- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
cipher_util does no longer work for multiportal in R81.10, look for yourself:
- start cipher_util
- display multiportal cipher list
- disable one cipher
- display cipher list shows the cipher as disabled
- quit cipher_util and type y save:
Would you like to save configuration? [y/N] y
Successfuly reconfigured
Exiting cipher tool...
- start cipher_util
- display multiportal cipher list
---> you will see that nothing was changed and cipher_util has not saved the changes !
Hi @G_W_Albrecht
Yes, issue is present in R80.40 and higher releases
We created a new SK for that matter, see https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&so...
Thanks,
Matan
Thank you for raising this issue
We are aware of this issue and working on a fix, will be released in R81.20 once the tests are completed successfully
Thanks,
Matan
Replicated issue and workaround on R81.10 and R80.40 GWs. Is there an SK for this issue already ?
Is it correct that this issue also is present in R81 @matangi ?
Hi @G_W_Albrecht
Yes, issue is present in R80.40 and higher releases
We created a new SK for that matter, see https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&so...
Thanks,
Matan
Good job! Just tested with that sk and worked like a charm.
Hi @matangi
Got the same problem in our upgrade from R80.30 to R81.10.
We tried the workaround in sk178165, does not seem to work.
The only difference from the workaround is that after "Multi Portal" a got to select "TLS 1.2 Ciphers"
Thanks
Thanks @chuck
In case the problem persists, Please open a service request to Check Point Support
Indeed...tested on R80.40 and above, same issue. On R80.30, works fine.
Andy
So this has been a known issue for over a year? Hey Check Point how about:
How much more time do you need on this? Amazing.
- sk178165 is listed first under Known Limitations of sk126613
- R81.20 includes a fix
- there is a workaround for R80.40 -> R81.10
As disabling ciphers for MultiPortal is no activity repeated every other day it is not so hard to live with it 😉
"sk178165 is listed first under Known Limitations of sk126613" <-- This should be included within the steps, not added as an afterthought at the end of the SK.
"R81.20 includes a fix" <--Customer is not on R81.20, so this doesn't apply.
"there is a workaround for R80.40 -> R81.10" <-- That's not a "workaround" that is a missing step in the documentation.
"As disabling ciphers for MultiPortal is no activity repeated every other day it is not so hard to live with it" <-- Maybe for you, but I have a customer with an outage because of this SK. This SK article has not been updated after 16 months and multiple reports of problems, sk178165 and sk126613 have not been combined, this not to have been addressed in a hotfix, and the multiportal still has these ciphers enabled by default.
If gateways are going to continue to be shipped this way, then the documentation should be spot on so that they can be quickly corrected and run as actual security devices.
Otherwise this cipher issue is going to be highlighted on any kind of vulnerability scan or pen test, and make it quite a challenge to demonstrate compliance to any reputable standard.
Yes, this world could be a better place 8) ! Missing / incomplete / wrong documentation is an old issue in IT - but i personally prefer fixes to bugs, as the best documentation will not help you if the product has issues...
The gateways shouldn't even have these outdated ciphers enabled by default
--> I would suggest you do a RFE for that...
An RFE to remove Ciphers without PFS support and that use SHA-1? They shouldn't be included on a security gateway in this day and age.
Feel free to raise this with your local Check Point representative.
Could not agree more @Fire_Verse
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
5 | |
4 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY