- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We need to disable the ICA port as we are not using it for CRL.
is there a way to disable the service?
Please let us have the SK for it.
You can run ps -auxw | grep 18265 and then once you have an ID, run kill -9 pid (whatever the number)
Alternatively, you can create a rule to block it. Btw, are you sure its not needed at all? ICA is as a matter of fact authority responsible for issuing certificates for SIC.
Andy
Here is the sk.
Andy
https://support.checkpoint.com/results/sk/sk30501
https://support.checkpoint.com/results/sk/sk102837
If ICA Management Tool is currently enabled (ON), but is not needed, then perform one of the following:
Either disable ICA Management Tool:
On Security Management Server
[Expert@HostName]# cpca_client set_mgmt_tool offOn Multi-Domain Security Management Server
[Expert@HostName]# mdsenv Domain_Name[Expert@HostName]# cpca_client set_mgmt_tool offThat’s for the ICA Management Tool, not the CRL.
SIC (used for firewall/management communication) uses certificates for authentication.
A CRL is a critical part of that process and cannot be disabled.
Good point. Not sure if what I said in my first reply would even work then...
Andy
is there any specific command to restart the ICA services or do i need to restart the firewall?
While I believe it's the cpd process that needs to be killed, it's best to perform a cprestart here (which if executed on a gateway, will "restart the firewall").
FWIW, this is what AI Copilot gave...
Andy
********************************************
Disabling the ICA (Internal Certificate Authority) port on Check Point is not recommended as it is crucial for the secure communication between the Security Management Server and the Security Gateways. The ICA is responsible for issuing certificates for authentication and is an integral part of the Check Point security infrastructure.
However, if you have a specific requirement or issue, please provide more details so I can assist you better. If you need to restrict access to the ICA port, you can consider configuring firewall rules to control the traffic.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 21 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY