<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://www.cpwiki.net/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://www.cpwiki.net/index.php?action=history&amp;feed=atom&amp;title=Check_point_service_ports</id>
		<title>Check point service ports - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://www.cpwiki.net/index.php?action=history&amp;feed=atom&amp;title=Check_point_service_ports"/>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php?title=Check_point_service_ports&amp;action=history"/>
		<updated>2026-05-01T08:22:56Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.21.10</generator>

	<entry>
		<id>http://www.cpwiki.net/index.php?title=Check_point_service_ports&amp;diff=719&amp;oldid=prev</id>
		<title>Nighthawk at 15:15, 16 March 2018</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php?title=Check_point_service_ports&amp;diff=719&amp;oldid=prev"/>
				<updated>2018-03-16T15:15:00Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
			&lt;tr style='vertical-align: top;'&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
			&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 15:15, 16 March 2018&lt;/td&gt;
			&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[File:cpportsr77.png]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;256 /tcp FW1 Check Point VPN-1 &amp;amp; FireWall-1 Service&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;256 /tcp FW1 Check Point VPN-1 &amp;amp; FireWall-1 Service&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;- Download of rulebase from management server to gateway (4.x)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;- Download of rulebase from management server to gateway (4.x)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	<entry>
		<id>http://www.cpwiki.net/index.php?title=Check_point_service_ports&amp;diff=29&amp;oldid=prev</id>
		<title>Nighthawk: Pushed from Themanclub.</title>
		<link rel="alternate" type="text/html" href="http://www.cpwiki.net/index.php?title=Check_point_service_ports&amp;diff=29&amp;oldid=prev"/>
				<updated>2013-02-26T00:27:29Z</updated>
		
		<summary type="html">&lt;p&gt;Pushed from Themanclub.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;256 /tcp FW1 Check Point VPN-1 &amp;amp; FireWall-1 Service&lt;br /&gt;
- Download of rulebase from management server to gateway (4.x)&lt;br /&gt;
- Fetching rulebase from gateway to management server when starting (4.x)&lt;br /&gt;
- Get topology information from management server or Customer Management Add-on (CMA) to gateway &lt;br /&gt;
- Full synchronization for HA configuration 257 /tcp FW1_log Check Point Logs&lt;br /&gt;
- Protocol used for delivering logs from gateway to management server&lt;br /&gt;
- Protocol used for delivering logs from gateway to CMA or Customer Log Module&lt;br /&gt;
&lt;br /&gt;
258 /tcp FW1_mgmt Check Point VPN-1 &amp;amp; FireWall-1 Management (Version 4.x, obsolete)&lt;br /&gt;
- Protocol for communInternal Certificate Authority between SmartConsole applInternal Certificate Authority's and the management server&lt;br /&gt;
&lt;br /&gt;
259 /tcp FW1_clntauth, FW1_clntauth_telnet Check Point VPN-1 &amp;amp; FireWall-1 Client AuthentInternal Certificate Authority (Telnet)&lt;br /&gt;
- Protocol for performing Client-AuthentInternal Certificate Authority at gateway using telnet&lt;br /&gt;
&lt;br /&gt;
259 /udp RDP Check Point VPN-1 FWZ Key Negotiations - Reliable Datagram Protocol&lt;br /&gt;
- Protocol used for FWZ VPN (supported up to NG FP1 only)&lt;br /&gt;
- Protocol used by SecuRemote/SCl for checking the availability of the gateway/PS&lt;br /&gt;
&lt;br /&gt;
260 /udp FW1_snmp Check Point SNMP Agent&lt;br /&gt;
- Check Point's SNMP, used additionally to 161/udp (snmp)&lt;br /&gt;
&lt;br /&gt;
261 /tcp FW1_snauth Check Point Session AuthentInternal Certificate Authority&lt;br /&gt;
- Protocol for Session AuthentInternal Certificate Authority between gateway and SAA&lt;br /&gt;
&lt;br /&gt;
262 /tcp - not predefined - only internally used by Mail Dequerer (process: mdq)&lt;br /&gt;
&lt;br /&gt;
264 /tcp FW1_topo Check Point VPN-1 SecuRemote Topology Requests&lt;br /&gt;
- Topology Download for SecuRemote (build 4100 and higher) and SCl&lt;br /&gt;
&lt;br /&gt;
265 /tcp FW1_key Check Point VPN-1 Public Key Transfer Protocol&lt;br /&gt;
- Protocol for exchanging CA- and DH-keys between management servers (SKIP, FWZ (4.x))&lt;br /&gt;
- Public Key download for SecuRemote/SecureClient&lt;br /&gt;
&lt;br /&gt;
900 /tcp FW1_clntauth, FW1_clntauth_http Check Point Client AuthentICA (HTTP)&lt;br /&gt;
- Protocol for performing Client-AuthentICA at gateway using HTTP&lt;br /&gt;
&lt;br /&gt;
981 /tcp - not predefined - Check Point UTM-1 Edge remote administration from external using HTTPS&lt;br /&gt;
&lt;br /&gt;
2746 /udp VPN1_IPSEC_encapsulation SecuRemote IPSEC Transport Encapsulation Protocol&lt;br /&gt;
- Default-Protocol used for UDP encapsulation&lt;br /&gt;
&lt;br /&gt;
4532 / tcp - not predefined - only internally used by Session AuthentICA (in.asessiond)&lt;br /&gt;
&lt;br /&gt;
5004 /udp MetaIP-UAT Check Point Meta IP UAM Client-Server Comanagement serverunInternal Certificate Authority&lt;br /&gt;
&lt;br /&gt;
8116 /udp - not predefined - Check Point Cluster Control Protocol&lt;br /&gt;
- Protocol for communICA between High Availability Cluster Members. Used for e.g. report/query state, probing, load balancing&lt;br /&gt;
&lt;br /&gt;
8989 /tcp - not predefined - only internally used by Customer Management Add-on for Session Authentication&lt;br /&gt;
&lt;br /&gt;
9281 /udp SWTP_Gateway VPN-1 Embedded / SofaWare Management Server (SMS) &lt;br /&gt;
- Encrypted Protocol for comanagement serverunICA between management server and Check Point Appliance (e.g. VPN-1 Edge)&lt;br /&gt;
&lt;br /&gt;
9282 /udp SWTP_SMS VPN-1 Embedded / SofaWare Management Server (SMS)&lt;br /&gt;
- Encrypted Protocol for comanagement serverunICA between management server and Check Point Appliance (e.g. VPN-1 Edge)&lt;br /&gt;
&lt;br /&gt;
18181 /tcp FW1_cvp Check Point OPSEC Content Vectoring Protocol&lt;br /&gt;
- Protocol used for comanagement serverunICA between gateway and AntiVirus Server&lt;br /&gt;
&lt;br /&gt;
18182 /tcp FW1_ufp Check Point OPSEC URL Filtering Protocol&lt;br /&gt;
- Protocol used for comanagement serverunICA between gateway and Server for Content Control (e.g. Web Content)&lt;br /&gt;
&lt;br /&gt;
18183 /tcp FW1_sam Check Point OPSEC Suspicious Activity Monitor API&lt;br /&gt;
- Protocol e.g. for Block Intruder between management server (or CMA) and gateway&lt;br /&gt;
&lt;br /&gt;
18184 /tcp FW1_lea Check Point OPSEC Log Export API&lt;br /&gt;
- Protocol for exporting logs from management server&lt;br /&gt;
&lt;br /&gt;
18185 /tcp FW1_omi Check Point OPSEC Objects Management Interface&lt;br /&gt;
- Protocol used by applICA's having access to the ruleset saved at management server&lt;br /&gt;
&lt;br /&gt;
18186 /tcp FW1_omi-sic Check Point OPSEC Objects Management Interface with Secure Internal Communication (SIC)&lt;br /&gt;
- Protocol used by applICA's having access to the ruleset saved at management server&lt;br /&gt;
&lt;br /&gt;
18187 /tcp FW1_ela Check Point OPSEC Event Logging API&lt;br /&gt;
- Protocol for applICA's logging to the gateway log at management server&lt;br /&gt;
&lt;br /&gt;
18190 /tcp CPMI Check Point Management Interface&lt;br /&gt;
- Protocol used for communicatopn ICA between the SmartConsole and the SmartCenter/SecurityManagement Server.&lt;br /&gt;
- Protocol for connections from Multi-Domain GUI to MDS and CMA&lt;br /&gt;
&lt;br /&gt;
18191 /tcp CPD Check Point Daemon Protocol&lt;br /&gt;
- Download of rulebase from management server to gateway&lt;br /&gt;
- Fetching rulebase, from gateway to management server when starting gateway&lt;br /&gt;
- Download of rulebase from CMA/MDS to gateway&lt;br /&gt;
- Fetching rulebase, from gateway to CMA when starting gateway&lt;br /&gt;
&lt;br /&gt;
18192 /tcp CPD_amon Check Point Internal ApplCA Monitoring&lt;br /&gt;
- Protocol for getting System Status, from management server or CMA/MDS to gateway&lt;br /&gt;
&lt;br /&gt;
18193 /tcp FW1_amon Check Point OPSEC ApplInternal Certificate Authority Monitoring&lt;br /&gt;
- Protocol for monitoring apps, e.g. from management server to CVP server&lt;br /&gt;
&lt;br /&gt;
18202 /tcp CP_rtm Check Point RTM Log&lt;br /&gt;
- Protocol used by Real Time Monitor (SmartView Monitor)&lt;br /&gt;
&lt;br /&gt;
18205 /tcp CP_reporting Check Point Reporting client&lt;br /&gt;
- Protocol used by Reporting client when connecting to Reporting Server (management server)&lt;br /&gt;
&lt;br /&gt;
18207 /tcp FW1_pslogon Check Point Policy Server Logon protocol&lt;br /&gt;
- Protocol used for download of Desktop Security from the Policy Server to SecureClient (4.x)&lt;br /&gt;
&lt;br /&gt;
18208 /tcp FW1_CPRID Check Point Remote Installation Protocol&lt;br /&gt;
- Protocol used from management server to gateway when installing Secure Updates.&lt;br /&gt;
&lt;br /&gt;
18209 /tcp - not predefined - Protocol used in SIC for communication between the management server, containing the Internal Certificate Authority (ICA) and objects, such as gateways and OPSEC applications, managed by the management sever&lt;br /&gt;
&lt;br /&gt;
18210 /tcp FW1_Internal Certificate Authority_pull Check Point ICA Pull&lt;br /&gt;
- Protocol used by SIC for e.g. gateway pulling certificates from a management server&lt;br /&gt;
&lt;br /&gt;
18211 /tcp FW1_Internal Certificate Authority_push Used to push certificates from the ICA.&lt;br /&gt;
- Protocol used by SIC for pushing CA's from management server or CMA/MDS to gateway&lt;br /&gt;
&lt;br /&gt;
18212 /udp FW1_load_agent Check Point ConnectControl Load Agent&lt;br /&gt;
- Default-Port for Load Agent running on load-balanced Servers (e.g. WWW, FTP)&lt;br /&gt;
&lt;br /&gt;
18221 /tcp CP_redundant Check Point Redundant Management Protocol&lt;br /&gt;
- Protocol used for synchronizing primary and secondary management server&lt;br /&gt;
- Protocol used for synchronizing CMA between primary and secondary MDS&lt;br /&gt;
&lt;br /&gt;
18231 /tcp FW1_pslogon_NG Check Point NG Policy Server Logon protocol (NG)&lt;br /&gt;
- Protocol used for download of Desktop Security from the Policy Server to SecureClient&lt;br /&gt;
&lt;br /&gt;
18232 /tcp FW1_sds_logon Check Point SecuRemote Distribution Server Protocol&lt;br /&gt;
- Protocol for software distribution of Check Point components&lt;br /&gt;
&lt;br /&gt;
18233 /udp FW1_scv_keep_alive Check Point SecureClient VerifICA KeepAlive Protocol&lt;br /&gt;
- Protocol for Secure Configuration VerifICA on SecureClient&lt;br /&gt;
&lt;br /&gt;
18234 /udp tunnel_test Check Point tunnel testing ICA&lt;br /&gt;
- Protocol for testing ICA through VPN, used by SecuRemote/SecureClient&lt;br /&gt;
&lt;br /&gt;
18241 /udp E2ECP Check Point End to End Control Protocol&lt;br /&gt;
- Protocol to check SLA's defined in Virtual Links by SmartView Monitor&lt;br /&gt;
&lt;br /&gt;
18262 /tcp CP_Exnet_PK Check Point Extrnet public key advertisement&lt;br /&gt;
- Protocol for exchange of public keys when configuring Extranet&lt;br /&gt;
not supported since NG AI R55&lt;br /&gt;
&lt;br /&gt;
18263 /tcp CP_Exnet_resolve Check Point Extranet remote objects resolution&lt;br /&gt;
- Protocol for importing exported objects from partner in Extranet&lt;br /&gt;
not supported since NG AI R55&lt;br /&gt;
&lt;br /&gt;
18264 /tcp FW1_Internal Certificate Authority_services Check Point ICA Fetch CRL and User Registration Services&lt;br /&gt;
- Protocol for Certificate Revocation Lists and registering users when using the Policy Server&lt;br /&gt;
- needed when e.g. gateway is starting&lt;br /&gt;
&lt;br /&gt;
18265 /tcp FW1_Internal Certificate Authority_mgmt_tools Check Point ICA Management Tools&lt;br /&gt;
- Protocol for managing the ICA, also used for central administration of Internal Certificate Authority on the management server.&lt;br /&gt;
- needs to be started separately with the comanagement server and cpca_client&lt;br /&gt;
&lt;br /&gt;
19190 /tcp FW1_netso Check Point User Authority simple protocol&lt;br /&gt;
- Protocol used for UserAuthority for connecting from the UserAuthority Server to the Web Plugin when authenticating using certificates generated by the ICA&lt;br /&gt;
&lt;br /&gt;
19191 /tcp FW1_uaa Check Point OPSEC User Authority API&lt;br /&gt;
- Protocol for connections to the UserAuthority Server&lt;br /&gt;
&lt;br /&gt;
19194 /udp CP_SecureAgent-udp SecureAgent Authentication ICA service&lt;br /&gt;
&lt;br /&gt;
19195 /udp CP_SecureAgent-udp SecureAgent Authentication tICA service&lt;br /&gt;
&lt;br /&gt;
60709 /tcp - not predefined - Internally used by SecurePlatform for web based system administration (process: cpwmd). Bound to localhost, so no remote connect is possible.&lt;br /&gt;
&lt;br /&gt;
65524 /tcp FW1_sds_logon_NG Check Point SecuRemote Distribution Server Protocol&lt;br /&gt;
- Protocol for software distribution of Check Point components in Next Generation Additionally defined:&lt;br /&gt;
Internet Protocol 17 (tunnel_test_mapped), tunnel testing for a module performing the tunnel test&lt;br /&gt;
Internet Protocol 94 (FW1_Encapsulation), Check Point VPN-1 SecuRemote FWZ Encapsulation Protocol&lt;br /&gt;
Internet Protocol 112 (Virtual Router Redundancy Protocol), HA for IPSO - since NG AI&lt;br /&gt;
&lt;br /&gt;
[[category:check point]]&lt;/div&gt;</summary>
		<author><name>Nighthawk</name></author>	</entry>

	</feed>