- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I'm asking this question to a vendor as well. However, I will ask here too. I'm trying to disable TLS1.0 globally on a firewall cluster. This is in an effort to completely eliminate all HTTPS weak ciphers. I've been scanning our environment with various tools and found that TLS 1.0 is still a valid cipher when I scan my cluster IP addresses.
So far, I haven't been able to find any documentation on how to do this with Checkpoint. On an ASA it's 2 or 3 commands to stop supporting the cipher. The only thing I've seen in forums is that on Checkpoint it's not possible. Is this true?
I'm running R80.30 so I would think you would be able to do this but maybe not.
Thanks,
Jon
For HTTPS Inspection:
First create a snapshot of your system!!!
Instructions for versions R80.10 and above
If 'HTTPS Inspection' blade is enabled on a Security Gateway, then configure it not to use TLS 1.0.
Important Note: Some servers on the Internet still use TLS 1.0. Once this step is performed, there will be no connectivity to these servers through the Security Gateway.
For GAIA protal:
First create a snapshot of your system!!!
On each machine that runs Gaia OS, configure Gaia Portal not to use TLS 1.0.
Important Note: Before implementing the steps below, save the current Gaia database - log in to Clish and run save config command.
Backup the current configuration template:
[Expert@HostName:0]# cp /web/templates/httpd-ssl.conf.templ /web/templates/httpd-ssl.conf.templ_BKPAssign the "write" permission to the current configuration template:
[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templEdit the current configuration template in Vi editor:
[Expert@HostName:0]# vi /web/templates/httpd-ssl.conf.templChange the line
fromSSLProtocol -ALL +SSLv3 +TLSv1to
SSLProtocol -ALL +TLSv1.1
Remove the "write" permission from the current configuration template:
[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templUpdate the current configuration of HTTPD daemon based on the modified configuration template:
[Expert@HostName:0]# /bin/template_xlate : /web/templates/httpd-ssl.conf.templ /web/conf/extra/httpd-ssl.conf < /config/activeRestart the HTTPD daemon:
[Expert@HostName:0]# tellpm process:httpd2@PhoneBoy or, mush better, use cipher_util
Most communication between SmartConsole and Security Management is CPM today (and this was hardened), but some features are still relying on old CPMI and so you are right: We cannot disable TLS 1.0 completly on Security Management today.
However: SmartConsole (and SmartDashboard) is using TLS 1.2 these days for CMPI. It is just that the server side on Smart Management would also accept a TLS 1.0 connection and this is what is relevant when doing security assessments/audits.
The full answer I got from TAC last summer was (rephrased and not a direct quote, because I'm not sure if I'm allowed to post it here):
For CPMI (FWM) it is possible to change cipher/protocol settings by applying a command with a special flag.
This was provided over a RFE with Check Point local office and was made available having a specific customer environment been taking into consideration.
TAC declined to provide this command based on a normal TAC case (backed up by TAC management). If a customer really needs it, a RFE should been raised at local Check Point office.
They also said, that there was a very good reason this command was not documented anywhere even after the original RFE and it was not meant to be used as a solution for anything just yet.
For me this sounds like: untested, no general support and they do not believe this will work in normal environments. Thats why I have it with "not possible" in my table.
Maybe there will be a day, Check Point R&D finished the replacement of CPMI with CPM 🙂
For HTTPS Inspection:
First create a snapshot of your system!!!
Instructions for versions R80.10 and above
If 'HTTPS Inspection' blade is enabled on a Security Gateway, then configure it not to use TLS 1.0.
Important Note: Some servers on the Internet still use TLS 1.0. Once this step is performed, there will be no connectivity to these servers through the Security Gateway.
For GAIA protal:
First create a snapshot of your system!!!
On each machine that runs Gaia OS, configure Gaia Portal not to use TLS 1.0.
Important Note: Before implementing the steps below, save the current Gaia database - log in to Clish and run save config command.
Backup the current configuration template:
[Expert@HostName:0]# cp /web/templates/httpd-ssl.conf.templ /web/templates/httpd-ssl.conf.templ_BKPAssign the "write" permission to the current configuration template:
[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templEdit the current configuration template in Vi editor:
[Expert@HostName:0]# vi /web/templates/httpd-ssl.conf.templChange the line
fromSSLProtocol -ALL +SSLv3 +TLSv1to
SSLProtocol -ALL +TLSv1.1
Remove the "write" permission from the current configuration template:
[Expert@HostName:0]# ls -l /web/templates/httpd-ssl.conf.templUpdate the current configuration of HTTPD daemon based on the modified configuration template:
[Expert@HostName:0]# /bin/template_xlate : /web/templates/httpd-ssl.conf.templ /web/conf/extra/httpd-ssl.conf < /config/activeRestart the HTTPD daemon:
[Expert@HostName:0]# tellpm process:httpd2I appreciate the quick response. It looks like this solution didn't work when done in a lab. Something I did overlook is that when I scan the firewalls my results are showing the certificates used for my VPN. In this case is there a solution to force the SSL VPN cipher to TLS1.1 or higher?
@PhoneBoy or, mush better, use cipher_util
Dude! 🙂
Afternoon PhoneBoy,
After five years, is the cipher_util method still the best/recommended way to disable old TLS versions? I'm migrating a cluster and our old cluster was doing it via the GuiDBedit method.
If we go with the cipher_util method, is there recommended ciphers to enable/disable somewhere? Any SK out there?
Thank you.
Yes, you should use cipher_util for this as it disables the ciphers at the web server level.
I'm not aware of a specific list of ciphers you should disable...this is largely driven by specific customer need.
10-4. I just read the original post again and my question might be slightly different. We're hosting web services inside a DMZ server and doing HTTPS inspection. I want to disable weak ciphers/TLS 1.0/1.1 for that server being hosted. Is the GuiDBEdit still a viable/current option or is it still the cipher_util?
cipher_util is the way to go for currently supported versions, especially since I can't find an SK that mentions the guidbedit approach.
Hi @JG, were you able to find a solution?
I tried your step and replaced the line in the /web/templates/httpd-ssl.conf.templ, But when we scanned on the interface again for PCI DSS compliance, the error us shown again. Is there any other step that i might have to do to disable tlsv1 on the gateways. The gateways are running R80.10.
Good Morning,
how can I apply the same tls inspection to smtps traffic as well?
Thank you in advance.
Inline? No.
However, the gateway has an MTA that can be enabled with the Threat Prevention and/or DLP blades.
This can terminate SMTPS.
hi!
how do we edit this sslprotocol line?
our firewall showing like this (from /web/templates/httpd-ssl.conf.templ):
SSLProtocol -ALL {ifcmp = $httpd:ssl3_enabled 1}+{else}-{endif}SSLv3 +TLSv1 +TLS
If we want to remove both TLS v1.0 and TLSv1.1?
Running on R81.
Thanks.
E.g. this way:
SSLProtocol -ALL {ifcmp = $httpd:ssl3_enabled 1}+{else}-{endif}SSLv3 +TLSv1.2
This is default Apache syntax for OpenSSL, nothing Check Point specific. If you want to tweak it further, just look up Apache documentation.
Please remember, that configuring /web/templates/httpd-ssl.conf.templ is only needed, when multi-portal deamon is not running. If it runs, use cipher_util for these configuration.
about your procedure for ssl inspection.
i want to ask what will be the impact, actually i need to disable tls 1.0 and tls 1.1 only for specific incoming connection that i do ssl inspection for, so the pen tests will show only tls 1.2 is supported.
but i'm afraid that it will affect also outgoing internet surfing which also goes under ssl inspection, and i wonder, would it reject websites that using tls 1.1 and lower because of that? or it's only between the GW and the internal Pcs that will use only tls 1.2 ?
thanks
For me the configuration that we usually do on a linux server didnt work at all. My first attempt was that. During the vulnerability testing the customer kept on getting the same result where one of the report came out as failed due to tls1.0 and its vulnerability,im guessing it was called POODLE attack.
For the pen test the option of allowing only tls1.2 from the smartconsole works fine. For me though this helped me resolve the issue for the pen test. And installed a ssl certificate signed by a CA.like go daddy.
Gateway setup was Load sharing mode and version is R80.10.
Hello Sir,
Thanks for your solution.
I have some question about this.
If I look at your step by step, it seems to apply globally to all https inspection rules that are "inspected". Can we make it specifics, for example in rule 1 to Server A the inspection still uses tls1.0. But for rule 2 to inspect server B, only use a minimum of tls1.2. Is that possible?
Thank You. 😊
Not in the HTTPS Inspection policy.
Because you need to connect with TLS 1.0 to some site, this needs to be enabled globally.
You could, in the Threat Prevention and/or Access Control policy, block TLS 1.0 and 1.1 for all but specific sites (possibly using inline rules).
Thank you for your answer, Mister PhoneBoy.
I have tried this suggestion. For example, I creating an access control policy rule number 10 which contains the destination to the server with the action drop tls 1.0 and tls 1.0. Below that there is an existing accept rule with the same destination, but there is an https service in the accept action.
What happens is that the website won't open. Please provide input.
Thank you.
You will need to create an explicit rule above your TLS 1.0 drop rule to accept regular HTTPS traffic to/from the relevant hosts.
Many internet sites are still using TLS 1.0. If the goal is to disable weak cyphers, you have a much better tool for the purpose than on Heiko mentioned.
There is something completely new available on R80.30 for cypher management, called cipher_util.
See sk126613 for details.
@JG Especially then I suggest you look into the utility I have mentioned.
Hello,
does this tweaks also apply for the SmartCenter server???
Or does it only apply the the Security Gateway?
cipher_util doesnt run on a SmartCenter, in the Global Properties i have set MIN and MAX TLS version to 1.2 already ...
the SmartCenter still runs with TLS1.0 and so on ...
The Security Gateways are now on TLS1.2 after changing the Global Properties ...
iam a bit reluctant to tweak around on a live system ...
best regards
Thomas.
I had to dig through all the available options for hardening HTTPS settings on gateways and management server myself some time ago.
I wrote this table for myself after digging through various SKs, asking TAC and doing lab tests:
Product | TLS Endpoint Scenario | Hardening Ciphers using which sk |
Security Gateway | Gaia Portal only (httpd2), normal operation | sk147272 – may need Redo after JHF needed |
Security Gateway | Gaia Portal only (httpd2), cpstop | sk147272 – may need Redo after JHF needed |
Security Gateway | Multiportal (httpd2), normal operation | sk126613 – No Redo after JHF needed |
Security Gateway | Multiportal (httpd2), cpstop | sk147272 – may need Redo after JHF needed |
Security Management | Gaia Portal (httpd2) | sk147272 – may need Redo after JHF needed |
Security Management | CPM (Java) (:19009) | Supports only TLS 1.2 (hardcoded - sk122073) since • R80.10 Take 278 and on |
Security Management | CPMI (FWM) (:18190) | Not possible |
The difference between normal operation and cpstop on gateways is purely because of Multiportal. If you stopped Check Point services with cpstop, multiportal deamon is not in service anymore, but Gaia portal is still available. So HTTPS cipher config is falling back from multi portal config to plain httpd config. On gateways without Multiportal, there is no difference.
If anybody has additional infos or corrections for this table, I'm happy to hear from you 🙂
Hi,
Thank you Tobias, a good list ...
Question:
so since this process for the SmartConsole / SIC still remains on TLS1.0 its not possible to remove ALL old TLS versions from the Smartcenter?
Security Management | CPMI (FWM) (:18190) | Not possible |
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
10 | |
7 | |
7 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY