in place so I assume if it something in Global that is overriding it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 15:00:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138119#M20943</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T15:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138120#M20944</link>
      <description>&lt;P&gt;As it is a Sandblast appliance there is no other product installed on it.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 15:01:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138120#M20944</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T15:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138121#M20945</link>
      <description>&lt;P&gt;GRC does an autodetect to determine the originating IP for the scan which is my external gateway.&lt;/P&gt;&lt;P&gt;I have confirmed this. There are no running PIDs on that port that I can find.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 15:05:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138121#M20945</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T15:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138124#M20947</link>
      <description>&lt;P&gt;You may have jogged a spider web out of my mind. In the past when this port popped up it had something to do with an external CP control connection in Global Properties. I don't recall which one needed to be unticked to stealth 444 but one of them does. I think it's an error that 444 isn't used. It might not be used but something exposes it and there is a clicky bit to turn it back off.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 15:15:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138124#M20947</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T15:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138131#M20949</link>
      <description>&lt;P&gt;What&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;said makes sense. That came to my mind as well...check implied_rules.def on mgmt server, as well as under gateway object -&amp;gt; vpn clients -&amp;gt; remote access -&amp;gt; support visitor mode...what port is listed there?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 15:41:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138131#M20949</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-01-11T15:41:38Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138135#M20950</link>
      <description>&lt;P&gt;Well that's the trick. I cannot check gateway object --&amp;gt; vpn clients because there is not a menu for that.&lt;/P&gt;&lt;P&gt;R81. Inside implied_rules.def on mgmt server I see a line under&lt;/P&gt;&lt;P&gt;#define multiportal_real_ports_block_in&lt;/P&gt;&lt;P&gt;(dport in multiportal_real_ports) or (dport = 8880) or (dport =444) or (dport = 8802), IMPLIED_LOG, reject;&lt;/P&gt;&lt;P&gt;So something does monkey with 444. I think I'll contact TAC about it so they know the port is getting set as enabled but closed for some reason.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**UPDATE** The stealth rule does not block the 444 port.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 16:58:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138135#M20950</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T16:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138146#M20953</link>
      <description>&lt;P&gt;Have a look&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111974&amp;amp;partition=Advanced&amp;amp;product=Endpoint" target="_blank" rel="noopener"&gt;Remote Access with Visitor Mode set to use TCP port 444 no longer works after upgrading to R77.30&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;something was changed from default…&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 17:52:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138146#M20953</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2022-01-11T17:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138147#M20954</link>
      <description>&lt;P&gt;Yes. I have been through that SK. I do not wish to enable remote access.&lt;/P&gt;&lt;P&gt;I could change (dport in multiportal_real_ports) or (dport = 8880) or (dport =444) or (dport = 8802), IMPLIED_LOG, reject;&amp;nbsp;&lt;/P&gt;&lt;P&gt;to 'drop' from 'reject' but not sure what consequences/side-effects that would have for the other ports 8880 or 8802.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:00:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138147#M20954</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T18:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138148#M20955</link>
      <description>&lt;P&gt;Also note I have gone through the Smart Console Policy editor and viewed the Implied Rules.&lt;/P&gt;&lt;P&gt;There are no references to 444, 8802 or 8880 in the implied rules. Not sure why they are in implied_rules.def.&lt;/P&gt;&lt;P&gt;I also have no service objects for those ports in my policy editor so maybe it is cruft from an upgrade that can be removed. Beyond my pay grade at this point. Have to wait and see what TAC says.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:13:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138148#M20955</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T18:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138151#M20956</link>
      <description>&lt;P&gt;Do you&amp;nbsp; defined a static NAT rule for port 444?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:20:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138151#M20956</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2022-01-11T18:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138152#M20957</link>
      <description>&lt;P&gt;I would hate to advise anyone to change that file (implied_rules.def), BUT...one thing you could try is make a copy and modify that line with port 444, verify, apply policy and re-run the test again.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:21:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138152#M20957</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-01-11T18:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138154#M20958</link>
      <description>&lt;P&gt;No I have never used 444 for anything.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:30:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138154#M20958</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T18:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Port 444 SSL Extender</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138155#M20959</link>
      <description>&lt;P&gt;"I would hate to advise anyone to change that file (implied_rules.def), BUT..", you just did LOL.&lt;/P&gt;&lt;P&gt;I was confident enough to give it a whirl as I was leaning that way myself.&lt;/P&gt;&lt;P&gt;By the way it worked. 444 is now stealthed again. I changed the line from 'reject' to 'drop'.&lt;/P&gt;&lt;P&gt;I don't know why I remember having to do this awhile back for the same reason. According to sk92281 this file&lt;/P&gt;&lt;P&gt;gets overwritten during upgrades so if I had made the change in the past it would have gotten zapped during my move to R81 last Friday. Still don't know why these entries in implied_rules.def are appearing to begin with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:36:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Port-444-SSL-Extender/m-p/138155#M20959</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-01-11T18:36:43Z</dc:date>
    </item>
  </channel>
</rss>

