Symptoms |
|
Solution |
Various parts of FireWall-1 bind to various ports on the system. Typically, they intercept connections traversing through the firewall, but in order for this to work correctly, they must bind to their own port and listen. In general, the services bound to these ports do not pose any sort of security risk. If no policy is in place or the policy permits access to these ports inadvertenly, the processes themselves are smart enough to reject direct requests to these ports. In the case of the SAM and LEA ports (see below), these ports require authentication in much the same way that remote management does, so it is not believed to be a security risk. TCP Port 256 is used for three important things:
TCP Port 258 is used by the fwpolicy remote GUI. FireWall-1 will only listen to this port on a management console. TCP Port 259 is used for Client Authentication via telnet. FireWall-1 will only listen to this port on a firewall module.UDP Port 259 is used in FWZ encryption to manage the encrypted session (SecuRemote and FireWall-1 to FireWall-1 VPNs). UDP Port 260 and UDP Port 161 are used for the SNMP daemon that Check Point FireWall-1 Provides.TCP Port 262 is used by netsod, which is the Single Sign-on Daemon. This can be disabled by commenting out the line that contains netsod in $FWDIR/conf/fwauthd.conf. TCP Port 264 is used for Secure Client (SecuRemote) build 4100 and later to fetch network topology and encryption keys from a FireWall-1 Management Console. FireWall-1 will only listen to this port on a management console.UDP Port 500 is used for ISAKMP key exchange between firewalls or between a firewall and a host running Secure Client. FireWall-1 will only listen to this port on a firewall module. TCP Port 900 is used by FireWall-1's HTTP Client Authentication mechanism. This can be disabled by commenting the appropriate line in $FWDIR/bin/fwauthd.conf.TCP Port 4532 is used for the Session Auth agent, asessiond. TCP Ports above 1024, other than the ones listed below, are generally any Security Servers that are active. The actual ports used by these servers will vary. 1024 is the lowest & 65535 is the highest port a Security Server process will use for a connection. If you wish to minimize the number of ports listening, comment out the appropriate lines from $FWDIR/conf/fwauthd.conf. Note that if you disable a security server in this fashion, you can not use its capabilities (like content security or authentication), so make sure you only do it for the security servers you know you are not using.TCP Port 18181 is used for CVP (Content Vectoring Protocol, for anti-virus scanning). FireWall-1 will not listen on this port. TCP Port 18182 is used for UFP (URL Filtering Protocol, for WebSense and the like). FireWall-1 will not listen on this port.TCP Port 18183 is used for SAM (Suspicious Activity Monitoring, for intrusion detection). If you do not use these features, you can comment out the appropriate lines in $FWDIR/conf/fwopsec.conf. TCP Port 18184 is used for Log Export API (lea). If you do not use these features, you can comment out the appropriate lines in $FWDIR/conf/fwopsec.conf.TCP Port 18186 (FW1_omi-sic) is used for Secure Internal Communications (SIC) between OPSEC certified products and a NG FireWall module. TCP Port 18190 (CPMI) is used by the FireWall Management process (FWM) to listen for NG Management Clients attempting to connect to the management module.TCP Port 18191 (CPD) is used by the CPD process for communications such as policy installation, certificate revocation, and status queries. TCP Port 18192 (CPD_amon) is used by the CPD process FireWall Application Monitoring.TCP Port 18196 is used for CPEPS which is part of User Monitor. TCP Port 18207 is used by polsrvd, which is the Single Sign-on Daemon. This can be disabled by commenting out the line that contains polsrvd in $FWDIR/conf/fwauthd.conf.TCP Port 18210 (FW1_ica_pull): The CPD process, on the management module, is listening on TCP port 18210 for certificates to be "pulled" by a FireWall module from a management module. TCP Port 18211 (FW1_ica_push): The Check Point Daemon (CPD) process, running on the FireWall module, listens on TCP port 18211 for certificate creation and for the "push" of the certificate to the FireWall module from the management module.Should you make any changes above, the 'fwd' process will need to be restarted as follows: nokia[admin]# fw kill fwd |
Labels
- Cheat Sheets (7)
- Checkpoint (159)
- Cisco (24)
- Commands (5)
- Fortigate (2)
- Frame-Relay (9)
- Linux (3)
- Netscaler (29)
- Netscreen (2)
- Nokia (7)
- UNIX (2)
Live Traffic
What ports are used for communication and how to prevent it from listening on certain ports
5/27/2010 06:07:00 AM
Posted by MK | Filed Under Checkpoint | 1 Comments
Comments
Search This Blog
Blog Archive
-
▼
2010
(146)
-
▼
May
(90)
- Checkpoint - Ports
- UNIX - The Ultimate Linux Command Reference Guide
- Checkpoint - Useful Files
- Checkpoint Commands
- Alw@ys Knw Wh@ts Happening inside your KERNEL - “A...
- Nokia - Cluster Mac Address - "Grep" Strikes Again...
- Traceroute from Unix
- Checkpoint Logging Issue
- Change Date in Linux
- Finding Smartcenter Server - from Gateway
- SPLAT - Forgot Standard Password
- Checkpoint : fw ctl pstat ???
- GRE is like Girls!!! - GRE Tunnel in IPSEC - there...
- Checkpoint : How to Find the the Management Interface
- Checkpoint Troubleshooting - Debugging
- SSH session timeout in Checkpoint NG/NGX
- Manage VPN tunnels smartly: forget vpn tu,enter th...
- Clear ARP table in Checkpoint
- Mail alert on ssh login or any other rule hit in C...
- What ports are used for communication and how to p...
- fw monitor add-on
- awk weekly – how to see Checkpoint logs on command...
- awk weekly – rule hits statistics . Checkpoint again
- Install native telnet client on Checkpoint firewall
- Telnet from inside Checkpoint firewall
- fw ctl or checkpoint tables by any other name
- Authenticating ssh access on the Checkpoint using ...
- How to add routing script on Secureplatform?
- Checkpoint concurrent sessions and memory calculat...
- Capazity Optimization
- My favorite troubleshooting command
- Neighbour table overflow
- SecurePlatform and NTP
- Delete old log files on SPLAT machines
- Delete all ARP entries on SPLAT
- Download backup from SmartCenter using SCP
- Change password on non-admin user in SPLAT
- How to run web visualization tool in check point??
- How to configure SmartView Monitor Mail Alert in C...
- fw monitor command reference
- NetScaler Password Recovery Procedure
- Installing and Configuring VSX
- Citrix Access Gateway Enterprise - Redirect incomi...
- Enabling LDAP Authentication on the NetScaler
- Citrix Netscaler NS7000 : how to create a content ...
- Citrix Netscaler NS7000 : how to create a content ...
- Cisco VPN Troubleshooting Guide
- Usefull Checkpoint Commands
- Checkpoint FW Monitor
- Causes for a failover when using VRRP
- Usefull Nokia IPSO Commands
- Checkpoint Tables and the FW Tab Command
- Common CLISH Commands
- Installing and Configuring VSX
- So what are QDROPS anyway
- Clearing the host table on Checkpoint
- Provider-1 Quick Guide
- When are Proxy Arps required on Checkpoint devices
- Unable to delete tunnels on a Checkpoint VIA VPN TU?
- Checkpoint VPN stats
- View Checkpoint VPN traffic decrypted on the wire
- View last 10 policies installed on a Checkpoint fi...
- How to view Checkpoint tables in ASCII
- Checkpoint Splat source based routing
- Trobleshooting the Checkpoint Daemon (CPD)
- Checkpoint port list
- Modifying the SPLAT Webmanager port
- Creating a Read Only SPLAT user
- Configuring SNMP on SPLAT
- Allowing scp to SPLAT boxes
- Resolving local logging issues on Checkpoint
- How to globally change the expiration date of all ...
- rtm monitor in Checkpoint
- Everything you need to know about troubleshooting ...
- SPLAT - Route / Static ARP startup Script
- How do I change an IP address on a IPSO Nokia Fire...
- How do I create an IPSO backup via clish ?
- Nokia IPSO Password Recovery
- Useful Netscreen Commands for Troubleshooting
- How to Find the Speed of an Interface on a Solaris...
- How to Install Checkpoint Firewall NGX on SecurePl...
- How to fix Check Point High Availability State Syn...
- Basic Netscreen Commands
- Re-establishing SIC (Secure Internal Communication...
- Cisco site to site VPN Configuration Cheatsheet
- Troubleshooting VRRP on Nokia Checkpoint Firewalls
- Usefull Nokia IPSO Commands
- Nokia Top Clish Commands Reference
- IPSO - Commands
- Checkpoint - Commands
-
▼
May
(90)
how to restart a specific services if its not listening..eg how restart the service 18191 for policy installation error?