<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic gprs protocol issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/gprs-protocol-issue/m-p/132547#M19655</link>
    <description>&lt;P&gt;good morning,&lt;BR /&gt;this morning I noticed a certain alert in the logs. the log that I show below with the respective firewall rule, points out to me that anyone who uses a tcp protocol of any type with the certain range of open ports can enter that server. is there a way to block access to the tcp-gprs protocol only? or is it possible to limit communications from certain ssid? also, did I correctly interpret what happened in that log? the alert simply warned me that someone used the kerberos protocol, right? any advice is welcome, thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Catrtgrtgtura.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14067i88AF14CC35F9BB3B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Catrtgrtgtura.PNG" alt="Catrtgrtgtura.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 25 Oct 2021 13:02:53 GMT</pubDate>
    <dc:creator>fabiofabio</dc:creator>
    <dc:date>2021-10-25T13:02:53Z</dc:date>
    <item>
      <title>gprs protocol issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/gprs-protocol-issue/m-p/132547#M19655</link>
      <description>&lt;P&gt;good morning,&lt;BR /&gt;this morning I noticed a certain alert in the logs. the log that I show below with the respective firewall rule, points out to me that anyone who uses a tcp protocol of any type with the certain range of open ports can enter that server. is there a way to block access to the tcp-gprs protocol only? or is it possible to limit communications from certain ssid? also, did I correctly interpret what happened in that log? the alert simply warned me that someone used the kerberos protocol, right? any advice is welcome, thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Catrtgrtgtura.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14067i88AF14CC35F9BB3B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Catrtgrtgtura.PNG" alt="Catrtgrtgtura.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Oct 2021 13:02:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/gprs-protocol-issue/m-p/132547#M19655</guid>
      <dc:creator>fabiofabio</dc:creator>
      <dc:date>2021-10-25T13:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: gprs protocol issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/gprs-protocol-issue/m-p/132548#M19656</link>
      <description>&lt;P&gt;Are you using default CP service or did you end up creating custom one? The reason I ask is because with custom service, you can choose the actual protocol and if you select none, then it should not do regular inspection for that service, like it normally would.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Oct 2021 13:08:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/gprs-protocol-issue/m-p/132548#M19656</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-10-25T13:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: gprs protocol issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/gprs-protocol-issue/m-p/132594#M19661</link>
      <description>&lt;P&gt;do you mean the tcp_gprs service that you see in the screen? I created a new one with a range of ports&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 07:40:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/gprs-protocol-issue/m-p/132594#M19661</guid>
      <dc:creator>fabiofabio</dc:creator>
      <dc:date>2021-10-26T07:40:40Z</dc:date>
    </item>
  </channel>
</rss>

