<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS traffic in DETECT mode in VSX in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255212#M49955</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/82839"&gt;@Matlu&lt;/a&gt;&amp;nbsp;did you enabled "Malware DNS trap"-feature?&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk74060" target="_blank"&gt;sk74060 - Anti-Virus Malware DNS Trap feature&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The DNS reply is modified with the trap IP and all connections to that IP will be blocked. The initial DNS-request is allowed but with this you can identify the client which is requesting the malicious site.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Aug 2025 08:29:56 GMT</pubDate>
    <dc:creator>Wolfgang</dc:creator>
    <dc:date>2025-08-15T08:29:56Z</dc:date>
    <item>
      <title>DNS traffic in DETECT mode in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255178#M49947</link>
      <description>&lt;P&gt;Hello, Mates&lt;/P&gt;
&lt;P&gt;I have a problem with Threat Prevention.&lt;/P&gt;
&lt;P&gt;I have a VSX cluster with several VSs.&lt;BR /&gt;One of my VSs has the TP layer (AV/AB/IPS) enabled, the VS does not have &lt;STRONG&gt;HTTPS Inspection&lt;/STRONG&gt; enabled, and it is working with a default rule in the TP layer with the “Optimized” profile.&lt;/P&gt;
&lt;P&gt;The problem is that there are many logs with &lt;STRONG&gt;“Detect”&lt;/STRONG&gt; action even though the profile detail is in &lt;STRONG&gt;PREVENT&lt;/STRONG&gt; mode.&lt;/P&gt;
&lt;P&gt;The logs invite us to review SK74120, but the problem arises when we apply the SK, because when we change the DNS “&lt;STRONG&gt;behavior&lt;/STRONG&gt;” to &lt;STRONG&gt;HOLD&lt;/STRONG&gt; mode following the SK instructions, we affect many other services, such as sending/receiving emails that pass through this VS.&lt;/P&gt;
&lt;P&gt;The TAC is investigating the possible root cause of this problem, since the goal is for this traffic to be prevented and not just labeled as DETECT.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;In VSX environments, how does traffic flow inspection work?&lt;/STRONG&gt; Does traffic that crosses through a VS that has Internet access and has the TP layer enabled always have to pass through the VS0 as well, and only then is this traffic sent to ThreatCloud for review?&lt;/P&gt;
&lt;P&gt;Thank you for your opinions.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2025 22:26:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255178#M49947</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-08-14T22:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic in DETECT mode in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255187#M49950</link>
      <description>&lt;P&gt;To confirm you implemented&amp;nbsp;sk92224 which triggered/caused the degradation? &lt;BR /&gt;Latency is expected here but you can try tuning the relevant cache size perhaps.&lt;/P&gt;
&lt;P&gt;The "traffic" does not traverse VS0. The Gateway itself will source related DNS / RAD requests from VS0 however.&lt;BR /&gt;I'll quote historic&amp;nbsp;&lt;SPAN&gt;sk113084 as it describes in the "cause" section how this can be problematic in some scenarios.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Note also the following previous fixes:&lt;/P&gt;
&lt;TABLE id="filter1Table" class="TableStyle-TP_Table_Jumbo_Fixes" cellspacing="0"&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Release_Date" data-mc-pattern="8"&gt;
&lt;TD colspan="3" class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_ID-Release_Date"&gt;
&lt;P&gt;&lt;STRONG&gt;Take 43&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Released on 8 January 2024&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_ID-Grey_Background"&gt;
&lt;P&gt;PRJ-48847,&lt;BR /&gt;PMTR-88858&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_Product-Grey_Background"&gt;
&lt;P&gt;Threat Prevention&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_Description-Grey_Background"&gt;
&lt;P&gt;Anti-Virus Blade triggers the "Detect" logs for DNS traffic, although these malicious DNS requests were prevented.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="TableStyle-TP_Table_Jumbo_Fixes-Body-Grey_Background"&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_ID-Grey_Background"&gt;
&lt;P&gt;PRJ-48973,&lt;BR /&gt;PRHF-30090&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyE-Column_Style_Product-Grey_Background"&gt;
&lt;P&gt;Anti-Virus&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Jumbo_Fixes-BodyD-Column_Style_Description-Grey_Background"&gt;
&lt;P&gt;When Anti-Virus DNS classification is set to Hold mode, the first DNS trap log of malicious Domains shows "Detect" in the Action field, although the connection was successfully blocked.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 00:18:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255187#M49950</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-15T00:18:46Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic in DETECT mode in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255189#M49951</link>
      <description>&lt;P&gt;The log you've provided is for DNS.&lt;BR /&gt;A typical DNS transaction involves only two packets: the lookup request and the response.&lt;BR /&gt;A grand total of two UDP packets.&lt;/P&gt;
&lt;P&gt;When running in Background mode, the determination about maliciousness is made after the client receives the response in most cases.&lt;BR /&gt;This is why the log is flagged as Detect and is expected behavior.&lt;BR /&gt;To prevent, in this case, you have to use Hold mode, though it has issues, as you've described.&lt;/P&gt;
&lt;P&gt;This isn't specific to VSX.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 00:13:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255189#M49951</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-08-15T00:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic in DETECT mode in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255203#M49953</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;What is the best solution for these cases where Threat Prevention with its blades practically does not act preventively against traffic that should be blocked?&lt;/P&gt;
&lt;P&gt;Should the parameter be changed?&lt;/P&gt;
&lt;P&gt;This change recommended in the SK has not helped us because on the contrary, it has given us more problems with legitimate traffic.&lt;/P&gt;
&lt;P&gt;So, if for example DNS traffic is not blocked, but you need it to be blocked, at least those queries to malicious domains, what can be done here?&lt;/P&gt;
&lt;P&gt;Look for other alternatives within what Check Point's solution offers?&lt;/P&gt;
&lt;P&gt;Use blocking by other blades, or use blocking by IoC, etc?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 07:16:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255203#M49953</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-08-15T07:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic in DETECT mode in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255208#M49954</link>
      <description>&lt;P&gt;As indicated you can try manipulation of the cache size / investigate with TAC but some latency is expected.&lt;/P&gt;
&lt;P&gt;You can also review based on the topology if the control is suitable here or should be enforced elsewhere by a different / separate gateway.&lt;/P&gt;
&lt;P&gt;Lastly you could explore secure DNS resolvers, be those the ones available in Harmony SASE for DNS filtering or other options.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 07:56:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255208#M49954</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-15T07:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic in DETECT mode in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255212#M49955</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/82839"&gt;@Matlu&lt;/a&gt;&amp;nbsp;did you enabled "Malware DNS trap"-feature?&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk74060" target="_blank"&gt;sk74060 - Anti-Virus Malware DNS Trap feature&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The DNS reply is modified with the trap IP and all connections to that IP will be blocked. The initial DNS-request is allowed but with this you can identify the client which is requesting the malicious site.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 08:29:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255212#M49955</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2025-08-15T08:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: DNS traffic in DETECT mode in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255261#M49956</link>
      <description>&lt;P&gt;The issue you are experiencing with DNS not being "prevented" is because it requires Hold mode to eliminate, as explained previously.&lt;BR /&gt;Every other vendor would require a similar configuration.&lt;/P&gt;
&lt;P&gt;Implementing DNS Trap (as mentioned elsewhere) would certainly help with the number of these messages.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2025 21:55:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-traffic-in-DETECT-mode-in-VSX/m-p/255261#M49956</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-08-15T21:55:27Z</dc:date>
    </item>
  </channel>
</rss>

