- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
What options do I have to configure remote access without enabling Visitor Mode?
Following the Remote Access VPN guide looks like it's mandatory as it's specified in the basic gateway configuration. It's not clear to me how you can set it up without it.
However, this feature opens ports 80, 443 and 264 TCP to the Internet. Why are all of them necessary and how could I restrict them?
Which VPN client can connect to the gateway when visitor mode is disabled?
Thanks,
George
Hi,
@PhoneBoy is right. After site creation, it shouldnt be needed.
It depends if the client can reach the firewall on port 4500. If it cant, it will switch to 443.
Is there any local endpoint firewalls blocking 4500?
Any upstream blocking of that port?
To check fully, please follow the below to properly prevent visitor mode being used.
Thanks.
No, it is not mandatory, see for details sk159372: Visitor Mode in Remote Access clients !
It says it's a backup mechanism but with the Mobile Access blade enabled (which is required in order to use Office Mode with IP pool for the Check Point Mobile client) it's by default enabled and greyed out, it cannot be disabled.
If you only have the IPSec VPN blade enabled, without the visitor mode feature, the gateway doesn't answer to connection requests from VPN clients. It actually warns you when disabling it that VPN Clients (except for the old Secure Client) will not be able to connect.
I haven't found a workaround yet.
Thanks,
George
There is a reason that is needed and this is what it is.
The VERY first time you connect to a VPN Gateway with a Client it asks you to trust the VPN Certificate as being from the ICA then is not a Trusted CA.
That connection is made over HTTPS not IPSEC protocols
You will see subsequently when you connect that before the IPSEC tunnel is initiated then the Client makes a HTTPS connection to the Gateway.
The Visitor Mode allows this HTTPS connection to be made.
No response from the HTTPS request and the IPSEC tunnel doesn't attempt instead it says is unreachable etc.
264 is the fw1_topo port that used for downloading the topology.
You don't know in advance where they are coming from so you have to have open everywhere.
Same as port 500 and proto 50/51 to allow the IPSec Tunnel to build, you don't know the source so has to be open, of course it doesn't stop them being reported by scanners as vulnerabilties but won't work without them being open
Hello,
Thanks for the details, this makes sense.
Following this logic, after I connect the first time and create the site, I should be able to subsequently connect from the same device even if visitor mode is disabled.
Is this correct? Should I be able to connect using Office mode after initial trust is established, with visitor mode disabled? This means mobile access blade removed, and only IPSec VPN active in order to be able to disable visitor mode.
Unfortunately you will still see the Client make an attempt to connect with HTTPS every time make a connection.
You can probably get rid of Visitor Mode as long as have a rule open to allow HTTPS to the Gateway as an Explicit Rule, which effetively results in the same rule.
Most people will have moved the Gaia Portal off HTTPS 443 to another port so isn't as if that big a deal having HTTPS open on the box as the HTTPS should only be there for the Remote Access at that point.
My guess would be that disabling Visitor Mode is affecting something in the MultiPortal feature, which arbitrates access to port 443 on the gateway since it is used by so many different features:
sk155512: How to determine which portal is causing MultiPortal to respond on external interface
VPND process is listening on port 443 and Endpoint Security VPN always uses this port to negotiate tunnel. That kind of requires Visitor Mode to be enabled if you want to use this client or capsule.
Thanks @Timothy_Hall and @HristoGrigorov ,
You guys helped point me in the right direction.
I did some further reading/testing, It does appear as you say @Timothy_Hall , the mpdaemon has a portal called "clients", which is bound to port 444. When visitor mode is disabled, this portal is removed. It would, therefore, seem visitor mode enables the client portal which supports the hand over of the HTTPS (or whatever visitor mode port is chosen) traffic from Endpoint Security Clients (and possibily other remote access clients) to the vpnd process via port 444.
I don't know if the above is 100% accurate, but the behaviour seen would fit that description.
Thanks again,
Jon
Hello Folks -- I'm working with customer who recently upgraded from R77.30 to R80.40. Part of upgrade includes having to enable Visitor Mode on VPN setup -- in addition to explicitly allowing port 80 (in addition to 443). Their remote-access VPN under R77.30 did not require http/80 or visitor mode and customer feels turning on all additional features -- and opening up ports (especially tcp/80) -- increases complexity and necessarily increases security risk (his words).
reference scenario #8 on following:
Troubleshooting "site is not responding" Issues
What can I tell him? -GA
The only place where it is required for sure is when you are first defining the site.
After that, it shouldn't be strictly required.
Hello @PhoneBoy -- thanks for quick follow-up. I suggest it's pointless to provide the checkbox implying "optional" for visitor mode. If it's required, then HIDE it in GUI and make it default prefs under the covers (behind the scenes). In other words, why give the option to enable/disable something if it's required with R80.xx remote access VPN? that seems silly.
It is required even after the site is defined on the client? I don't believe so.
If it is, it's either a bug OR we need to update the documentation.
Note if you disable Visitor Mode, then you have to distribute to your users an installer that has the site predefined in it.
Hi @PhoneBoy, the customer tested this yesterday and without Visitor Mode enabled, he cannot connect. He enabled it to set up the site initially, successfully connected to the VPN, then disabled Visitor Mode and couldn't connect again.
Hi,
@PhoneBoy is right. After site creation, it shouldnt be needed.
It depends if the client can reach the firewall on port 4500. If it cant, it will switch to 443.
Is there any local endpoint firewalls blocking 4500?
Any upstream blocking of that port?
To check fully, please follow the below to properly prevent visitor mode being used.
Thanks.
Thanks @JackPrendergast, I'll check to see if there's anything else blocking 4500, as that should be covered in the implied rules for the gateway itself and isn't blocked that I'm aware of.
A TAC case might be required here to understand what's going on.
Hello @JackPrendergast and @PhoneBoy .
a little background.
With previous all-in-alone R77.30 platform, there was NO rules to allow http/80 or https/443 from Public/External. Also, Visitor mode was disabled.
Remote-access VPN worked fine on this R77.30 platform (don't know endpoint product used).
However, with dedicated gateway running R80.40 (recent HFA) -- and Checkpoing MOBILE client E83.xx -- we need both explicit policy allowing (a) tcp/80 and tcp/443, and (b) visitor mode.
Because everything worked FINE with r77.30 platform, I'm hesitant to make many changes (as this also makes customer uncomfortable with perception of relaxing security posture by explicitly allowing direct connect to gateway over tcp/80 (for example).
should we reset SIC on this simple distributed setup to clean-up ICA?
thanks -GA
How to migrate R80.x standalone management environment to a distributed environment
Changing R80.x Security Management Server Name
How to change the IP Address of a Security Management
Hello @Garrett_DirSec
Firstly, dont reset SIC.
SIC has nothing to do with your issues here, and talk re. cleaning up the ICA is irrelevant.
So - ignore that. If your SIC communication is established and working fine, then leave it 🙂
I suspect you may have VPN configuration changes then, hence the reason why its connecting over 443.
Some settings and features change from 77.30 to 80.40.
Have you seen my post above?
Please can you check through those 5 steps and report back? These ALL need to be adhered to in order to restrict visitor mode.
If all of these check out fine, and you are still seeing issues, then I fully agree with @PhoneBoy about engaging TAC.
I just don't want TAC to turn around and ask you to check similar parameters as to what we have said above! 🙂
Hello @JackPrendergast . thanks for your msg. I reason I asked about ICA was based on various searches on knowledgebase and some references to issues with endpoint vpn connectivity based on cert issues. we did check through the five steps you provided and NAT_traversal was not being explicitly allowed (tcp/4500).
remote access VPN SITE CREATION now successful (without Visitor Mode enabled).
now we can walk customer through creation of MSI installer updates for CP MOBILE to include the site.
Glad this worked for you.
Take care.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY