<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic how to block tcp traffic which has source port number from 1 to 1024 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130345#M19143</link>
    <description>&lt;P&gt;Hi, I would like to ask for best way to block all incomming traffic which has tcp source port in range from 1 to 1024 and destination port is any on external interface? Source IP is any, destination IP can be SG public IP. Thank you&lt;/P&gt;</description>
    <pubDate>Mon, 27 Sep 2021 13:20:04 GMT</pubDate>
    <dc:creator>renegad</dc:creator>
    <dc:date>2021-09-27T13:20:04Z</dc:date>
    <item>
      <title>how to block tcp traffic which has source port number from 1 to 1024</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130345#M19143</link>
      <description>&lt;P&gt;Hi, I would like to ask for best way to block all incomming traffic which has tcp source port in range from 1 to 1024 and destination port is any on external interface? Source IP is any, destination IP can be SG public IP. Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 13:20:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130345#M19143</guid>
      <dc:creator>renegad</dc:creator>
      <dc:date>2021-09-27T13:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: how to block tcp traffic which has source port number from 1 to 1024</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130472#M19178</link>
      <description>&lt;P&gt;You’d have to create a service of type Other to o that, which allows you to enter in an INSPECT expression.&lt;BR /&gt;Some samples of INSPECT syntax are in point 7 here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30583&amp;amp;partition=Basic&amp;amp;product=Cluster" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30583&amp;amp;partition=Basic&amp;amp;product=Cluster&lt;/A&gt;&lt;BR /&gt;I believe the correct expression would be: tcp, sport&amp;lt;=1024&lt;/P&gt;
&lt;P&gt;That said, last I checked, INSPECT services disable SecureXL templates at that rule and for all rules below.&lt;BR /&gt;However, that may not be the case in R80.20 and above.&lt;BR /&gt;Meaning: this has a potential performance impact.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 15:36:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130472#M19178</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-28T15:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: how to block tcp traffic which has source port number from 1 to 1024</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130551#M19185</link>
      <description>&lt;P&gt;Pretty sure using the source port as a matching criteria will disable rule templating even in the latest releases, as SecureXL is not able to mask/ignore the source port for accept template calculations.&amp;nbsp; Services specifying custom INSPECT code are also very likely to have all their traffic handled in F2F/slowpath, although I haven't checked for this in the latest releases and it may be possible to reinject that traffic back into SecureXL after the initial rule matching in F2F is complete.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 11:57:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130551#M19185</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-09-29T11:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: how to block tcp traffic which has source port number from 1 to 1024</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130552#M19186</link>
      <description>&lt;P&gt;Second that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 11:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130552#M19186</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-09-29T11:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: how to block tcp traffic which has source port number from 1 to 1024</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130570#M19187</link>
      <description>&lt;P&gt;You shouldn't need to use INSPECT. I just tried this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@LabSC:0]# mgmt_cli -r true login &amp;gt; session.txt
[Expert@LabSC:0]# mgmt_cli -s session.txt --format json add service-tcp name lowSources source-port 1-1024 port 1-65535
{
  "uid" : "ab4ec7b3-cffe-4b5b-9fa1-77b6ac8fe65a",
  "name" : "lowSources",
  "type" : "service-tcp",
  "domain" : {...},
  "port" : "1-65535",
  "source-port" : "1-1024",
  "match-by-protocol-signature" : false,
  "override-default-settings" : false,
  "session-timeout" : 3600,
  "use-default-session-timeout" : true,
  "match-for-any" : false,
  "sync-connections-on-cluster" : true,
  "aggressive-aging" : {...},
  "keep-connections-open-after-policy-installation" : false,
  "groups" : [ ],
  "comments" : "",
  "color" : "black",
  "icon" : "Services/TCPService",
  "tags" : [ ],
  "meta-info" : {...},
  "read-only" : true
}&lt;/LI-CODE&gt;
&lt;P&gt;Then you add a rule for that service telling the firewall to drop traffic which matches it.&lt;/P&gt;
&lt;P&gt;The SecureXL concerns are still present, but at least it's not an especially unusual service object.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 13:46:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130570#M19187</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-09-29T13:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: how to block tcp traffic which has source port number from 1 to 1024</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130581#M19188</link>
      <description>&lt;P&gt;Probably a better way to do it actually.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 14:58:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/how-to-block-tcp-traffic-which-has-source-port-number-from-1-to/m-p/130581#M19188</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-29T14:58:33Z</dc:date>
    </item>
  </channel>
</rss>

