- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
We recently had a PT Scan run on our Checkpoint environment and it pointed out a few ports whose state is showing as CLOSED.
The recommendation from SOC was to change it to filtered mode..i.e in scan these should reflect as FILTERED in place of CLOSED.
My query is what does this actually mean ? how can this be configured to change it from CLOSED to FILTERED ?
Any help is appreciated.
I presume:
To change from "Closed" to "Filtered" you would need to create the appropriate Access Policy rule to block the relevant traffic.
I presume:
To change from "Closed" to "Filtered" you would need to create the appropriate Access Policy rule to block the relevant traffic.
what should be under "Action" for an access rule which should put a port in filtered mode ?
Block
ok so a cleanup rule with any any any deny doesn't put a port in filtered mode..to put a port in filtered mode an explicit block rule is required ?
What precise port on what precise device is being reported as Closed instead of Filtered?
The answer generally depends on what other access rules exist.
If the destination is a Check Point gateway, implied rules will also impact this.
TCP/444/SNPP/CLOSED TCP/500/ISAKMP/CLOSED TCP/4500/SAE-URN/CLOSED TCP/8082/BLACKICE-ALERTS/CLOSED TCP/8880/CDDBP-ALT/CLOSED TCP/61447/UNKNOWN/CLOSED
These are the mentioned ports but these are all for GW IP and there is already a stealth rule present.
Pretty sure the VPN ports there (500/4500) are being allowed through implied rules.
Same with port 444, which I believe is the legacy SNX portal.
If you have VPN enabled on your gateway those ports will be open.
We use various other random high ports for various security functions which may appear open.
The ones which are showing as CLOSED.. if i put an explicit rule for these ports with action "BLOCK" will they reflect as FILTERED ?
Maybe TAC can help here much quicker ?
Contacted TAC and they are saying there is not way to put a port in Filtered mode which is quite surprising.
I guess nothing can be done in that case.
Not if they're being allowed through implied rules, which the VPN ones are.
Not sure about the others, but an explicit "stealth rule" for the Security Gateway/Cluster is considered best practice.
TCP | 444 | Required port for Remote Access client Site Creation |
TCP | 500 | IKE_tcp - IPSEC Internet Key Exchange Protocol over TCP | IKE negotiation over TCP (by VPND daemon) |
TCP | 4500 | not predefined | relevant for cases where TCP encapsulation is used for RA VPN traffic |
TCP | 8082 | not predefined | Internal SmartView port |
TCP | 8880 | not predefined | Security Gateway listens on this port for communication with Mobile Access. |
Block and deny aren't actions in Check Point access rules. 😉 The precise terminology matters here.
In an access layer, the action Reject sends a RST in response to matching TCP connections, or an ICMP Destination Unreachable, Administratively Prohibited (type 3, code 13, I think) message in response to non-TCP traffic.
In an access layer, the action Drop discards the traffic silently.
I would argue with the SOC that it doesn't matter. Either result provides the same information back to a potential attacker: there is something there, and the traffic they tried isn't allowed. Hiding is not a valid strategy for network defense. Instead, set up a few canaries, and if anybody tries to access any of them, block the scanner for a day.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
8 | |
7 | |
5 | |
5 | |
5 | |
5 | |
5 | |
5 | |
5 | |
4 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY