Wednesday, April 26, 2017

Ports use by Checkpoint FW




ProtocolPort numberService Name and CommentUsage
Security Management
TCP258FW1_mgmt - Check Point Security Management (Version 4.x)Communication between SmartConsole applications and Security Management Server (by FWM daemon)
TCP8989not predefinedLoopback port (used by CPD process). Used only on Provider-1 Customer Management Add-on (CMA) / Domain Management Server for Session Authentication - CAPS Messaging (MSG_DEFAULT_PORT).
TCP18184FW1_lea - Check Point OPSEC Log Export APIConnections to Management Server (FWD daemon) for exporting FireWall logs using OPSEC Log Export API (LEA) products.
TCP18185FW1_omi - Check Point OPSEC Objects Management InterfaceProtocol used by applications having access to the ruleset saved on Security Management Server
TCP18186FW1_omi-sic - Check Point OPSEC Objects Management Interface with Secure Internal Communication (SIC)Secure Internal Communication (SIC) between OPSEC certified products and Security Gateway
TCP18187FW1_ela - Check Point OPSEC Event Logging APISending FireWall logs by OPSEC products (ELA) to Security Management Server (to FWD daemon)
TCP18190CPMI - Check Point Management InterfaceConnections from GUI/SmartConsole clients / Management Portal / SmartReporter Server / SmartEvent Server to FWM daemon on Security Management Server / Multi-Domain Security Management Server / Domain Management Server.
TCP18202CP_rtm - Check Point Real Time MonitoringConnections from Management Server to Loopback port (used by RTM process) for Real Time Monitoring (SmartView Monitor).
TCP18209not predefinedSIC communication (status, issue, revoke) between the Security Management Server (the Internal Certificate Authority (ICA)) and objects managed by this Security Management Sever (Security Gateways, OPSEC applications, etc.) (by FWM daemon)
TCP18210FW1_ica_pull - Check Point Internal CA Pull Certificate ServicePulling certificates by Security Gateway from Security Management Sever (ICA_PULLFWCA_PULL_PORT) (by CPCA daemon)
TCP18211FW1_ica_push - Check Point Internal CA Push Certificate ServicePushing certificates from the Internal Certificate Authority (ICA) on Security Management Sever (by CPD daemon) to Security Gateway
TCP18221CP_redundant - Check Point Redundant Management ProtocolSynchronization connections between Primary and Secondary Security Management Severs / Customer Management Add-ons (CMAs) / Domain Management Servers (by FWM daemon).
UDP18241E2ECP - Check Point End to End Control ProtocolLoopback port (used by RTM process). Checking SLA's defined in Virtual Links by SmartView Monitor.
TCP18265FW1_ica_mgmt_tools - Check Point Internal CA Management ToolsInternal CA Management (ICA) connections from SmartConsole GUI client hosts to Management Server
TCP19009not predefinedListened by CPM server for remote connections with SmartConsole (added in R80)
TCP9009not predefined Listened by CPM server for local connections (local SIC) 
TCP8211not predefined Connections between R80 Multi-Domain Security Management Server and Log Server
TCP6666not predefinedListened by FWM of Security Management Server / Customer Management Add-on (CMA) for communication arriving from CPM server.
TCP6667not predefined Listened by FWM of the Multi-Domain Management Server for communication arriving from CPM server.
TCP4433not predefinedManagement Portal
Firewall
TCP256 FW1 - Check Point Security Gateway ServiceConnections to Security Gateway Service (to FWD daemon):
  • Fetching topology information by Security Gateway (by FWD daemon) from Security Management Server or Customer Management Add-on (CMA) / Domain Management Server
  • Full Synchronization between cluster members (by FWD daemons)
  • Used by the following commands:
    • fw isp_link <server_ip>
    • fw getver <server_ip>
    • fw logswitch -h <server_ip>
    • fw lslogs <server_ip>
    • fw fetchlogs <server_ip>
  • On IPSO OS, used by syslog_helper - refer to sk40185
TCP257FW1_log - Check Point Security Gateway LogsDelivering logs from Security Gateway (by FWD daemon) to Security Management Server / Customer Management Add-on (CMA) / Domain Management Server / Customer Log Module (CLM) / Domain Log Server
TCP259FW1_clntauth_telnet - Check Point Security Gateway Client Authentication (Telnet)Client Authentication on Security Gateway (in.aclientd daemon) using Telnet
UDP260FW1_snmp - Check Point Security Gateway SNMP AgentCheck Point's SNMP Agent listens on this port in addition to UDP port 161
TCP261FW1_snauth - Check Point Security Gateway Session AuthenticationCommunication between Security Gateway and Session Authentication API (SAA)
TCP262not predefinedLoopback port (used by MDQ process). Check Point Mail Dequeuer on SMTP Security Server.
TCP900FW1_clntauth_http - Check Point Security Gateway Client Authentication (HTTP)Client Authentication on Security Gateway (in.ahclientd daemon) using HTTP
TCP4532not predefinedLoopback port (used by IN.ASESSIOND process). Session Authentication.
UDP5004MetaIP-UAT - Check Point Meta IP UAM Client-Server CommunicationIP address management (Note: Product is EOL)
TCP18183FW1_sam - Check Point OPSEC Suspicious Activity Monitor (SAM) API
  • Connections from Management Server to FWD daemon on Security Gateway to instantly block suspicious connections (by FWD daemon) that are not restricted by the currently enforced security policy using the Suspicious Activity Rules feature in SmartView Monitor (Tools menu)
  • Connections from SmartEvent Server to FWD daemon on Management Server
TCP18183not predefinedOPSEC Suspicious Activity Monitor (SAM) connections between GX / LTE SAM clients and Security Gateway (FWD daemon)
UDP18212FW1_load_agent - Check Point ConnectControl Load AgentConnections from Load Agent running on Load Balanced Servers (e.g., WWW, FTP) to Security Gateway
TCP19190FW1_netso - Check Point User Authority simple protocolCommunication from UserAuthority Server to Web Plugin when authenticating using certificates generated by the Internal Certificate Authority (ICA)
TCP19191FW1_uaa - Check Point OPSEC User Authority APIConnections from Security Gateways / Hosts with User Authority products to UserAuthority Server
UDP19194 and 19195CP_SecureAgent-udp - User Authority SecureAgent Authentication serviceUser Authority SecureAgent Authentication ICA service
Infrastructure
TCP443not predefined
  • SmartView process on Security Management Server / Domain Management Server R80 and above (sk111574)
  • SmartLog process on Security Management Server / Domain Management Server R80 and above
TCP1129not predefinedSynchronization between members of a Gaia Cloning Group
TCP2024not predefinedUsed internally on 61000/41000 Data Center Security Appliances for copying of SSM firmware file to SSM
TCP4434not predefinedGaia Portal / SecurePlatform WebUI on Check Point Appliances
TCP18191CPD - Check Point Daemon (CPD)Connections to / from Management Server (CPD daemon):
  • Installing of rulebase from Security Management Server / Customer Management Add-on (CMA) / Domain Management Server to Security Gateway
  • Fetching rulebase by Security Gateway (during start) from Security Management Server / Customer Management Add-on (CMA) / Domain Management Server
  • Certificate revocation
TCP18192CPD_amon - Check Point Internal Application MonitoringCheck Point internal Application Monitoring (AMON) connections between Security Gateway and Management Server / SmartReporter Server / SmartEvent Server (CPD daemon)
TCP18193FW1_amon - Check Point OPSEC Application MonitoringGetting System Status from OPSEC products (by CPD daemon)
TCP18208FW1_CPRID - Check Point Remote Installation ProtocolRemote Installation of packages in SmartUpdate from Security Management Server / Customer Management Add-on (CMA) / Domain Management Server (by CPRID daemon) to Security Gateway
TCP18262CP_Exnet_PK - Check Point Extranet public key resolutionExchange of public keys when configuring Extranet (not supported since NG AI R55)
TCP18263CP_Exnet_resolve - Check Point Extranet remote objects resolutionImporting exported objects from partner in Extranet (not supported since NG AI R55)
TCP18264FW1_ica_services - Check Point Internal CA Fetch CRL and User Registration ServicesConnections to Management Server for Certificate Revocation Lists (CRLs) and registering users when using the Policy Server.
Refer to sk35292.
TCP18300UserCheck - Check Point Daemon ProtocolUserCheck connections from internal hosts to DLP Gateway (USRCHKD daemon) - policy-driven user interaction for Application Control, URL Filtering, DLP
TCP20000not predefinedUsed internally on 61000/41000 Data Center Security Appliances on the SSM during the firmware upgrade
TCP60706not predefinedLoopback port (used by CPWMD process). The back-end for web user interface on SecurePlatform OS (Check Point Web Management).
TCP60709not predefinedLoopback port (used by CPWMD process). The back-end for web user interface on Gaia OS (Check Point Web Management).
IPsec VPN / SecuRemote / SecureClient
UDP259RDP - Check Point Security Gateway FWZ Key Negotiations.

Note: Proprietary Check Point "Reliable Data Protocol" (does not comply with RDP as specified in RFC 908/RFC 1151).
Connections to Security Gateway:
  • FWZ VPN (supported up to NG FP1 version only)
  • SecuRemote/SecureClient checks the availability of the Security Gateway/Desktop Policy Server
  • When more than one IP address is available on a Security Gateway for VPN, RDP probing method is used to determine which VPN link will be used between Check Point VPN Gateways (by VPND daemon)
TCP264FW1_topo - Check Point Security Gateway SecuRemote Topology RequestsTopology Download from Security Gateway (by FWD daemon) to SecuRemote (build 4100 and higher) and SecureClient
TCP265FW1_key - Check Point Security Gateway Public Key Transfer Protocol
  • Exchanging CA-keys and DH-keys between management servers (SKIPFWZ (4.x)) (by FWD daemon)
  • Public Key download from Security Gateway (by FWD daemon) to SecuRemote/SecureClient
TCP444CP_SSL_Network_Extender - SSL Network Extender port
  • SSL Network Extender (SNX)
  • Remote Access Client configuration
  • Visitor Mode
(by VPND daemon)
UDP500IKE - IPSEC Internet Key Exchange Protocol (formerly ISAKMP/Oakley)IKE negotiation over UDP with Security Gateway (VPND daemon)
TCP500IKE_tcp - IPSEC Internet Key Exchange Protocol over TCPIKE negotiation over TCP (by VPND daemon)
UDP2746VPN1_IPSEC_encapsulation - Check Point Security Gateway SecuRemote IPSEC Transport Encapsulation ProtocolUDP encapsulation
UDP4500IKE_NAT_TRAVERSAL - NAT Traversal (NAT-T) ProtocolNAT Traversal adds a UDP header, which encapsulates the IPSec ESP header (by VPND daemon).
TCP9996not predefined Used by VPND daemon to synchronize session information (as a PostgreSQL) between VPND daemon and CVPND daemon (Mobile Access blade).
TCP18207FW1_pslogon - Check Point Policy Server Logon protocolInstalling of Desktop Security policy from the Policy Server (DTPSD daemon) to SecureClient (4.x)
TCP18231FW1_pslogon_NG - Check Point NG Policy Server Logon protocolInstalling of Desktop Security policy from the Policy Server (DTPSD daemon) to SecureClient
TCP18232FW1_sds_logon - Check Point SecuRemote Distribution Server ProtocolSoftware distribution of Check Point components
UDP18233FW1_scv_keep_alive - Check Point SecureClient Verification Keepalive ProtocolConnections from SecureClient to Security Gateway for Secure Configuration Verification (SCV)
UDP18234tunnel_test - Check Point tunnel testing applicationCheck Point Tunnel Test packets from Security Gateway to test ICA through VPN with SecuRemote/SecureClient
TCP65524FW1_sds_logon_NG - SecuRemote Distribution Server Protocol (VC and higher)Software distribution of Check Point components in NG versions
Internet Protocol 17---tunnel_test_mapped - Tunnel testing for a module performing the tunnel testVPN tunnel testing for a module performing the tunnel test
Internet Protocol 50---ESP - IPSEC Encapsulating Security Payload ProtocolEncapsulating Security Payload (ESP) is a member of the IPsec protocol suite. In IPsec it provides origin authenticity, integrity and confidentiality protection of packets.
Internet Protocol 94---FW1_Encapsulation - Check Point Security Gateway SecuRemote FWZ Encapsulation ProtocolEncryption scheme for SecuRemote
Endpoint Security
TCP80not predefinedClient -> Policy Server communication (over HTTP):
Policy download, Anti-Malware updates, Client package, Application Control
TCP80not predefinedClient -> Policy Server communication (encrypted ESP):
Sync request, heartbeat, log upload
TCP81not predefinedUsed on Endpoint Security Management Server for CPTNL proxy -> Apache communication
TCP443not predefinedClient -> Policy Server and Policy Server -> Endpoint Management Server communication (over HTTPS):
Endpoint registration, new internal communication encryption key retrieval
TCP443not predefinedClient -> Policy Server and Policy Server -> Endpoint Management Server communication (encrypted ESP):
FDE Recovery Data Upload, FDE User Acquisition & User Credentials, Media Encryption & Port Protection Key Exchange
TCP1080not predefinedUsed by CPTNL client SOCKS proxy on Policy Server
TCP1081not predefinedUsed by CPTNL client SOCKS proxy on Policy Server
TCP8005not predefinedLoopback port (used by EPM process). Apache Tomcat server on Endpoint Security Management Server.
TCP8009not predefinedLoopback port (used by EPM process). Apache <--> Apache Tomcat AJP on Endpoint Security Management Server.
TCP8080not predefinedLoopback port (used by EPM process). Endpoint Security Management Server and Directory Scanner -> Apache Tomcat HTTP on Endpoint Security Management Server.
TCP8443not predefinedUsed by Apache Tomcat HTTP on Endpoint Security Management Server
TCP18190not predefinedSmartEndpoint / Endpoint Management Console -> Endpoint Security Management Server communication (over SIC)
TCP18193not predefinedEndpoint Policy Server -> Endpoint Security Management Server communication (used by CPTNL server SOCKS proxy on Endpoint Policy Server)
TCP18196not predefinedUsed to update the internal Application Monitoring (AMON) server (CPD daemon) on Endpoint Security Management Server with different status tables
TCP18221not predefinedEndpoint Security Management Server <--> Secondary Endpoint Security Management Server communication (over SIC)
TCP18272not predefinedUsed by PostgreSQL on Endpoint Management Server
TCP31415not predefinedFor Primary Endpoint Management Server <--> Secondary Endpoint Management Server and Endpoint Management Server <--> Web Remote Help server communications only when synchronization method is automatic online (starting from R77.20)
TCP61616not predefinedLoopback port (used by EPM process). Apache ActiveMQ (AMQ) access on Endpoint Security Management Server.
Anti-Virus
TCP12873ci_http_server - Image server for Anti-Virus block pageConnections to Security Gateway to Image Server that sends images of the Anti-Virus block page returned to the user
TCP18181FW1_cvp - Check Point OPSEC Content Vectoring ProtocolConnections (encrypted protocol) from Security Gateway to OPSEC Anti-Virus Server for Content Control
URL Filtering
TCP18182FW1_ufp - Check Point OPSEC URL Filtering ProtocolConnections (encrypted protocol) from Security Gateway to OPSEC URL Filtering Server for Content Control (e.g. Web Content)
Identity Awareness
TCP11680pepd - Identity Awareness Captive PortalThe local port of the mini-Web server that does the redirection to the Captive Portal 
TCP15105identity_control_port - Identity Control BladeConnections from Identity Awareness PDP Gateway to Identity Awareness PEP Gateway - identity control sync to LDAP servers (AD controllers) and identity sharing in Identity Awareness
TCP17000not predefinedIdentity Propagation from 3rd party identity providers (over SIC)
TCP28581identity_control_port - Identity AwarenessConnections from Identity Awareness PEP Gateway to Identity Awareness PDP Gateway - sharing of identities between gateways
Data Loss Prevention (DLP)
TCP18301CheckPointExchangeAgentConnections (in clear) from Exchange Agent (running on Microsoft Exchange Server) to DLP Gateway
Threat Emulation
TCP10025not predefinedEach e-mail is sent by Postfix to in.emaild.mta process to TCP port 10025
TCP18194not predefinedConnections from Security Gateway when running Threat Emulation as a remote emulator (by TED daemon) to Check Point Cloud
TCP30580not predefinedLoopback port (used by TED process). Communication with files sent via the DLPU process.
Anti-Spam
TCP7087not predefinedLoopback port (used by EMAILD / MSD / CTASD / CTIPD processes)
Mobile Access
TCP301not predefinedLoopback port (used by CVPND process). Back-end daemon of Mobile Access.
TCP401not predefinedLoopback port (used by PINGER process). Offload long-last requests from HTTPD process.
TCP443https - HTTP protocol over TLS/SSLFront-end daemon of Mobile Access (multi-processes - mpdaemon)
TCP5432PostgreSQL - PostgreSQL database serverMove files between cluster members in order to perfrom DB synchronization (used by MOVEFILESERVER process)
TCP8080HTTP_and_HTTPS_proxyFront-end daemon of Mobile Access (used by multi-processes - mpdaemon)
TCP9876not predefinedLoopback port (used by CVPNPROC process). Offload blocking commands from CVPND process (to prevent locks) - e.g., sending DynamicID.
TCP9998not predefinedLoopback port (used by DBWRITER process). Offload DB commands from CVPND process (to prevent locks) and synchronize with other members.
Clustering
TCP1111IPSO_Clustering_Mgmt_Protocol- Used for distributing configuration changes among cluster members and cluster wide monitoringIPSO Clustering management connections to cluster members on IPSO OS
TCP2010FIBMGR - Forwarding Information Base Manager - Dynamic Routing Cluster configurationFIB Manager connections from / to cluster members on SecurePlatform OS with enabled Dynamic Routing
UDP8116not predefined - Cluster Control Protocol (CCP)Communication between Check Point cluster members (Health Checks and State Synchronization)
UDP9887 cphamcset - Clustering daemonResponsible for opening sockets on the NICs to allow them to pass multicast traffic (CCP) to the machine. 
Internet Protocol 112---vrrp - Virtual Router Redundancy ProtocolVRRP connections to IP 224.0.0.18, Proto 112, TTL 255
Eventia Analyzer / Reporting
TCP18205CP_reporting - Check Point Reporting Client ProtocolConnections from SmartConsole clients (GUI) to Management Server (Reporting Server listens on this port).
TCP18266CP_seam - Check Point Eventia Analyzer Server ProtocolConnections to Eventia Analyzer Server / SmartEvent Server.
UTM-1 Edge
TCP981EDGE - UTM-1 Edge PortalConnection to UTM-1 Edge Web GUI when connecting via WAN port
UDP9281SWTP_Gateway - VPN-1 Embedded/SofaWare commandsConnections (encrypted protocol) between Management Server (SMS daemon) and UTM-1 Edge devices
UDP9282SWTP_SMS - VPN-1 embedded / SofaWare Management Server (SMS)Connections (encrypted protocol) between Management Server (SMS daemon) and UTM-1 Edge devices
TCP9283not predefinedSofaWare Management Server (SMS) Portal on Management Server