<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block SSH over non standard port in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211364#M40079</link>
    <description>&lt;P&gt;maybe protocol signature needed?&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2024 08:11:33 GMT</pubDate>
    <dc:creator>CheckPointerXL</dc:creator>
    <dc:date>2024-04-16T08:11:33Z</dc:date>
    <item>
      <title>Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/209653#M40078</link>
      <description>&lt;P&gt;Hi team&lt;BR /&gt;Is there a way to&amp;nbsp;Block SSH&amp;nbsp; over proxy on non standard port on R81.20?&lt;BR /&gt;Pre R81 we had a IPS protection "SSH over non standard ports" that was blocking this access however it seems like R81 onwards this protection is no longer supported as per attached picture&lt;BR /&gt;Looking forward to your reply&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2024 03:06:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/209653#M40078</guid>
      <dc:creator>salil_arora</dc:creator>
      <dc:date>2024-03-28T03:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211364#M40079</link>
      <description>&lt;P&gt;maybe protocol signature needed?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 08:11:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211364#M40079</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-04-16T08:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211371#M40080</link>
      <description>&lt;P&gt;If you define a rule for incoming SSH traffic on port 22, all other SSH could be dropped. If you know the used port, you could also use the procedure to configure DPI from&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ThreatPrevention_AdminGuide/Topics-TPG/Using-SSH-Inspection.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ThreatPrevention_AdminGuide/Topics-TPG/Using-SSH-Inspection.htm&lt;/A&gt; :&lt;/P&gt;
&lt;TABLE class="TableStyle-TP_Table_Dark_Header_and_Pattern" style="mc-table-style: url('../Resources/TableStyles/TP_Table_Dark_Header_and_Pattern.css');" cellspacing="0"&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-White_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-White_Background"&gt;
&lt;P&gt;1&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-White_Background"&gt;
&lt;P&gt;In &lt;SPAN class="mc-variable Vars_Other.tp_con variable"&gt;SmartConsole&lt;/SPAN&gt;, from the right panel, select &lt;SPAN class="Menu_Options"&gt;Objects&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="Menu_Options"&gt;Services&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-Grey_Background"&gt;
&lt;P&gt;2&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-Grey_Background"&gt;
&lt;P&gt;Right-click on the &lt;SPAN class="Menu_Options"&gt;TCP&lt;/SPAN&gt;, and then choose &lt;SPAN class="Menu_Options"&gt;NEW TCP&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Dark_Header_and_Pattern-Body-White_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyE-Column_Style-White_Background"&gt;
&lt;P&gt;3&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Dark_Header_and_Pattern-BodyD-Column_Style-White_Background"&gt;
&lt;P&gt;Enter a name for the new TCP service:&lt;/P&gt;
&lt;OL style="list-style-type: lower-alpha;"&gt;
&lt;LI value="1"&gt;
&lt;P&gt;Select &lt;SPAN class="Menu_Options"&gt;General&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="Menu_Options"&gt;Protocol&lt;/SPAN&gt; as &lt;SPAN class="Menu_Options"&gt;SSH2&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI value="2"&gt;
&lt;P&gt;Choose &lt;SPAN class="Menu_Options"&gt;Match By&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="Menu_Options"&gt;Customize to new port&lt;/SPAN&gt;, and then set the port.&lt;/P&gt;
&lt;P&gt;For example, &lt;CODE&gt;22222&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;Now add a rule to block this traffic and install policy.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 09:40:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211371#M40080</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-16T09:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211438#M40081</link>
      <description>&lt;P&gt;This IPS protection should not be necessary if you strictly control ports used for outbound communication.&lt;BR /&gt;Having said that, R80 protections should also work in R81.x releases.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 15:49:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211438#M40081</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-04-16T15:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211459#M40086</link>
      <description>&lt;P&gt;It sounds to me like the question is mostly "How do we prevent ports we intentionally allow out for other protocols from being used for SSH tunneling instead?". I don't know of a good option, particularly on ports which don't have a predefined service object with a protocol signature.&lt;/P&gt;
&lt;P&gt;For example, let's say some vendor tells me I need to connect to their application over port 12345, and that it uses a binary protocol rather than HTTP or HTTPS. I can't use HTTPS Inspection to intercept TLS and verify it's really HTTP inside, since it isn't expected to be. There's not a predefined service object for port 12345 or for this vendor's binary protocol, so I can't enforce a given protocol signature on all traffic over the port.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 17:47:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211459#M40086</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-04-16T17:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211532#M40102</link>
      <description>&lt;P data-unlink="true"&gt;Thank you for this information, will give this is a go!&lt;BR /&gt;Appreciate your help&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 17 Apr 2024 02:15:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211532#M40102</guid>
      <dc:creator>salil_arora</dc:creator>
      <dc:date>2024-04-17T02:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211533#M40103</link>
      <description>&lt;P&gt;Thank you for the information PhoneBoy&lt;BR /&gt;The IPS protection "SSH over non standard Ports" has been depreciated and no longer works on R81.x(as per attached screenshot)&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 02:17:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211533#M40103</guid>
      <dc:creator>salil_arora</dc:creator>
      <dc:date>2024-04-17T02:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211534#M40104</link>
      <description>&lt;P&gt;Thank you for sharing your information,appreciate it&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 02:18:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211534#M40104</guid>
      <dc:creator>salil_arora</dc:creator>
      <dc:date>2024-04-17T02:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211596#M40120</link>
      <description>&lt;P&gt;Are you simply going by what it says on that screen or did you actually try to use this protection and it failed?&lt;BR /&gt;As I said, R80 protections work on R81.&lt;BR /&gt;If you're concerned if it's supported or not, TAC will likely confirm it is.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 12:40:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211596#M40120</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-04-17T12:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211678#M40144</link>
      <description>&lt;P&gt;We have seen an example where we could SSH on non standard port(8080) despite of having this IPS protection which made us believe this IPS protection doesn't work on gateways running R81.20&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 03:55:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211678#M40144</guid>
      <dc:creator>salil_arora</dc:creator>
      <dc:date>2024-04-18T03:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Block SSH over non standard port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211728#M40155</link>
      <description>&lt;P&gt;Is it something you can easily reproduce?&lt;BR /&gt;That's worthy of a TAC case, as it confirmation about whether this signature is supported:&amp;nbsp;&lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 12:50:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-SSH-over-non-standard-port/m-p/211728#M40155</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-04-18T12:50:17Z</dc:date>
    </item>
  </channel>
</rss>

