- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi all,
I need to make a change in the Global Properties, based on a guide that suggests updating the following values under the Session Timeout section:
Change the TCP session timeout from 3600 seconds to 60 seconds
Change the TCP session end timeout from 20 seconds to 5 seconds
There are about 20 other gateways managed by this CMA.
My question is: Is there a way to apply these changes only to the specific gateway concerned? If so, how?
If not, should I be concerned about applying these changes globally? Could they have a negative impact on the other gateways?
Thanks a lot!
I would be careful, as Im fairly sure there is no way to apply these things to specific gateways. Below is explanation in case you need it.
Andy
Default Session Time-outs
When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
Hi Andy,
Thank you for the response.
Isn't there some kind of workaround then?
Not that Im aware off. You can only add specific gateways at the bottom for out of state drops exceptions.
Why do you need this to begin with? Whats the issue? I always ask this question regardless of the problem, because I personally believe understanding the reason for anything is the first step.
Andy
Actually, I apologize, I believe I was wrong, my bad, Appears can be done via mgmt cli.
Andy
mgmt_cli set gateway name <gateway_name> session-timeout <timeout_value> --user <username> --password <password>
@RemoteUser Nm, disregard that, just tried it in my lab, does not recognize the paramater, so not sure if it is doable, but will keep trying.
Andy
[Expert@CP-MANAGEMENT:0]# mgmt_cli set simple-gateway name CP-GW session-timeout 4000
Username: admin
Password:
code: "generic_err_invalid_parameter_name"
message: "Unrecognized parameter [session-timeout]"
Executed command failed. Changes are discarded.
also because management in this case is S1C...
That would be least of your worries. honestly. If there is mgmt cli command to do this, you could just open TAC case, provide service identifier and someone can log into backend and do it for you.
Andy
The closest thing to what you tried to do is here: https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/set-simple-gateway~v2%20
As these are global properties (applies to all gateways managed in the same domain), there is no way to set a per-gateway basis that I'm aware of.
And yeah, setting the session timeout from 3600 (one hour) to 60 (one minute) might cause some performance issues related to sync as well as some issues with applications that can't handle such a short timeout.
What is the specific reason for setting this so short?
Hi PhoneBoy.
Thank you...
because we have configured a gw in monitor mode and the guide requires that we have these parameters...
Configure the required Global Properties for the Security Gateway in SmartConsole
Step |
Instructions |
---|---|
1 |
Connect with SmartConsole to the Security Management Server or Target Domain Management Server that manages this Security Gateway. |
2 |
In the top left corner, click Menu > Global properties. |
3 |
From the left tree, click the Stateful Inspection pane and configure:
|
Global properties as the name suggest are global for all gateways that are on that SMS.
I might have another option that will get you close:
Global properties -> Stateful Inspection -> Out of state packets -> Exceptions -> add here the relevant monitor only gateway.
That was my thought as well.
Andy
Those settings should definitely not be on gateways passing regular traffic.
Short of using a different management domain for the gateway, you can make the changes temporarily, push policy to the monitor mode gateway, change them back, and publish changes.
Sounds very logical to me.
So, just to recap: if I change these settings in the Global Properties:
Change the value of the TCP session timeout from the default 3600 to 60 seconds.
Change the value of the TCP end timeout from the default 20 to 5 seconds.
but then I go to:
Global Properties → Stateful Inspection → Out of State Packets → Exceptions,
and add only the relevant gateway to "monitor only"...
When I install the policy, will these changes apply only to the gateway added to the exceptions, or will they be applied globally anyway?
It will be applied globally.
Andy
thanks Man
You bet.
So, just to recap: if I change these settings in the Global Properties:
Change the value of the TCP session timeout from the default 3600 to 60 seconds.
Change the value of the TCP end timeout from the default 20 to 5 seconds.
but then I go to:
Global Properties → Stateful Inspection → Out of State Packets → Exceptions,
and add only the relevant gateway to "monitor only"...
What is marked is maybe an alternative for the first option (TCP timeout). Because those are global and apply to all firewalls managed by the system.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
10 | |
7 | |
7 | |
6 | |
5 | |
5 | |
5 | |
5 | |
5 | |
4 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY