<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Has anyone implemented sk180808? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/243280#M47259</link>
    <description>&lt;P&gt;Sorry to bump an old thread.. just as a brief update we finally implemented sk180808 last night on one of our gateway clusters last night.&amp;nbsp; It successfully blocked the HTTPS from public IPs, but it had an unexpected issue where it broke our Gaia web.&amp;nbsp; It may be from how we are set up originally.. the fix was I had to go to into the Cluster Object, and change Platform Portal to use port 4434 instead of port 443, and create the explicit allow rule from the firewall admins to use port 4434 instead of 443.. after this gaia web started working again.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 07 Mar 2025 16:27:02 GMT</pubDate>
    <dc:creator>Cypress</dc:creator>
    <dc:date>2025-03-07T16:27:02Z</dc:date>
    <item>
      <title>Has anyone implemented sk180808?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238864#M46332</link>
      <description>&lt;P&gt;Hello.&amp;nbsp; I have some gateways that accept traffic to the gateway itself on TCP/443, despite our stealth rule that should be preventing this.&amp;nbsp; My apologies, as I see this is a frequent topic that is discussed on these forums.&lt;/P&gt;&lt;P&gt;We are looking at&amp;nbsp;sk180808 which was presented to us as a possible solution.&amp;nbsp; I am wanting to make sure I fully understand the sk article before attempting to implement it.&lt;/P&gt;&lt;P&gt;- The CLI change is done on the management server, and not the gateway.. is that correct?&lt;/P&gt;&lt;P&gt;- The change then takes affect on a gateway after you install policy on that gateway.&lt;/P&gt;&lt;P&gt;-In this sense, we can look at this as a "global" change that affects all of the gateway clusters under this management server.&amp;nbsp; We may be able to install policy on only one cluster and test things out first.. but one way or another all the other clusters eventually will have to get policy install.&lt;/P&gt;&lt;P&gt;- reverting back, in case the results are not desirable.. would just be setting the value back to "0", cpstop;cpstart, then install policy again?&amp;nbsp; Or would "revert to previous revision and then install policy" work?&lt;/P&gt;&lt;P&gt;My last question: I'm wondering if there is any recommended reading on more fully understanding the "Multiportal Policy" in general.. I have a rudimentary understanding that if you activate certain different blades and features on Check Point, one or more of those features provision a "portal" interface, that may share the same IP/Port as the portals for other blades/features.. and that is why Implied Rules are used with Multiportal policy.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I would like a better understanding about is which features I have enabled that has put us into "multiportal mode?"&amp;nbsp; Is there a way to see which "portals" are turned on with a gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any information!&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 21:56:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238864#M46332</guid>
      <dc:creator>Cypress</dc:creator>
      <dc:date>2025-01-16T21:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone implemented sk180808?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238871#M46337</link>
      <description>&lt;P&gt;I had done that sk with couple customers before, no issues. One was on R81.10 and other base R81. Yes, you apply it on mgmt and then install policy on the gateway(s). To see which multi portal is there, run mpclient list and to see the status, mpclient status and then whatever portal name is.&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 00:20:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238871#M46337</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T00:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone implemented sk180808?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238933#M46348</link>
      <description>&lt;P&gt;Thank you this is helpful.&amp;nbsp; Now that I see our multiportal list I have other questions too &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; One of mine listed is UserCheck which shows our internal users the "website is blocked" page.&amp;nbsp; I guess it never occurred to me that is also a multiportal.. Does this mean after implementing&amp;nbsp;&lt;SPAN&gt;sk180808, I may need to come up with an explicit rule in the security policy to allow internal users to still hit usercheck?&amp;nbsp; or does sk180808 only have impacts for gaia portal?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 15:11:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238933#M46348</guid>
      <dc:creator>Cypress</dc:creator>
      <dc:date>2025-01-17T15:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone implemented sk180808?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238938#M46349</link>
      <description>&lt;P&gt;Questions are free &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Anyway, I never had to change any of that with user check page, but personally, I would ensure it shows as below.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29255iA8A4B664D5E36965/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 15:17:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238938#M46349</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T15:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone implemented sk180808?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238949#M46352</link>
      <description>&lt;P&gt;Btw, happy to test anything you need, I have fully working R81.20 and R82 labs going.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;Have a nice weekend!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 16:22:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/238949#M46352</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T16:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone implemented sk180808?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/243280#M47259</link>
      <description>&lt;P&gt;Sorry to bump an old thread.. just as a brief update we finally implemented sk180808 last night on one of our gateway clusters last night.&amp;nbsp; It successfully blocked the HTTPS from public IPs, but it had an unexpected issue where it broke our Gaia web.&amp;nbsp; It may be from how we are set up originally.. the fix was I had to go to into the Cluster Object, and change Platform Portal to use port 4434 instead of port 443, and create the explicit allow rule from the firewall admins to use port 4434 instead of 443.. after this gaia web started working again.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 16:27:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/243280#M47259</guid>
      <dc:creator>Cypress</dc:creator>
      <dc:date>2025-03-07T16:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: Has anyone implemented sk180808?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/243283#M47261</link>
      <description>&lt;P&gt;I believe this is not really a concern in newer jumbo hotfixes for R81.20, as per sk, but yes, my bad, I forgot to mention originally web portla should be on port other than 443 in this case.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 16:34:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Has-anyone-implemented-sk180808/m-p/243283#M47261</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-07T16:34:29Z</dc:date>
    </item>
  </channel>
</rss>

