- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
AI Security Masters E4:
Introducing Cyata - Securing the Agenic AI Era
AI Security Masters E3:
AI-Generated Malware
CheckMates Go:
CheckMates Fest
Hello All,
I'm looking for some help with the following, at the moment I see lots of external traffic being allowed by an implied rule on port TCP 4500. On smartview tracker the only info I have is the source external IP to our external firewalls over Port TCP 4500, which I'm not sure what service is using this port. My first thought was VPN, but my understanding is that the IKE uses port udp or tcp 500 and NAT-T port udp 4500.
There is no indication what would be allowing this traffic, as the only info I have is Accept 0-Implied rules. I just double checked the implied rules but cannot see anything allowing port TCP 4500 (screenshot attached).
Can you provide some guidance please?
sk52421: Ports used by Check Point software :
| UDP | 4500 | IKE_NAT_TRAVERSAL - NAT Traversal (NAT-T) Protocol | NAT Traversal adds a UDP header, which encapsulates the IPSec ESP header (by VPND daemon). |
And:
sk62692: Ports used on Security Gateway for SecureClient and Endpoint Security VPN :
UDP 4500 - NAT-T port for industry standard UDP encapsulation
Thank you for your prompt answer.
That is port UDP 4500, the behavior we are seeing is on port TCP 4500.
CP does not use that, so i think that there is no implied rule for it...
Well, I understand and I thought exactly the same...but if you see the screenshot that I attached that is not what it looks like.
Thank you for your prompt answer.
I checked that document previously. Question is about implied rules, and we don't seem to have any implied rule to allow traffic on port TCP 4500 but we can see external IPs scanning our network and traffic over that port is being allowed.
TCP 4500 is used for TCP Encapsulation and is related to Remote Access VPN functionality.
Thank you for your prompt reply.
Can you please tell me what it is supposed to see on the comment for this implied rule? or what is the service or destination?
and what option exactly enables this functionality?
As far as I know, NAT-T + Remote Access VPN
However, if you have a concern about implied rules and handling of this traffic, please open a support case with TAC so we could investigate
Thanks Valeri.
Not familiar with open TAC cases. Can you please give me some guidance how to do this?
I mean, open a support case with your support partner or Check Point directly, according to your maintenance contract.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 27 | |
| 18 | |
| 10 | |
| 9 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 | |
| 4 |
Mon 23 Feb 2026 @ 11:00 AM (EST)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - AMERTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANMon 23 Feb 2026 @ 11:00 AM (EST)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - AMERTue 24 Feb 2026 @ 10:00 AM (CET)
Latest updates on Quantum Spark including R82 features and Spark Management zero touch - EMEATue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANThu 26 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 4: Introducing Cyata, Securing the Agentic AI EraFri 06 Mar 2026 @ 08:00 AM (COT)
Check Point R82 Hands‑On Bootcamp – Comunidad DOJO PanamáAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY