- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi CheckMates,
We have a clusterXL with 2 X 1800 appliances, running gaia embedded R81.10.17. This cluster is used for remote access vpn connections.
VPN clients face an issue. When they try to connect, site is not responding error appears. Checking on logs, we can see port 80 is dropped by our clean up rule.
If we create a explicit rule allowing port 80 from client public IP, the connection is successful. So i have two questions: Is it normal remote access vpn clients use port 80? if it is normal, i think it should be accepted by default, rigth?
We have the option "Accept Remote Access control connections" enabled on global properties. Any help is appreciated thanks in advance.
Regards
It's normal for the client to reach out on port 443.
Port 80 should redirect there.
Hi,
Thans for your help. So, in our case, redirection is not working? as vpn clients connections are dropped on port 80.
If you don't allow access on port 80, that redirect won't happen.
Why the client is using port 80 is a separate question.
What client version on what platform(s)?
The happens with many different client versions on windows. In my case i am using endpoint security E89.00 and windows 11. On the other hand, i have a couple dozens different customers with similar scenario, and i can connect to all of them without problems, without allowing port 80 with an explicit rule.
The configuration is the same as on the screenshot, https and all interfaces. To connect the clients use vpn.domain.com or the public IP address, without port. In both cases the same issue.
Regards
This is very interesting...let me finish some Cisco stuff Im doing, will definitely confirm this in the lab later.
Andy
I just tested and worked fine in my lab, mind you, port 80 is allowed, which would make sense, since redirect does happen.
Andy
I am 100% sure what @PhoneBoy said is correct.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY