<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Emulation failure &amp;quot;Gzip exceeded maximum decompression ratio&amp;quot; in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-failure-quot-Gzip-exceeded-maximum/m-p/258763#M50748</link>
    <description>&lt;P&gt;I waited a few days with my answer to test the change. Apparently, it was precisely the function that was causing the issue, but the "Inspect compressed HTTP traffic" option wasn't selected (for whatever reason). Since selecting the option and increasing the limit, the messages in log-Files have disappeared and the websites load perfectly. Thank you so much!&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2025 08:25:27 GMT</pubDate>
    <dc:creator>lraaicfdb</dc:creator>
    <dc:date>2025-10-02T08:25:27Z</dc:date>
    <item>
      <title>Threat Emulation failure "Gzip exceeded maximum decompression ratio"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-failure-quot-Gzip-exceeded-maximum/m-p/258589#M50714</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;our security gateway is currently blocking Google pages from time to time. Threat emulation is stopping traffic with the error: HTTP parsing error occurred - Gzip exceeded maximum decompression ratio.&lt;/P&gt;&lt;P&gt;However, gzip is excluded in the Threat Emulation Blade. Can someone explain the error to me? What decompression ratio are we talking about here?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 15:29:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-failure-quot-Gzip-exceeded-maximum/m-p/258589#M50714</guid>
      <dc:creator>lraaicfdb</dc:creator>
      <dc:date>2025-09-30T15:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation failure "Gzip exceeded maximum decompression ratio"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-failure-quot-Gzip-exceeded-maximum/m-p/258594#M50716</link>
      <description>&lt;P&gt;gzip in Threat Emulation refers to files with .gz.&lt;BR /&gt;What this is referring to is the gzip compression that web servers sometimes do as part of the HTTP connection.&lt;/P&gt;
&lt;P&gt;HTTP Parsing Errors are usually triggered by specific inspection settings.&lt;BR /&gt;There appears to be one for this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31582i5BEB07F123F292AE/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I don't believe disabling this option is a good idea.&lt;BR /&gt;I would check with TAC here.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2025 15:55:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-failure-quot-Gzip-exceeded-maximum/m-p/258594#M50716</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-30T15:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation failure "Gzip exceeded maximum decompression ratio"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-failure-quot-Gzip-exceeded-maximum/m-p/258763#M50748</link>
      <description>&lt;P&gt;I waited a few days with my answer to test the change. Apparently, it was precisely the function that was causing the issue, but the "Inspect compressed HTTP traffic" option wasn't selected (for whatever reason). Since selecting the option and increasing the limit, the messages in log-Files have disappeared and the websites load perfectly. Thank you so much!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2025 08:25:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-failure-quot-Gzip-exceeded-maximum/m-p/258763#M50748</guid>
      <dc:creator>lraaicfdb</dc:creator>
      <dc:date>2025-10-02T08:25:27Z</dc:date>
    </item>
  </channel>
</rss>

