<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inspection Settings Behavior in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263363#M51725</link>
    <description>&lt;P&gt;Just put the exception then from the log, bro. There is usually an option there.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Nov 2025 22:13:25 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-11-20T22:13:25Z</dc:date>
    <item>
      <title>Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263238#M51677</link>
      <description>&lt;P&gt;Hello Team.&lt;/P&gt;
&lt;P&gt;Is traffic blocked by the “Inspection Settings” feature in Check Point ‘mandatorily’ labeled as “Inspection Settings” within a LOG?&lt;/P&gt;
&lt;P&gt;I'm providing relevant information from the log to explain my question.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Id: 0a7b5e81-5105-ba02-691d-e64d5dd70000&lt;BR /&gt;Marker: @A@@B@1763566642@C@1516930&lt;BR /&gt;Domain: CMA_MIR&lt;BR /&gt;Time: 2025-11-19T15:46:21Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: bond2.794&lt;BR /&gt;Id Generated By Indexer: false&lt;BR /&gt;First: true&lt;BR /&gt;Sequencenum: 249&lt;BR /&gt;Policy Rule UID: 837284bb-df97-41cd-a8e6-8a8d314623e2&lt;BR /&gt;Sub Policy Name: PQ_MIRNET Network&lt;BR /&gt;Sub Policy Uid: c4bdc336-5d7e-43e4-8bb3-9a07cfb6f724&lt;BR /&gt;&lt;STRONG&gt;Service ID: sip&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Source: 10.11.51.14&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Source Port: 31857&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Destination: 147.219.18.19&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Destination Port: 5060&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;IP Protocol: 17&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Request: 180&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Source IP-phone: 983667441&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Destination Phone Number:51995109913&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;VoIP Call ID: 1f63acc7-d1b3-4b91-a7a6-23f8b0579819&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;VoIP Log Type: Security&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Content Type: VoIP Session&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Inspection Item: Number of retransmissions exceeded the maximum allowed&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Inspection Information: Message exceeded the retransmissions limit&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Severity: Medium&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Performance Impact: Very Low&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Inspection Category: protection&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Inspection Profile: Default Inspection&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: Drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: Log&lt;/STRONG&gt;&lt;BR /&gt;Policy Name: PQ_MIR&lt;BR /&gt;Db Tag: {D25FE155-9792-614A-A674-0FDAD2EE6F55}&lt;BR /&gt;Policy Date: 2025-11-10T18:48:03Z&lt;BR /&gt;Service: UDP/5060&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 65536&lt;BR /&gt;Access Rule Name: VPN_AWS&lt;BR /&gt;Access Rule Number: 90&lt;BR /&gt;Interface: bond2.794&lt;BR /&gt;Description: sip Traffic Dropped from&amp;nbsp;&lt;STRONG&gt;10.11.51.14&lt;/STRONG&gt; to &lt;STRONG&gt;147.219.18.19&lt;/STRONG&gt;&lt;BR /&gt;Blade: IPS, Firewall&lt;/P&gt;
&lt;P&gt;So, my question arises when reviewing the &lt;STRONG&gt;LOG&lt;/STRONG&gt;, as I was sure that within the log there should be a section called &lt;STRONG&gt;“INSPECTION SETTINGS DETAILS”&lt;/STRONG&gt; so that I could “understand” that this traffic block is due to this Check Point feature. but in my case, there is nothing in the log that indicates this section, and the most relevant thing I see is what is highlighted in bold above.&lt;/P&gt;
&lt;P&gt;Does the &lt;STRONG&gt;INSPECTION SETTINGS&lt;/STRONG&gt; functionality focus on all protocols or just some?&lt;/P&gt;
&lt;P&gt;I have searched the IPS Protections for any signature related to this block, but nothing appears. The only thing I found is a “signature” in the INSPECTION SETTINGS section, but since nothing appears in the LOG that mentions &lt;STRONG&gt;“INSPECTION SETTINGS”&lt;/STRONG&gt; I have not given it any importance, but apparently I should&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":expressionless_face:"&gt;😑&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your comments.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 21:13:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263238#M51677</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-11-19T21:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263240#M51679</link>
      <description>&lt;P&gt;This is the trigger for me:&amp;nbsp;&lt;STRONG&gt;Inspection Profile: Default Inspection&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This tells me to check the inspection settings. The default inspection is the name how it is default. You can customize this name to make it more noticeable for you.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When you configure a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;, the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Default Inspection&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;profile is enabled for it. You can also assign the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Recommended Inspection&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;profile to the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;, or to create a custom profile and assign it to the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 21:58:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263240#M51679</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-11-19T21:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263246#M51681</link>
      <description>&lt;P&gt;Is “Inspection Settings” related to IPS?&lt;BR /&gt;Because in the LOG, as you will notice, it details that this traffic MATCHES the Firewall and IPS blades, but it is easy to get “confused” at this point, since no known “signature” appears here to indicate that the blocking problem is due to an IPS engine signature.&lt;BR /&gt;Is my question clear?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 22:30:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263246#M51681</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-11-19T22:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263260#M51682</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;Its not related to IPS. Inspection settings are more related to protocol compliance and deep packet inspection, while IPS is more related to blocking malicious threaths and exploits.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 01:23:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263260#M51682</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-20T01:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263264#M51684</link>
      <description>&lt;P&gt;Good day!&lt;/P&gt;&lt;P&gt;The inspection settings can be found in the following way:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Click on the Manage tab in SmartConsole.&lt;/LI&gt;&lt;LI&gt;Click on Blades tab from there&lt;/LI&gt;&lt;LI&gt;Then click on General -&amp;gt; Inspection Settings.&lt;/LI&gt;&lt;LI&gt;Then you can use Search to find an inspection "Maximum Allowed Retransmissions"&lt;/LI&gt;&lt;LI&gt;Select "SIP Maximum Allowed Retransmissions"&lt;/LI&gt;&lt;LI&gt;Edit the Inspection&lt;/LI&gt;&lt;LI&gt;Click on Advanced&lt;/LI&gt;&lt;LI&gt;Set a desired number of retransmissions&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;You can also make the inspection Inactive in "General Properties" instead tuning the value in&amp;nbsp;"Advanced"&lt;/P&gt;&lt;P&gt;As an option you can also add an Exception these types of Inspections if you go to "Exceptions" at step 4 instead of going to "Search".&lt;/P&gt;&lt;P&gt;Please, find the screenshot below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Inspection Settings_edit.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32158iE854B66CC251A83B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Inspection Settings_edit.png" alt="Inspection Settings_edit.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 06:44:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263264#M51684</guid>
      <dc:creator>Gennady</dc:creator>
      <dc:date>2025-11-20T06:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263267#M51685</link>
      <description>&lt;P&gt;Inspection Settings are enforced by the IPS blade part of the software, even though it's not configured in there (anymore...) and you don't need IPS enabled or licensed to enforce them.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 08:25:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263267#M51685</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-11-20T08:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263360#M51724</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;So, if I don't have IPS enabled and the INSPECTION SETTINGS function blocks traffic, can it still be “marked” in the LOG as if it were the IPS BLADE that is blocking the traffic?&lt;BR /&gt;Based on your comment, I understand that this functionality is closely linked to the IPS blade, correct?&lt;BR /&gt;Cheers &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 21:51:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263360#M51724</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-11-20T21:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263363#M51725</link>
      <description>&lt;P&gt;Just put the exception then from the log, bro. There is usually an option there.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 22:13:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263363#M51725</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-20T22:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263373#M51728</link>
      <description>&lt;P&gt;Yes it will still say IPS on the log card.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 02:24:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263373#M51728</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2025-11-21T02:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: Inspection Settings Behavior</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263376#M51730</link>
      <description>&lt;P&gt;I suppose that would make sense Emma, since IPS is blade and inspection settings are slightly unrelated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 02:37:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inspection-Settings-Behavior/m-p/263376#M51730</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-21T02:37:23Z</dc:date>
    </item>
  </channel>
</rss>

