- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello Checkmates!
I'm in an unusual dilemma right now.
I, for some reason, can't access the GAiA portal on one of my NGFWs. I can after performing a fw unloadlocal command.
The thing is I have checked already the following:
1. defined a unique port in the portal - i have defined it this way, as leaving it blank would automatically route me to the web VPN portal
2. checked logs for any blocked traffic - there's no blocked traffic as per logs
but still, i cant access the GAiA portal, only after i performed a fw unloadlocal
Is there any other thing that I can check to confirm if there's anything thats preventing me to access this portal? A NGFW on the same segment (172.16.16.254) works as intended, only this newly added one is experiencing this issue.
Hoping for your insight on this one Checkmates!
Edit: Here's the policy: I changed already the 4443 to 8844 as there was a policy that used the 4443 port. This is to avoid confusion.
This SK is the way to go. https://support.checkpoint.com/results/sk/sk91380
Please follow it. Explains about fw ctl zdebug and tcpdump
We need to know why traffic is being blocked. Could be anti-spoofing for example.
Maybe try to filter on IP and not port. So only 10.1.1.1 (example) and not src:10.1.1.1 or dst:10.1.1.1
Hi @SecurityNed
Have you tried the followings:
Cheers
Akos
Hello @AkosBakos,
I've already:
I'll get back to you when I get results for this. Currently due to time restrictions we're performing changes under fw unloadlocal.
Hi @SecurityNed
You are correct fw cl zdebug..... I wanted to write this, but i am a human 🙂
One more thing, can we say that, only the standby member is affected always?
To be 100% percent sure, you are tring to access the MGMT IPS, right?
And there was an issue, take a look at on this: https://support.checkpoint.com/results/sk/sk147493
Cheers
Ak
Hello @AkosBakos ,
Not yet, currently both are standalone NGFWs, and thus we're wanting everything to be ready before we proceed with the cluster activity,
I'm accessing it both via MGMT IP and via the configured IP where it is reachable on the Smart1 Appliance
Hi @SecurityNed
Aha, so it seems Policy issue for me, because #fw unloadlocal solves the problem.
I think you don't have a large policy, and this gW are not productives, so maybe yo can clone the working policy, and push it to the not working gw.
Of course, do the necessary changes before installation. If it solves the problem -> this is a policy issue.
If I misunderstood that, and they are productive GW-s plese forget the above.
Akos
Hello @AkosBakos ,
Actually they're running on the same policy table when publishing. So they're using the same policies with the working FW. I might try configuring a separate policy table for the meantime while we configure it to HA.
Will update you once there are unusual stuff after our test.
Can you send this please?
clish -> show web ssl-port
Andy
This SK is the way to go. https://support.checkpoint.com/results/sk/sk91380
Please follow it. Explains about fw ctl zdebug and tcpdump
We need to know why traffic is being blocked. Could be anti-spoofing for example.
Maybe try to filter on IP and not port. So only 10.1.1.1 (example) and not src:10.1.1.1 or dst:10.1.1.1
@Lesley you did not specify any SK, or am I blind?
Thanks edited my post
Update guys!
I was able to resolve this one, it just magically works for some reason. The problem right now is URL filtering is not working anymore after transitioning to a 2 tier setup.
Everyone, thank you for the assistance!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY