<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS Tunneling IPS in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122870#M56050</link>
    <description>&lt;P&gt;A large number of specific types of queries will trigger the DNS Tunneling protection.&lt;BR /&gt;Unfortunately, we do not publicly share the precise details of how we enforce this protection.&lt;/P&gt;</description>
    <pubDate>Sat, 03 Jul 2021 04:27:55 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-07-03T04:27:55Z</dc:date>
    <item>
      <title>DNS Tunneling IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122723#M56049</link>
      <description>&lt;P&gt;I understand the basics of what DNS tunneling is and have recently enabled this IPS protection in our Threat Prevention Profile. What I have been unable to find is exactly how this IPS protection actually works. What is it doing and looking for to stop a DNS tunnel?&lt;/P&gt;&lt;P&gt;Secondarily I would like to know how to test this but first need to know what this protection is doing in order to accomplish that.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Goose&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jul 2021 13:41:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122723#M56049</guid>
      <dc:creator>Goose</dc:creator>
      <dc:date>2021-07-01T13:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122870#M56050</link>
      <description>&lt;P&gt;A large number of specific types of queries will trigger the DNS Tunneling protection.&lt;BR /&gt;Unfortunately, we do not publicly share the precise details of how we enforce this protection.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 04:27:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122870#M56050</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-03T04:27:55Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122881#M56051</link>
      <description>&lt;P&gt;I understand and that makes some sense. Can you point me toward and one particular way that I could test that it is indeed working? I recall seeing in one post (granted it was a particular upgrade scenario) that it was not working. I would just like to be able to trigger and verify. Thank you.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 14:02:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122881#M56051</guid>
      <dc:creator>Goose</dc:creator>
      <dc:date>2021-07-03T14:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122882#M56052</link>
      <description>&lt;P&gt;Nothing I can share publicly.&lt;BR /&gt;Recommend reaching out to your local Check Point SE.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 15:30:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122882#M56052</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-03T15:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122906#M56053</link>
      <description>&lt;P&gt;You can try dns2tcp tool in Kali Linux to test it: &lt;A href="https://tools.kali.org/maintaining-access/dns2tcp" target="_blank"&gt;https://tools.kali.org/maintaining-access/dns2tcp&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I am not sure how many packets it should see to be triggered though.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 12:35:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122906#M56053</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-07-04T12:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: DNS Tunneling IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122909#M56054</link>
      <description>&lt;P&gt;Thank you Vladimir. I will try and let you know.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 13:29:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/DNS-Tunneling-IPS/m-p/122909#M56054</guid>
      <dc:creator>Goose</dc:creator>
      <dc:date>2021-07-04T13:29:27Z</dc:date>
    </item>
  </channel>
</rss>

