<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Gateway and Management logs in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145083#M22654</link>
    <description>&lt;P&gt;Were these log references for port 1027 in the "source port" field?&amp;nbsp; If so you have have nothing to worry about, the ICKiller trojan used a fixed port of 1027 in the distant past.&amp;nbsp; What happened is TCP on the initiating system chose source port 1027 from the ephemeral range of 1024-65535 for a new TCP connection, and it happened to match the included service object ICKiller.&amp;nbsp; What you are seeing in the log is a simple mapping from a port number to a name, not an indicator of compromise.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Mar 2022 16:45:05 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-03-30T16:45:05Z</dc:date>
    <item>
      <title>Gateway and Management logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145041#M22647</link>
      <description>&lt;P&gt;We use multiple checkpoint gateways ... we have times where we try to decode the logging entries.&lt;/P&gt;&lt;P&gt;We had recent log entries, which stated that a server has used network communication on port 1027(ICKiller).&lt;/P&gt;&lt;P&gt;A Windows Trojan!! &lt;A href="https://threatwiki.checkpoint.com/threatwiki/public.htm" target="_blank" rel="noopener"&gt;https://threatwiki.checkpoint.com/threatwiki/public.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Now the research on the Server using an Antivirus - tool could not find any suspected infection.&lt;/P&gt;&lt;P&gt;According to checkpoint are the security gateways detects suspicious communication based on signature inside the packet. Is that the case even when Antivirus Blade is not active? Is the default Intrusion Detection System able accurately to identify threats&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 10:57:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145041#M22647</guid>
      <dc:creator>Sajenthiran_Mic</dc:creator>
      <dc:date>2022-03-30T10:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway and Management logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145050#M22649</link>
      <description>&lt;P&gt;I had seen this before, so my educated guess is that those threats are detected properly even when AV is not on, but I will let someone from CP give you an official statement / answer.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 11:53:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145050#M22649</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-30T11:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway and Management logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145083#M22654</link>
      <description>&lt;P&gt;Were these log references for port 1027 in the "source port" field?&amp;nbsp; If so you have have nothing to worry about, the ICKiller trojan used a fixed port of 1027 in the distant past.&amp;nbsp; What happened is TCP on the initiating system chose source port 1027 from the ephemeral range of 1024-65535 for a new TCP connection, and it happened to match the included service object ICKiller.&amp;nbsp; What you are seeing in the log is a simple mapping from a port number to a name, not an indicator of compromise.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 16:45:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145083#M22654</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-30T16:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway and Management logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145143#M22741</link>
      <description>&lt;P&gt;How do we destingushe between a simple source port mapping instant and a real issue? based on the Firewall logs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 13:39:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145143#M22741</guid>
      <dc:creator>Sajenthiran_Mic</dc:creator>
      <dc:date>2022-03-31T13:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway and Management logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145149#M22744</link>
      <description>&lt;P&gt;What about the log entry led you to believe there was a problem?&lt;/P&gt;
&lt;P&gt;Just the name in the Service field? If so, find the service object and disable "Match for Any", or delete the object. You could also disable name resolution before using the logs.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 14:06:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145149#M22744</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-03-31T14:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway and Management logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145150#M22745</link>
      <description>&lt;P&gt;Not much you can ascertain based on that simple firewall log.&lt;BR /&gt;Threat Prevention logs may be more actionable.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 14:10:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-and-Management-logs/m-p/145150#M22745</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-03-31T14:10:47Z</dc:date>
    </item>
  </channel>
</rss>

