- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello. We are implementing a test environment currently, so new gateways and a new policy... and I'm running into a traffic Reject I haven't encountered before. The Reject shows as Blade: Firewall, and has no matching rule number, and for message information it says "SSH version 1.x is not allowed."
I have Googled for this specific message, and found sk30470.. unfortunately the solution provided in sk30470 doesn't seem to work for me!
The traffic being Rejected by Check Point is for a Juniper Networks EX-series network switch talking to "MIST Wired Assurance" cloud management platform on TCP/2200.
The Check Point gateway is Rejecting this traffic because "SSH version 1.x is not allowed." Ok, that is not ideal if MIST is truly using that protocol version, and that's something I can bring up with that vendor.. but in the mean time, I really have to be able to allow this traffic on the Gateway. The problem is, I cannot figure out how! The article sk30470 says to use the 'ssh' service object to match all versions of ssh, but this traffic is using a custom port 2200. So.. how do I work around this issue? When I Created a custom service object to match TCP/2200, I only see ssh2 in the drop down for protocols.
Is this something I have to make an exception for in Inspection Settings? In the past I have done an exception like "Non-HTTPS Traffic over an HTTPS port" but there doesn't seem to be a similar option for SSH version 1.x is not allowed."
Any help would be appreciated. Since this for a test gateway I do not feel it warrants a TAC case, but I haven't been able to figure this out yet...
How does the rule look? Traffic hits now ''any'' services? If so try to make a custom TCP-2200 port and allow it with that.
Also app blade enabled?
You can also try to clone the default SSH services and change the port
As soon as I started reading your post, inspection settings came to mind. Though, out of the box, setting is default, NOT recommended, but will have a look at the lab later to see whats there for ssh.
Andy
How does the rule look? Traffic hits now ''any'' services? If so try to make a custom TCP-2200 port and allow it with that.
Also app blade enabled?
You can also try to clone the default SSH services and change the port
I will give this a try cloning the ssh service and changing the port.
EDIT: This appears to have done the trick. Clone default ssh service and rename ssh_mist and changed the port to 2200 and now I am no longer seeing "Reject" in the logs. And both lab switches lit up green in my Mist console. (They were showing Red/Disconnected before)
Why not create a simple TCP service without a protocol handler for ssh?
This is what I've done. I created a TCP service for port 2200, and did not select any protocol from the drop down menu. Configuring in this way was not sufficient to allow this traffic. I do get matches for "Accepted" but then a "Reject" right after it saying the version 1.x is not allowed message.
Would you mind send us a screenthot? Just please blur out any sensitive info. Btw, I did check in my lab and though my gateways are set to recommended inspection profile, there is absolutely nothing referenced for ssh.
Andy
This screenshot shows the accept immediately followed by the reject. The accept matches the expected rule number and rule name, while the reject is blank for rule number/rule name. It's the blankness that confuses me.. what is blocking it? It is coming from the firewall blade but it's not an actual "rule block'
Does it give more info if you double click on it?
Lesleyy's suggestion of clone the default ssh service and change its port has fixed this issue.
Great!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY