- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
C:\Users\vyakovlev>curl -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
* Trying 194.29.39.47...
* TCP_NODELAY set
* Connected to usercenter.checkpoint.com (194.29.39.47) port 443 (#0)
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 1/3)
* schannel: disabled server certificate revocation checks
* schannel: verifyhost setting prevents Schannel from comparing the supplied target name with the subject names in server certificates.
* schannel: sending initial handshake data: sending 181 bytes...
* schannel: sent initial handshake data: sent 181 bytes
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: failed to receive handshake, need more data
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 4096
* schannel: encrypted data buffer: offset 4096 length 4096
* schannel: received incomplete message, need more data
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 767
* schannel: encrypted data buffer: offset 4863 length 5120
* schannel: sending next handshake data: sending 318 bytes...
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 51
* schannel: encrypted data buffer: offset 51 length 5120
* schannel: SSL/TLS handshake complete
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 3/3)
* schannel: stored credential handle in session cache
> GET /usercenter/services/ProductCoverageService HTTP/1.1
> Host: usercenter.checkpoint.com
> User-Agent: curl/7.55.1
> Accept: */*
>
* schannel: client wants to read 102400 bytes
* schannel: encdata_buffer resized 103424
* schannel: encrypted data buffer: offset 0 length 103424
* schannel: encrypted data got 605
* schannel: encrypted data buffer: offset 605 length 103424
* schannel: decrypted data length: 401
* schannel: decrypted data added: 401
* schannel: decrypted data cached: offset 401 length 102400
* schannel: encrypted data length: 175
* schannel: encrypted data cached: offset 175 length 103424
* schannel: decrypted data length: 146
* schannel: decrypted data added: 146
* schannel: decrypted data cached: offset 547 length 102400
* schannel: encrypted data buffer: offset 0 length 103424
* schannel: decrypted data buffer: offset 547 length 102400
* schannel: schannel_recv cleanup
* schannel: decrypted data returned 547
* schannel: decrypted data buffer: offset 0 length 102400
< HTTP/1.1 200 OK
< Date: Wed, 21 Nov 2018 22:29:06 GMT
< Server: Apache
< Strict-Transport-Security: max-age=63072000; includeSubDomains
< Access-Control-Allow-Credentials: true
< set-cookie: UCSSID-47873-Usercenter-Group-PRD=BGPEKIMAFAAA;Domain=usercenter.checkpoint.com;Expires=Thu, 22-Nov-2018 01:15:45 GMT;Path=/usercenter;Secure;HttpOnly
< Content-Length: 146
< Content-Type: text/html; charset=utf-8
<
<h1>ProductCoverageService</h1>
<p>Hi there, this is an AXIS service!</p>
<i>Perhaps there will be a form for invoking the service here...</i>
* Connection #0 to host usercenter.checkpoint.com left intact
C:\Users\vyakovlev>
Any Ideas?
Last time it was caused by the outage on CP side.
There is also an issue with auto-upload to SR if the resultant file is larger than 25MB, I think.
In later case, you'll have to do it via SFTP.
Wikipedia says this regarding 302 Found status code:
Expecting https connection, instead of http ?
Needless to say, the SmartConsole does have the ability to connect via HTTPS. The output of curl is there to simply illustrate that the resolution and the Internet access are present.
Even though thecurl show a https url in the text, it does not mean it is using https, you need to tell curl to use: https://usercenter.checkpoint.com
C:\Users\vyakovlev>curl -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
* Trying 194.29.39.47...
* TCP_NODELAY set
* Connected to usercenter.checkpoint.com (194.29.39.47) port 443 (#0)
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 1/3)
* schannel: disabled server certificate revocation checks
* schannel: verifyhost setting prevents Schannel from comparing the supplied target name with the subject names in server certificates.
* schannel: sending initial handshake data: sending 181 bytes...
* schannel: sent initial handshake data: sent 181 bytes
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: failed to receive handshake, need more data
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 4096
* schannel: encrypted data buffer: offset 4096 length 4096
* schannel: received incomplete message, need more data
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 767
* schannel: encrypted data buffer: offset 4863 length 5120
* schannel: sending next handshake data: sending 318 bytes...
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 51
* schannel: encrypted data buffer: offset 51 length 5120
* schannel: SSL/TLS handshake complete
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 3/3)
* schannel: stored credential handle in session cache
> GET /usercenter/services/ProductCoverageService HTTP/1.1
> Host: usercenter.checkpoint.com
> User-Agent: curl/7.55.1
> Accept: */*
>
* schannel: client wants to read 102400 bytes
* schannel: encdata_buffer resized 103424
* schannel: encrypted data buffer: offset 0 length 103424
* schannel: encrypted data got 605
* schannel: encrypted data buffer: offset 605 length 103424
* schannel: decrypted data length: 401
* schannel: decrypted data added: 401
* schannel: decrypted data cached: offset 401 length 102400
* schannel: encrypted data length: 175
* schannel: encrypted data cached: offset 175 length 103424
* schannel: decrypted data length: 146
* schannel: decrypted data added: 146
* schannel: decrypted data cached: offset 547 length 102400
* schannel: encrypted data buffer: offset 0 length 103424
* schannel: decrypted data buffer: offset 547 length 102400
* schannel: schannel_recv cleanup
* schannel: decrypted data returned 547
* schannel: decrypted data buffer: offset 0 length 102400
< HTTP/1.1 200 OK
< Date: Wed, 21 Nov 2018 22:29:06 GMT
< Server: Apache
< Strict-Transport-Security: max-age=63072000; includeSubDomains
< Access-Control-Allow-Credentials: true
< set-cookie: UCSSID-47873-Usercenter-Group-PRD=BGPEKIMAFAAA;Domain=usercenter.checkpoint.com;Expires=Thu, 22-Nov-2018 01:15:45 GMT;Path=/usercenter;Secure;HttpOnly
< Content-Length: 146
< Content-Type: text/html; charset=utf-8
<
<h1>ProductCoverageService</h1>
<p>Hi there, this is an AXIS service!</p>
<i>Perhaps there will be a form for invoking the service here...</i>
* Connection #0 to host usercenter.checkpoint.com left intact
C:\Users\vyakovlev>
R80.20 MDS:
We've had a few random issues with UserCenter over the last couple days--this could very well be related.
It still is an issue today.
I will be out of circulation for a week, but will have to open an SR o get to the bottom of this when i am back.
It looks really bad when I am trying to showcase the ease of use and streamlined support operations in R80.20 and run into something like this.
I'd appreciate it if you could forward this to a team handling this:
Running CPINFO from the problematic component itself works fine:
[Expert@MACPEVENT:0]# cpinfo
This is Check Point CPinfo Build 914000190 for GAIA
Checking for updates...
Updating...
Verifying CK...
Your version of CPinfo is already up-to-date, no update is required
Please provide an SR number or enter 's' to skip: s
CPinfo Creation...
Local host is not a Gateway5%
Collecting information...: 100%
Starting migrate export verification stage...
Migrate export verification stage succeeded.
Starting migrate export.
This process can take a few minutes or hours (depending on size of export) and will stop the machine.
Please wait until done. For additional options please view CPInfo's usage.
Migrate export succeeded.
Compressing output file...
Compressing output file - done
Uploading...
Initiating connection to User Center: Done.
Generating list of files to be uploaded: Done.
Sending list of files to server: Done.
Uploading MACPEVENT_22_11_2018_11_45_migrate_export_out.tgz
Uploading: 100% (61/61 MB), Done.
Uploading MACPEVENT_22_11_2018_11_45.info.tar.gz
Uploading: 100% (61/61 MB), Done.
Migrate export file created locally - MACPEVENT_22_11_2018_11_45_migrate_export_out.tgz
Done
[Expert@MACPEVENT:0]#
From SmartConsole PC:
C:\Users\vyakovlev> curl -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
* Trying 194.29.39.47...
* TCP_NODELAY set
* Connected to usercenter.checkpoint.com (194.29.39.47) port 443 (#0)
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 1/3)
* schannel: disabled server certificate revocation checks
* schannel: verifyhost setting prevents Schannel from comparing the supplied target name with the subject names in server certificates.
* schannel: sending initial handshake data: sending 181 bytes...
* schannel: sent initial handshake data: sent 181 bytes
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: failed to receive handshake, need more data
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 4096
* schannel: encrypted data buffer: offset 4096 length 4096
* schannel: received incomplete message, need more data
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 767
* schannel: encrypted data buffer: offset 4863 length 5120
* schannel: sending next handshake data: sending 318 bytes...
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 2/3)
* schannel: encrypted data got 51
* schannel: encrypted data buffer: offset 51 length 5120
* schannel: SSL/TLS handshake complete
* schannel: SSL/TLS connection with usercenter.checkpoint.com port 443 (step 3/3)
* schannel: stored credential handle in session cache
> GET /usercenter/services/ProductCoverageService HTTP/1.1
> Host: usercenter.checkpoint.com
> User-Agent: curl/7.55.1
> Accept: */*
>
* schannel: client wants to read 102400 bytes
* schannel: encdata_buffer resized 103424
* schannel: encrypted data buffer: offset 0 length 103424
* schannel: encrypted data got 605
* schannel: encrypted data buffer: offset 605 length 103424
* schannel: decrypted data length: 401
* schannel: decrypted data added: 401
* schannel: decrypted data cached: offset 401 length 102400
* schannel: encrypted data length: 175
* schannel: encrypted data cached: offset 175 length 103424
* schannel: decrypted data length: 146
* schannel: decrypted data added: 146
* schannel: decrypted data cached: offset 547 length 102400
* schannel: encrypted data buffer: offset 0 length 103424
* schannel: decrypted data buffer: offset 547 length 102400
* schannel: schannel_recv cleanup
* schannel: decrypted data returned 547
* schannel: decrypted data buffer: offset 0 length 102400
< HTTP/1.1 200 OK
< Date: Thu, 22 Nov 2018 16:28:04 GMT
< Server: Apache
< Strict-Transport-Security: max-age=63072000; includeSubDomains
< Access-Control-Allow-Credentials: true
< set-cookie: UCSSID-47873-Usercenter-Group-PRD=BGPEKIMAFAAA;Domain=usercenter.checkpoint.com;Expires=Thu, 22-Nov-2018 19:14:44 GMT;Path=/usercenter;Secure;HttpOnly
< Content-Length: 146
< Content-Type: text/html; charset=utf-8
<
<h1>ProductCoverageService</h1>
<p>Hi there, this is an AXIS service!</p>
<i>Perhaps there will be a form for invoking the service here...</i>
* Connection #0 to host usercenter.checkpoint.com left intact
C:\Users\vyakovlev>
From Cluster Members:
[Expert@MACP01:0]# curl -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
bash: curl: command not found
[Expert@MACP01:0]# curl_cli -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
* Trying 194.29.39.47...
* Connected to usercenter.checkpoint.com (194.29.39.47) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: HIGH:!RC4:!LOW:!EXP:!aNULL:!SSLv2:!MD5:!aECDH:!EDH
* *** Current date is: Thu Nov 22 11:23:59 2018
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:23:59 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:23:59 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:23:59 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:23:59 2018
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:23:59 2018
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / AES128-GCM-SHA256
* ALPN, server did not agree to a protocol
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
* subject: OU=Domain Control Validated; CN=*.checkpoint.com
* start date: Dec 24 13:34:00 2017 GMT
* expire date: Dec 24 13:34:00 2018 GMT
* issuer: C=US; ST=Arizona; L=Scottsdale; O=GoDaddy.com, Inc.; OU=http://certs.godaddy.com/repository/; CN=Go Daddy Secure Certificate Authority - G2
* SSL certificate verify result: self signed certificate in certificate chain (19), continuing anyway.
* servercert: Finished
< HTTP/1.1 200 OK
< Date: Thu, 22 Nov 2018 16:23:59 GMT
< Server: Apache
< Strict-Transport-Security: max-age=63072000; includeSubDomains
< Access-Control-Allow-Credentials: true
< set-cookie: UCSSID-47873-Usercenter-Group-PRD=AMPEKIMAFAAA;Domain=usercenter.checkpoint.com;Expires=Thu, 22-Nov-2018 19:10:39 GMT;Path=/usercenter;Secure;HttpOnly
< Content-Length: 146
< Content-Type: text/html; charset=utf-8
<
<h1>ProductCoverageService</h1>
<p>Hi there, this is an AXIS service!</p>
<i>Perhaps there will be a form for invoking the service here...</i>
* Connection #0 to host usercenter.checkpoint.com left intact
[Expert@MACP01:0]#
[Expert@MACP02:0]# curl_cli -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
* Trying 194.29.39.47...
* Connected to usercenter.checkpoint.com (194.29.39.47) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: HIGH:!RC4:!LOW:!EXP:!aNULL:!SSLv2:!MD5:!aECDH:!EDH
* *** Current date is: Thu Nov 22 11:25:09 2018
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:25:09 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:25:09 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:25:09 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:25:09 2018
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:25:09 2018
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / AES128-GCM-SHA256
* ALPN, server did not agree to a protocol
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
* subject: OU=Domain Control Validated; CN=*.checkpoint.com
* start date: Dec 24 13:34:00 2017 GMT
* expire date: Dec 24 13:34:00 2018 GMT
* issuer: C=US; ST=Arizona; L=Scottsdale; O=GoDaddy.com, Inc.; OU=http://certs.godaddy.com/repository/; CN=Go Daddy Secure Certificate Authority - G2
* SSL certificate verify result: self signed certificate in certificate chain (19), continuing anyway.
* servercert: Finished
< HTTP/1.1 200 OK
< Date: Thu, 22 Nov 2018 16:25:09 GMT
< Server: Apache
< Strict-Transport-Security: max-age=63072000; includeSubDomains
< Access-Control-Allow-Credentials: true
< set-cookie: UCSSID-47873-Usercenter-Group-PRD=ANPEKIMAFAAA;Domain=usercenter.checkpoint.com;Expires=Thu, 22-Nov-2018 19:11:49 GMT;Path=/usercenter;Secure;HttpOnly
< Content-Length: 146
< Content-Type: text/html; charset=utf-8
<
<h1>ProductCoverageService</h1>
<p>Hi there, this is an AXIS service!</p>
<i>Perhaps there will be a form for invoking the service here...</i>
* Connection #0 to host usercenter.checkpoint.com left intact
[Expert@MACP02:0]#
From Management Server:
[Expert@MACPMGMT:0]# curl_cli -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
* Trying 194.29.39.47...
* Connected to usercenter.checkpoint.com (194.29.39.47) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: HIGH:!RC4:!LOW:!EXP:!aNULL:!SSLv2:!MD5:!aECDH:!EDH
* *** Current date is: Thu Nov 22 11:25:59 2018
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:26:00 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:26:00 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:26:00 2018
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:26:00 2018
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / AES128-GCM-SHA256
* ALPN, server did not agree to a protocol
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
* subject: OU=Domain Control Validated; CN=*.checkpoint.com
* start date: Dec 24 13:34:00 2017 GMT
* expire date: Dec 24 13:34:00 2018 GMT
* issuer: C=US; ST=Arizona; L=Scottsdale; O=GoDaddy.com, Inc.; OU=http://certs.godaddy.com/repository/; CN=Go Daddy Secure Certificate Authority - G2
* SSL certificate verify result: self signed certificate in certificate chain (19), continuing anyway.
* servercert: Finished
< HTTP/1.1 200 OK
< Date: Thu, 22 Nov 2018 16:26:00 GMT
< Server: Apache
< Strict-Transport-Security: max-age=63072000; includeSubDomains
< Access-Control-Allow-Credentials: true
< set-cookie: UCSSID-47873-Usercenter-Group-PRD=AMPEKIMAFAAA;Domain=usercenter.checkpoint.com;Expires=Thu, 22-Nov-2018 19:12:39 GMT;Path=/usercenter;Secure;HttpOnly
< Content-Length: 146
< Content-Type: text/html; charset=utf-8
<
<h1>ProductCoverageService</h1>
<p>Hi there, this is an AXIS service!</p>
<i>Perhaps there will be a form for invoking the service here...</i>
* Connection #0 to host usercenter.checkpoint.com left intact
[Expert@MACPMGMT:0]#
From SmartEvent:
[Expert@MACPEVENT:0]# curl_cli -v -k https://usercenter.checkpoint.com/usercenter/services/ProductCoverageService
* Trying 194.29.39.47...
* Connected to usercenter.checkpoint.com (194.29.39.47) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: HIGH:!RC4:!LOW:!EXP:!aNULL:!SSLv2:!MD5:!aECDH:!EDH
* *** Current date is: Thu Nov 22 11:27:12 2018
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:27:12 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:27:12 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:27:12 2018
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:27:12 2018
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* err is -1, detail is 2
* *** Current date is: Thu Nov 22 11:27:12 2018
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / AES128-GCM-SHA256
* ALPN, server did not agree to a protocol
* servercert: Activated
* servercert: CRL validation was disabled
* Server certificate:
* subject: OU=Domain Control Validated; CN=*.checkpoint.com
* start date: Dec 24 13:34:00 2017 GMT
* expire date: Dec 24 13:34:00 2018 GMT
* issuer: C=US; ST=Arizona; L=Scottsdale; O=GoDaddy.com, Inc.; OU=http://certs.godaddy.com/repository/; CN=Go Daddy Secure Certificate Authority - G2
* SSL certificate verify result: self signed certificate in certificate chain (19), continuing anyway.
* servercert: Finished
< HTTP/1.1 200 OK
< Date: Thu, 22 Nov 2018 16:27:12 GMT
< Server: Apache
< Strict-Transport-Security: max-age=63072000; includeSubDomains
< Access-Control-Allow-Credentials: true
< set-cookie: UCSSID-47873-Usercenter-Group-PRD=BGPEKIMAFAAA;Domain=usercenter.checkpoint.com;Expires=Thu, 22-Nov-2018 19:13:51 GMT;Path=/usercenter;Secure;HttpOnly
< Content-Length: 146
< Content-Type: text/html; charset=utf-8
<
<h1>ProductCoverageService</h1>
<p>Hi there, this is an AXIS service!</p>
<i>Perhaps there will be a form for invoking the service here...</i>
* Connection #0 to host usercenter.checkpoint.com left intact
[Expert@MACPEVENT:0]#
I have the same issue and same test results. (Also on R80.20 management)
Just found this; before I try it - wanted to see if you guys are still seeing this issue. I know we just migrated to a whole new support backend
Last time it was caused by the outage on CP side.
There is also an issue with auto-upload to SR if the resultant file is larger than 25MB, I think.
In later case, you'll have to do it via SFTP.
Thanks Vladimir! Appreciate the quick response. Still a cool feature, as long as we aren't sending up cpcaps. 🙂
I think it could probably be further improved by automating SFTP upload option.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
31 | |
17 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY