- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All,
We have an issue where external IPs are allowed to access my gateway.
We tried the KB below, where we change it to "Through internal interfaces" but the traffic is still allowed.
https://support.checkpoint.com/results/sk/sk105740
We also tried the sk105740, we have followed this alternative solution to adding the IOC IP address into the SAM rule but however, the issue is not resolved.
Refer to the attached log that shows external IP allowed to my external Gateway IP via port 443
Regarding sk180808
It can be http or https , i will ask to fix the Sk .
i will explain a bit about the 2 options :
Currently there are 2 "before drop" implied rules, both implied rules can allow connections to the Security Gateway on port 443 or 80
it mean that in case we have a drop we check if we match the implied rule
in sk180808 , you can change the before drop to before last
it mean that in case this connection is drop on the rulebase (except the cleanup rule) , GW will drop the connection , in case the connection hit the cleanup rule, we will see if it match the implied rule .
when you use the fw_ignore_before_drop_rules , this is like you disable both rules
in this case you must create an implicit rule instead of the implied rule .
How precisely did you “add the IOC IP address into the SAM rule”?
Did you try setting fw_ignore_before_drop_rules?
Instead of a SAM rule, you can use: https://support.checkpoint.com/results/sk/sk112454
fw_ignore_before_drop_rules
Does this cause any impact to my production or require any reboot?
Should not, but as with any change, you may want to test it in a maintenance window.
As per https://support.checkpoint.com/results/sk/sk105740. I don't see the steps to change the setting fw_ignore_before_drop_rules. Do you have the steps?
In the SK I linked, it says: to configure the parameter to survive reboot - refer to sk26202.
It also provides instructions to change on the fly.
Please also look at sk180808 https://support.checkpoint.com/results/sk/sk180808
Security Gateway accepts HTTP traffic by an implied rule for its HTTP Web Portals, although there is an explicit rule that drops this HTTP traffic
Hi, how about https traffic coming from the outside? From the sk, I see this is only for http
I will ask the relevant owner to see what they can add.
Hi, I check through.
Based on this: https://support.checkpoint.com/results/sk/sk180808
What is the different between value 0 and 1. Seems like it is the same meaning
Adding @YosiHavilo to answer
Regarding sk180808
It can be http or https , i will ask to fix the Sk .
i will explain a bit about the 2 options :
Currently there are 2 "before drop" implied rules, both implied rules can allow connections to the Security Gateway on port 443 or 80
it mean that in case we have a drop we check if we match the implied rule
in sk180808 , you can change the before drop to before last
it mean that in case this connection is drop on the rulebase (except the cleanup rule) , GW will drop the connection , in case the connection hit the cleanup rule, we will see if it match the implied rule .
when you use the fw_ignore_before_drop_rules , this is like you disable both rules
in this case you must create an implicit rule instead of the implied rule .
Hi Yosi,
for my understanding, am i right on the below,
Based on sk180808 , you can change the before drop (“0”) to before last (“1”).
If the value is “1”, when traffic hit onto one of the explicit drop rules (NOT the default cleanup rule), gateway will drop the connection.
If the value is “0”, when the traffic hit onto the default cleanup rule, then it match the implied rule (multiportal).
If the value is “1”, when traffic hit onto one of the explicit drop rules (NOT the default cleanup rule), gateway will drop the connection ,when the traffic hit onto the default cleanup rule, then it match the implied rule (multiportal)..
If the value is “0”, when the traffic drop rule, then it match the implied rule (multiportal).
"when the traffic hit onto the default cleanup rule, then it match the implied rule (multiportal).."
For the above added, this only happens if I do not have an explicit drop rule (not the cleanup rule) right?
correct
Understand! Can i also check if those commands work on R80.30 Take 251?
Do you use any of the multi-portal features, including MAB? It might be, your features require HTTP/HTTPS access on the external interfaces.
No I don't think so. But I tried follow this sk105740 to change the accessibility to "through internal interface" but I still see traffic allowed coming from external traffic to my external gateway.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
5 | |
4 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY