- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
hi @G_W_Albrecht ,
i have succesfully completed the vulnerability mitigations based on the sk147272 and cipher_util tool
thanks for the response guys
You already found the solution, sk126613. Run cipher_util and remove the weak ciphers. The SK has full instructions on how to do that.
hell
Wait a moment, you are running R80.30? It is out of support for a while now.
Concerning your question, you really need to explain what you are trying to achieve. Removing ciphers from SSL Inspection will lead to a situation when traffic will not be inspected if a website only offers weak ciphers to use.
What are you trying to achieve in the first place? Harden the system? Which part of the functionalities?
apologies to val , here i have attached the weak ciphers i really don;t know where i need to disable this and this is my first time using the cipher_utill
actually that was my lab environment R80.30 ,the original vulnerability observed by R81
Which vulnerability? You are not making much sense. Please elaborate, what do you want to achieve here?
What is the tool reporting week filters?
hello
Multi Portal as this is always enabled ! See about the process and how to restart which services here: sk178165: The configuration made with the 'cipher_util' on a Security Gateway is not applied immedia...
the tools QUALYS SSl labs
I assume it is testing the SSL capabilities of your GW. Choose the Multi-portal, remove weak filters and check if the issue is resolved.
Do you have SSL Inspection enabled at all ?
According to the output above you do not have SSL Inspection for TP enabled. Open the GW object and select HTTPS inspection in left column - Enable HTTPS inspection is unchecked.
Did you succeed to disable the weak ciphers yet ?
hi @G_W_Albrecht ,
i have succesfully completed the vulnerability mitigations based on the sk147272 and cipher_util tool
thanks for the response guys
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 28 | |
| 13 | |
| 12 | |
| 8 | |
| 7 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY