<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using API with Management Plane Sepration in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141405#M21829</link>
    <description>&lt;P&gt;Do you have the api services configured in mdps? Like these two for example?&lt;BR /&gt;&lt;BR /&gt;add mdps task process rest_api_docs&lt;BR /&gt;add mdps task process rest_api_run&lt;/P&gt;</description>
    <pubDate>Mon, 14 Feb 2022 10:00:41 GMT</pubDate>
    <dc:creator>Luis_Miguel_Mig</dc:creator>
    <dc:date>2022-02-14T10:00:41Z</dc:date>
    <item>
      <title>Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141300#M21807</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;I try to make IA-Api work with Management separation but although it appears to be handled by the multiportal daemon it is not accessible via management plane interface while Platform portal is.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm confused.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Zoltan&lt;/P&gt;</description>
      <pubDate>Fri, 11 Feb 2022 20:25:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141300#M21807</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-11T20:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141402#M21827</link>
      <description>&lt;P&gt;Do you mean gaia api? Yeah, I have tested gaia api in the mgmt plane.&amp;nbsp;&amp;nbsp;&lt;A href="https://mgmtip/gaia_api/command" target="_blank"&gt;https://mgmtip/gaia_api/command&lt;/A&gt;.&amp;nbsp; Easy to test with postman and ansible too.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 09:45:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141402#M21827</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-02-14T09:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141403#M21828</link>
      <description>&lt;P&gt;nope, I'd like to get the Identity Awarenes Api working via management plane like this:&lt;/P&gt;&lt;P&gt;[root@zentos01 ~]# curl -k -H "Content-Type: application/json" -d $'{"shared-secret":"12345678",\n "ip-address":"192.168.0.11"}' &lt;A href="https://192.168.3.27/_IA_API/v1.0/show-identity" target="_blank" rel="noopener"&gt;https://192.168.3.27/_IA_API/v1.0/show-identity&lt;/A&gt;&lt;BR /&gt;{&lt;BR /&gt;"ipv4-address" : "192.168.0.11",&lt;BR /&gt;"message" : "total 0 user records were found."&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;But when turning mgmt plan on I get this instead:&lt;/P&gt;&lt;P&gt;[root@zentos01 ~]# curl -k -H "Content-Type: application/json" -d $'{"shared-sec ret":"Gb53Epg4RY",\n "ip-address":"192.168.0.11"}' &lt;A href="https://192.168.3.27/_IA_API/" target="_blank" rel="noopener"&gt;https://192.168.3.27/_IA_API/&lt;/A&gt; v1.0/show-identity&lt;BR /&gt;curl: (56) TCP connection reset by peer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 09:54:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141403#M21828</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-14T09:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141405#M21829</link>
      <description>&lt;P&gt;Do you have the api services configured in mdps? Like these two for example?&lt;BR /&gt;&lt;BR /&gt;add mdps task process rest_api_docs&lt;BR /&gt;add mdps task process rest_api_run&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 10:00:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141405#M21829</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-02-14T10:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141406#M21830</link>
      <description>&lt;P&gt;yes tried that as well made no difference.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 10:14:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141406#M21830</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-14T10:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141410#M21831</link>
      <description>&lt;P&gt;I would suggest to take a network capture and see what port tries to reach and make sure that the port is configured like this&lt;BR /&gt;&lt;BR /&gt;add mdps task port 80 protocol tcp&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 10:47:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141410#M21831</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-02-14T10:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141413#M21832</link>
      <description>&lt;P&gt;Thanks for advice, but I'm not sure what I should sniffer for.&lt;BR /&gt;As stated above&amp;nbsp; I call&amp;nbsp;&amp;nbsp;&lt;A href="https://192.168.3.27/_IA_API/v1.0/show-identity" target="_blank" rel="noopener nofollow noreferrer"&gt;https://192.168.3.27/_IA_API/v1.0/show-identity&lt;/A&gt;&amp;nbsp;on 443.&lt;BR /&gt;I've tried to add 443 the way you proposed but still got that connection reset.&lt;/P&gt;&lt;P&gt;Also tried to add different other things. I'm a little annoyed as I don't really understand how mdps really works and what it means to add one thing (service/port/application).&lt;BR /&gt;&lt;BR /&gt;I suspect that IA-API is handled by the multiportal because I found some traces pointing there:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;/opt/CPshrd-R80.40/conf/multiportal/httpd-conf/portalsPathPrefix.conf&lt;BR /&gt;[...]&amp;nbsp;SetEnv MULTIPORTAL_IAAPI_PATH_PREFIX /_IA_API [...]&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;and in&amp;nbsp;„$FWDIR/ICS/update/incoming/ICS.C&lt;BR /&gt;where i's stated that IA API is listening on&amp;nbsp;&lt;BR /&gt;[...]:internal_port (8886)[...]&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;But neither am I able to&amp;nbsp; see that port in netstat, nor&amp;nbsp; is there any output sniffering on that port on loopback as I'd expect.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 16:08:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141413#M21832</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-14T16:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141416#M21833</link>
      <description>&lt;P&gt;I suggest a TAC case&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 12:18:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141416#M21833</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-14T12:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141425#M21834</link>
      <description>&lt;P&gt;Hi Zoltan,&lt;/P&gt;&lt;P&gt;We had the same issue 2 months ago. IA-API requests are handled directly by the kernel, not the apache process which is responsible for the Gaia portal. When you enable management separation, the kernel no longer listens o the management interface, and IA-API works only on the data interface.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 13:37:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141425#M21834</guid>
      <dc:creator>Robert_H</dc:creator>
      <dc:date>2022-02-14T13:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141426#M21835</link>
      <description>&lt;P&gt;If you are getting a "&lt;SPAN&gt;TCP connection reset by peer" I would filter those two ips&amp;nbsp;192.168.0.11 or 192.168.3.27 and try to find a TCP&amp;nbsp; SYN and TCP RST.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 13:45:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141426#M21835</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-02-14T13:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141427#M21836</link>
      <description>&lt;P&gt;Yes there is a reset, but what to do about it now?&lt;BR /&gt;I still have no clue how to get rid of it.&lt;BR /&gt;@ _Val_&amp;nbsp; Yes I'll go on an open an SR&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 13:52:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141427#M21836</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-14T13:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141431#M21837</link>
      <description>&lt;P&gt;Basically, APIs are answering on the management IP address. If your management plane is configured properly, and MGMT interface is showing on the management plane, APIs should work. Check if clients are configured properly, but TAC is the fastest way, since you already tried some troubleshooting.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 14:18:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141431#M21837</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-14T14:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141432#M21838</link>
      <description>&lt;P&gt;After re-reading the tread, where is your authentication token? Check you login and reuse token before anything else.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 14:19:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141432#M21838</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-14T14:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141434#M21839</link>
      <description>&lt;P&gt;Identity awareness API will not run on the management interface after data plane separation. IA API is handled by kernel API because all requests will be transferred to the kernel tables directly (performance).&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 14:23:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141434#M21839</guid>
      <dc:creator>Robert_H</dc:creator>
      <dc:date>2022-02-14T14:23:40Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141444#M21840</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/46218"&gt;@Robert_H&lt;/a&gt;&amp;nbsp;Interesting, I will need to double-check that...&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 14:53:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141444#M21840</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-02-14T14:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141452#M21842</link>
      <description>&lt;P&gt;Documentation sk138672 is not clear for that case.&lt;BR /&gt;As I understand, the first is kernel API, second is a httpd2 (portal API). I really don't know how it works internally because httpd2 is not responsible for IA API routing (but I would like to know).&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 15:11:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141452#M21842</guid>
      <dc:creator>Robert_H</dc:creator>
      <dc:date>2022-02-14T15:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141455#M21843</link>
      <description>&lt;P&gt;Sorry, not sure what you mean.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The token is the shared Secret&amp;nbsp; within the Post, isn't it?&lt;BR /&gt;And as long as mdps is off, it returns a valid respose.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[root@zentos01 ~]# curl -k -H "Content-Type: application/json" -d $'{"shared-secret":"12345678",\n "ip-address":"192.168.0.11"}'&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://192.168.3.27/_IA_API/v1.0/show-identity" target="_blank" rel="noopener nofollow noreferrer"&gt;https://192.168.3.27/_IA_API/v1.0/show-identity&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;{&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;"ipv4-address" : "192.168.0.11",&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;"message" : "total 0 user records were found."&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;}&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 15:32:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141455#M21843</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-14T15:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141457#M21845</link>
      <description>&lt;P&gt;Would you please elaborate Kernel API or point me some documents? I never heard of that.&lt;/P&gt;&lt;P&gt;in the SK I only see this&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Access&lt;/STRONG&gt;: SSH, FTP, and more&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Provisioning&lt;/STRONG&gt;: Policy installation, Gaia Portal, REST API, and more&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Monitoring&lt;/STRONG&gt;: Logs, SNMP, and more&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;with my IP_API probably subsumed under "more"&lt;/P&gt;&lt;P&gt;As I've found traces of IA-API in those files metioned above, I suspected that the whole thind is handled by the notorious&amp;nbsp; multiportal daemon.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 15:45:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141457#M21845</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-14T15:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141508#M21853</link>
      <description>&lt;P&gt;Sorry, I don't have any document or SK. This information was provided by our local SE. IMHO, it is logical, how IA API works. But we didn't find any related information on how IA API works when you have mgmt/data plane separation. TAC didn't help.&lt;/P&gt;&lt;P&gt;And from the real gateway: when you switch to dplane and try to find what process listen on port 443, the output will be empty. When you switch to mplane, your output looks like this:&lt;/P&gt;&lt;P&gt;[Expert@fw:mplane]# netstat -tnap|grep 443&lt;/P&gt;&lt;P&gt;tcp&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0&amp;nbsp; &amp;nbsp; &amp;nbsp; 0 0.0.0.0:443&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0.0.0.0:*&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;LISTEN&amp;nbsp; &amp;nbsp; &amp;nbsp; 12740/httpd2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And when you try to telnet to port 443 on any interface from the data plane, gw will return what you need.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 07:31:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141508#M21853</guid>
      <dc:creator>Robert_H</dc:creator>
      <dc:date>2022-02-15T07:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using API with Management Plane Sepration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141661#M21883</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/46218"&gt;@Robert_H&lt;/a&gt;&amp;nbsp;those lines where copied from&amp;nbsp;&lt;SPAN&gt;sk138672 you mentioned above.&lt;BR /&gt;Yes you're right, in mplane you can see httpd2 but I think this fact is rather distracting.&lt;BR /&gt;If I disable mplan and change the Gaia Portal to be listening to some bogus port 14345 that is reflecting in httpd2 as well while nothing seems to be listening in 443 anymore:&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;[Expert@CP8040-test:0]# mplane&lt;BR /&gt;Management data plane separation is disabled&lt;BR /&gt;[Expert@CP8040-test:0]# netstat -tnlp | grep 14345&lt;BR /&gt;tcp 0 0 0.0.0.0:14345 0.0.0.0:* LISTEN 19031/httpd2&lt;BR /&gt;[Expert@CP8040-test:0]# netstat -tnlp | grep 443&lt;BR /&gt;tcp 0 0 0.0.0.0:44309 0.0.0.0:* LISTEN 17924/fwd&lt;BR /&gt;tcp 0 0 0.0.0.0:44353 0.0.0.0:* LISTEN 17924/fwd&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;but nevertheless I am able to query IA-Api on 443:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;[root@zentos01 ~]# curl -k -H "Content-Type: application/json" -d $'{"shared-secret":"Gb53Epg4RY",\n "ip-address":"192.168.0.11"}' &lt;A href="https://192.168.3.27/_IA_API/v1.0/" target="_blank"&gt;https://192.168.3.27/_IA_API/v1.0/&lt;/A&gt; show-identity&lt;BR /&gt;{&lt;BR /&gt;"ipv4-address" : "192.168.0.11",&lt;BR /&gt;"message" : "total 0 user records were found."&lt;BR /&gt;}&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I suspect that this comes from the multiportald that is still listening on 443 but doesn't show up on netstat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 14:05:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-API-with-Management-Plane-Sepration/m-p/141661#M21883</guid>
      <dc:creator>Zoltan_Bogdan</dc:creator>
      <dc:date>2022-02-16T14:05:46Z</dc:date>
    </item>
  </channel>
</rss>

