<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Content awareness for SFTP in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203205#M38233</link>
    <description>&lt;P&gt;Customer has developed an SFTP application which destinated to a specific external IP of the Check Point firewall. They wanted to allow only that SFTP and Block all other SFTP applications.&lt;BR /&gt;&lt;BR /&gt;Through the SFTP they wanted all limited number of file types&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jan 2024 11:46:08 GMT</pubDate>
    <dc:creator>maddah87</dc:creator>
    <dc:date>2024-01-16T11:46:08Z</dc:date>
    <item>
      <title>Content awareness for SFTP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203180#M38227</link>
      <description>&lt;P&gt;Need to check the possibility to inspect content on SFTP connection.&lt;/P&gt;&lt;P&gt;R81.20 admin guide doesn't show SFTP as supported protocols.&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Content-Awareness-Blade.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Content-Awareness-Blade.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;the exact requirement as below.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Cx has a utility Which opens a web app in customer local machine and pass the file through the SFTP to Cx's side and it connecting to the server that located in DMZ.&lt;/LI&gt;&lt;LI&gt;Requirement is to only allow such legitimate traffic and any other traffic from SFTP client tools should be disabled.&lt;/LI&gt;&lt;LI&gt;It is encrypted with Cx’s public key and to be decrypted by the firewall and inspect the content too.&lt;/LI&gt;&lt;LI&gt;Through the sftp tunnel limited file types should be allowed and any other types should be restricted.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 16 Jan 2024 08:03:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203180#M38227</guid>
      <dc:creator>maddah87</dc:creator>
      <dc:date>2024-01-16T08:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness for SFTP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203186#M38228</link>
      <description>&lt;P&gt;Currently&amp;nbsp;&lt;SPAN&gt;SSH Deep Packet Inspection (which can inspect inside an SFTP connection) only supports&amp;nbsp; Anti-Virus, IPS and Threat Emulation. What are the criteria for knowing which traffic is legitimate?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/Content/Topics-TPG/Using-SSH-Inspection_Custom.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/Content/Topics-TPG/Using-SSH-Inspection_Custom.htm&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 08:36:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203186#M38228</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-01-16T08:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness for SFTP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203205#M38233</link>
      <description>&lt;P&gt;Customer has developed an SFTP application which destinated to a specific external IP of the Check Point firewall. They wanted to allow only that SFTP and Block all other SFTP applications.&lt;BR /&gt;&lt;BR /&gt;Through the SFTP they wanted all limited number of file types&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 11:46:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203205#M38233</guid>
      <dc:creator>maddah87</dc:creator>
      <dc:date>2024-01-16T11:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness for SFTP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203219#M38237</link>
      <description>&lt;P&gt;I just enabled content awareness in the lab, but dont really see much related to sftp at all.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 13:41:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203219#M38237</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-16T13:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness for SFTP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203280#M38251</link>
      <description>&lt;P&gt;I don't know that we at the network/protocol inspection level have a way of distinguishing specific SFTP applications - they're likely all the same at the protocol level. This might be something that's more suitable to do at the application level, but please do work with your local SE on an RFE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;File types can be blocked with AV or TE blade, which are both supported via SSH DPI, so that you can do today. With AV you can configure the Threat Prevention profile under AV &amp;gt; File Types an action per file type for supported files (bypass, inspect, block) or in TE you can add a list of prohibited file types.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TE:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk123140" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk123140&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 03:04:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203280#M38251</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-01-17T03:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness for SFTP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203460#M38339</link>
      <description>&lt;P&gt;Noted, Informed the SE and got the confirmation that specific requirement is not yet available and not in road map. Will ask to create a RFE&lt;BR /&gt;&lt;BR /&gt;Thanks for the update on the same and will try the mentioned sk.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 10:02:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203460#M38339</guid>
      <dc:creator>maddah87</dc:creator>
      <dc:date>2024-01-18T10:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness for SFTP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203461#M38340</link>
      <description>&lt;P&gt;thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 10:05:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-for-SFTP/m-p/203461#M38340</guid>
      <dc:creator>maddah87</dc:creator>
      <dc:date>2024-01-18T10:05:37Z</dc:date>
    </item>
  </channel>
</rss>

