- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi there
One of our Cluster comes with the error '
|
': Note that we are running R81.20 with the latest recomended hotfix, and we check dns and comunication, we can ping but we can note reach access..
Is this a VSX setup? Is this a cluster and if so is this the stand-by member?
Do port 80 websites work? Traffic shows allowed in logging?
Hi @Lesley
Not, its not! Yes its a cluster, both members, stand and active
dont work
When did this happen, any idea? Does below work?
curl_cli -k google.com
Andy
Hi @the_rock
we though like was dns problem, because was not pinging updates.checkpoint.com we have set the valid dns server and know are pinging but still having problem to update.
run ip r g 8.8.8.8 and please send the output
Also, check below files on the fw:
$FWDIR/appi/update/appi_statuc.C
$FWDIR/ips/update/ips_status.C
Hi @the_rock
App control! we dont use cp fw for urç filtering and app control..
We run 4 fw, in two cluster managed by one mgmt, everything is the same. we only have issue in first cluster,
We have tthinking that the issue may be related to the certificare, perahps!
first cluster with issue
second cluster
update manually!! i didn´t yet
Well, it might be the case, but are you able to access that portal by the IP address? If yes, then I dont believe that would be causing this problem...
Andy
yes
I would call TAC for this and do remote.
Andy
Have you checked the logs to see if it is getting dropped?
If you haven't already, go into global properties and check the box that states to log implied rules.
Sometimes people deactivate these implied rules, which then can cause issues for the gateway to start its own sessions.
I have also noticed issues for gateway communications if you try to do any STATIC NAT on FWs public IP.
So double check NAT rules.
I would also check fw monitor in one seperate window when conducting tests...
See: https://tcpdump101.com/
You can use the new or old version, but old version requires to disable fwaccel / SecureXL, so if you can work with the new it's better.
There you will clearly see what and where it's sent out, and if it receives anything back at all.
Glad to see my colleague's site getting "promoted" : - ). I told him about it and he said that makes him very happy, so he will definitely try spend some time to make it even better.
Anyd
I think the site does its job perfectly.
It might look old and outdated, but to my eyes, it's simply effecient without any needless things.
Really like it.
I think it's the perfect site for people to go to to start with fw monitor, tell him thanks from me 🙂
Will do! You can also contact him on twitter or whatever they call it these days...I was never big social media guy )quite frankly, never cared for it lol), but I will definitely tell him Monday when I see him.
Best,
Andy
For what its worth, maybe verify below things, as per AI response.
Andy
****************************************
Message:
Update failed. Contract entitlement check failed. Gateway can not access internet ("https://updates.checkpoint.com/WebService/services/DownloadMetaDataService"). Check connectivity and proxy settings.
Test Internet Access from Gateway:
Log into the CLI (via SSH or console).
Run:
Or, if curl
isn't available:
telnet updates.checkpoint.com 443
If this fails, the gateway has no internet access or DNS resolution problems.
Check DNS Settings:
Ensure /etc/resolv.conf
has valid DNS entries.
Test name resolution:
nslookup updates.checkpoint.com
Check Proxy Configuration (if required):
If you're behind a corporate proxy, you must configure it:
In SmartConsole: Go to Device > System Settings > Proxy.
Or CLI:
dbset proxy:<proxy_address>
dbset proxy_user:<username> # if required
dbset proxy_password:<password> # if required
Verify Contract Entitlement:
Ensure your gateway has a valid support contract.
Log into your Check Point User Center account and verify your product entitlements.
Firewall Rules:
Ensure the gateway or any upstream firewall allows outbound HTTPS (TCP 443) to:
updates.checkpoint.com
dl3.checkpoint.com
secureupdates.checkpoint.com
Check for Hotfixes:
Some Check Point versions (especially older ones) may need a hotfix to support updated TLS protocols used by Check Point’s servers.
Reference relevant SK articles (like SK83520 or SK113747) on Check Point’s support portal.
By the way, since I offer this to everyone, if you are willing and allowed to do remote, happy to try and assist that way. let me know. Im in EST time zone (GMT -4)
Andy
On my SMS this works: I get a 301 moved
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
5 | |
4 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY