<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log for IPS but with a Drop rule for exact source IP in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256822#M50328</link>
    <description>&lt;P&gt;Do you see drop on network layer?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Mon, 08 Sep 2025 23:02:26 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-09-08T23:02:26Z</dc:date>
    <item>
      <title>Log for IPS but with a Drop rule for exact source IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256578#M50325</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Im trying to get some info regarding the process of incoming traffic , What blades it follows .&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to Chat if its correct :&amp;nbsp;&lt;/P&gt;&lt;P&gt;For an incoming packet on a Check Point Security Gateway, the blades are typically processed in the following order: first, anti-spoofing and then the Security Policy (which includes Application Control, URL filtering, and Content Inspection). If the connection is accepted, Threat Prevention (including Antivirus, IPS, and other features) is applied. TLS/SSL Inspection may occur before or during the Security Policy inspection depending on configuration.&lt;BR /&gt;Here's a breakdown of the typical order:&lt;BR /&gt;1. Anti-Spoofing:&lt;BR /&gt;The first check is to prevent spoofed IP addresses from entering the network.&lt;BR /&gt;2. Security Policy:&lt;BR /&gt;This is the main set of rules that determines whether traffic is allowed or denied.&lt;BR /&gt;TLS/SSL Inspection (Conditional): If TLS/SSL Inspection is enabled on the gateway, it's applied at this stage, before or during the main security policy inspection.&lt;BR /&gt;Application Control, URL Filtering, Content Inspection: These blades are part of the Security Policy and inspect the traffic for allowed applications, web sites, and specific content.&lt;BR /&gt;3. Threat Prevention:&lt;BR /&gt;If the traffic is accepted by the Security Policy, it then moves to the Threat Prevention stage.&lt;BR /&gt;Antivirus (AV), IPS, etc.: This includes features like Intrusion Prevention System (IPS) and other threat detection and prevention mechanisms.&lt;BR /&gt;Key Considerations&lt;BR /&gt;Configuration Dependent:&lt;BR /&gt;The exact order can vary based on the specific features enabled and how they are configured in your Security Policy and blade settings.&lt;BR /&gt;Firewall Policy:&lt;BR /&gt;The Security Policy is where you define the rules for accepting or blocking traffic based on various criteria.&lt;BR /&gt;f-monitor:&lt;BR /&gt;You can use the fw monitor tool to see the actual inspection points for incoming traffic (e.g., i for pre-inbound, I for post-inbound).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;There is a security Policy with a source IP : dst : Any : all ports drop.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;But we see that IP in the IPS Log with a prevent .&lt;/P&gt;&lt;P&gt;Why would we see this IPS log and not a drop.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2025 12:14:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256578#M50325</guid>
      <dc:creator>Eikkichi</dc:creator>
      <dc:date>2025-09-04T12:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: Log for IPS but with a Drop rule for exact source IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256819#M50326</link>
      <description>&lt;P&gt;To determine the exact reason, please provide a screenshot of the full log card with sensitive details redacted.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 20:52:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256819#M50326</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-08T20:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: Log for IPS but with a Drop rule for exact source IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256822#M50328</link>
      <description>&lt;P&gt;Do you see drop on network layer?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 23:02:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256822#M50328</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-08T23:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: Log for IPS but with a Drop rule for exact source IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256824#M50330</link>
      <description>&lt;P&gt;Is the traffic matching an implied rule?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 23:08:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256824#M50330</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-09-08T23:08:26Z</dc:date>
    </item>
    <item>
      <title>Re: Log for IPS but with a Drop rule for exact source IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256825#M50331</link>
      <description>&lt;P&gt;Good point Chris. Though, as Phoneboy said, we need to see full log, otherwise, its purely guessing.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 08 Sep 2025 23:12:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-IPS-but-with-a-Drop-rule-for-exact-source-IP/m-p/256825#M50331</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-08T23:12:03Z</dc:date>
    </item>
  </channel>
</rss>

