Create a Post
Showing results for 
Search instead for 
Did you mean: 

Why is port 80 and 443 still open to the internet?

We have a mobile access blade activated in our firewall but have disabled it via the GUI interface; however we can still see that port 80 and 443 are open to the internet.  We can see via tracker that it is an implied rule that is accepting traffic on 80 and 443 but cannot see which implied rule is allowing it.

Does anyone have any ideas?

6 Replies

Hello ,


Even after making changes anyone from internet can telnet on 443 and 80 .

Due to this many vulnerabilities are coming from security team.

Does we have any fixed solution on this ? 

0 Kudos

If you set it to internal interface and still have the issue, i would contact TAC to get it resolved!

0 Kudos

sk165937 should help.

For HTTP redirects in particular, see the very bottom of the SK.

0 Kudos


I have this issue as well (http/https open on external interface gateways). We used to use Mobile Access but I disabled the Mobile Access blade about a year ago and afaik have no use any Multi Portal functions on the external interface. 

I found this article sk155512 

How to determine which portal is causing MultiPortal to respond on external interface

Is this relevant in this case? The article states - "MultiPortal creates an implied rule and accepts traffic on port 443 or port 80 if a portal is set to be accessible from All Interfaces. This setting might persist even if the blade was later disabled. This can be changed in the following manner:"

The article is very vague with instruction such as - 5. Change the setting accordingly. I tried to follow the article along in GuiDBedit but could not work out what to do. 

A while back I opened a support ticket with Checkpoint but got nowhere with it. 

0 Kudos

El tráfico 443 es utilizado por el software Check Point para varias cosas, puede ver los usos en sk52421. Si bien 443 está permitido, no es explotable, sin embargo, deshabilitar 443 podría causar que ciertas cosas se rompan, como la VPN de acceso remoto y los portales de Check Point. Si bien no se recomienda hacer esto porque romperá ciertas funciones, puede deshabilitar la conectividad a 443 usando sk165937. El sk proporciona dos métodos, el primero en 'Para deshabilitar la conexión a Security Gateway en el puerto TCP 80 y en el puerto TCP 443' y el método alternativo para crear una regla SAM que bloquea el tráfico 443.


0 Kudos


Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events