<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to disable http redirect on multiportal/visitor mode in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/253950#M12977</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My customer is using visitor mode so multiportal is running on the external interface. traffic to &lt;A href="https://pu.bl.ic.ip" target="_blank" rel="noopener"&gt;https://pu.bl.ic.ip&lt;/A&gt;&amp;nbsp;is dropped on multiportal correctly. All good so far.&amp;nbsp; But curling &lt;A href="http://pu.bl.ic.ip" target="_blank" rel="noopener"&gt;http://pu.bl.ic.ip&lt;/A&gt;&amp;nbsp;we receive a redirect to the internal IP address&amp;nbsp; like this:&lt;/P&gt;&lt;P&gt;master@myhost:~# curl -v -k -H "Host:" &lt;A href="http://pu.bl.ic.ip" target="_blank" rel="noopener"&gt;http://pu.bl.ic.ip&lt;/A&gt;&lt;BR /&gt;* Trying pu.bl.ic.ip:80...&lt;BR /&gt;* Connected to pu.bl.ic.ip (pu.bl.ic.ip) port 80 (#0)&lt;BR /&gt;&amp;gt; GET / HTTP/1.1&lt;BR /&gt;&amp;gt; User-Agent: curl/7.88.1&lt;BR /&gt;&amp;gt; Accept: */*&lt;BR /&gt;&amp;gt;&lt;BR /&gt;* HTTP 1.0, assume close after body&lt;BR /&gt;&amp;lt; HTTP/1.0 301 Moved Permanently&lt;BR /&gt;&amp;lt; &lt;STRONG&gt;Location: &lt;A href="https://in.ter.nal.ip" target="_blank" rel="noopener"&gt;https://in.ter.nal.ip&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;&amp;lt;&lt;BR /&gt;* Closing connection 0&lt;/P&gt;&lt;P&gt;Traffic is still dropped on multiportal and port 80, all good, but:&lt;/P&gt;&lt;P&gt;Problem is that Nessus is reporting this as a really old IIS related vulnerability (&lt;A href="https://community.checkpoint.com/t5/General-Topics/CVE-2000-0649-Vulnerability/td-p/76157" target="_blank" rel="noopener"&gt;refer to &lt;/A&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/CVE-2000-0649-Vulnerability/td-p/76157" target="_blank" rel="noopener"&gt;Solved: CVE-2000-0649 Vulnerability - Check Point CheckMates&lt;/A&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/CVE-2000-0649-Vulnerability/td-p/76157" target="_blank" rel="noopener"&gt;)&amp;nbsp;&lt;/A&gt;plus my customer understandably doesn't want his internal IP disclosed externally.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is on a Spark 1900 appliance, I don't know whether it'S specifically for this appliance or if 'Real' GAiA has the same behaviour.&lt;/P&gt;&lt;P&gt;How can I disable this redirect?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Soenke&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jul 2025 11:52:09 GMT</pubDate>
    <dc:creator>Soenke_Weiss1</dc:creator>
    <dc:date>2025-07-25T11:52:09Z</dc:date>
    <item>
      <title>How to disable http redirect on multiportal/visitor mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/253950#M12977</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My customer is using visitor mode so multiportal is running on the external interface. traffic to &lt;A href="https://pu.bl.ic.ip" target="_blank" rel="noopener"&gt;https://pu.bl.ic.ip&lt;/A&gt;&amp;nbsp;is dropped on multiportal correctly. All good so far.&amp;nbsp; But curling &lt;A href="http://pu.bl.ic.ip" target="_blank" rel="noopener"&gt;http://pu.bl.ic.ip&lt;/A&gt;&amp;nbsp;we receive a redirect to the internal IP address&amp;nbsp; like this:&lt;/P&gt;&lt;P&gt;master@myhost:~# curl -v -k -H "Host:" &lt;A href="http://pu.bl.ic.ip" target="_blank" rel="noopener"&gt;http://pu.bl.ic.ip&lt;/A&gt;&lt;BR /&gt;* Trying pu.bl.ic.ip:80...&lt;BR /&gt;* Connected to pu.bl.ic.ip (pu.bl.ic.ip) port 80 (#0)&lt;BR /&gt;&amp;gt; GET / HTTP/1.1&lt;BR /&gt;&amp;gt; User-Agent: curl/7.88.1&lt;BR /&gt;&amp;gt; Accept: */*&lt;BR /&gt;&amp;gt;&lt;BR /&gt;* HTTP 1.0, assume close after body&lt;BR /&gt;&amp;lt; HTTP/1.0 301 Moved Permanently&lt;BR /&gt;&amp;lt; &lt;STRONG&gt;Location: &lt;A href="https://in.ter.nal.ip" target="_blank" rel="noopener"&gt;https://in.ter.nal.ip&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;&amp;lt;&lt;BR /&gt;* Closing connection 0&lt;/P&gt;&lt;P&gt;Traffic is still dropped on multiportal and port 80, all good, but:&lt;/P&gt;&lt;P&gt;Problem is that Nessus is reporting this as a really old IIS related vulnerability (&lt;A href="https://community.checkpoint.com/t5/General-Topics/CVE-2000-0649-Vulnerability/td-p/76157" target="_blank" rel="noopener"&gt;refer to &lt;/A&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/CVE-2000-0649-Vulnerability/td-p/76157" target="_blank" rel="noopener"&gt;Solved: CVE-2000-0649 Vulnerability - Check Point CheckMates&lt;/A&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/CVE-2000-0649-Vulnerability/td-p/76157" target="_blank" rel="noopener"&gt;)&amp;nbsp;&lt;/A&gt;plus my customer understandably doesn't want his internal IP disclosed externally.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is on a Spark 1900 appliance, I don't know whether it'S specifically for this appliance or if 'Real' GAiA has the same behaviour.&lt;/P&gt;&lt;P&gt;How can I disable this redirect?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Soenke&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 11:52:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/253950#M12977</guid>
      <dc:creator>Soenke_Weiss1</dc:creator>
      <dc:date>2025-07-25T11:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable http redirect on multiportal/visitor mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/253962#M12978</link>
      <description>&lt;P&gt;What does mpclient list command show?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 13:20:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/253962#M12978</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-25T13:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable http redirect on multiportal/visitor mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/253966#M12981</link>
      <description>&lt;P&gt;SMB devices don't have multiportal&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;but they do have the redirect on port 80.&lt;BR /&gt;The first part of this (setting the&amp;nbsp;multi_portal_allow_redirect kernel variable to zero) should fix this.&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk165937" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk165937&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 14:08:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/253966#M12981</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-07-25T14:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable http redirect on multiportal/visitor mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/254267#M12993</link>
      <description>&lt;P&gt;Thanks PhoneBoy, this works on SMB appliances as well.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2025 14:06:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/254267#M12993</guid>
      <dc:creator>Soenke_Weiss1</dc:creator>
      <dc:date>2025-07-30T14:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable http redirect on multiportal/visitor mode</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/254268#M12994</link>
      <description>&lt;P&gt;Good to know!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2025 14:15:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/How-to-disable-http-redirect-on-multiportal-visitor-mode/m-p/254268#M12994</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-30T14:15:15Z</dc:date>
    </item>
  </channel>
</rss>

