<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Difference between &amp;quot;Protected Scope&amp;quot; and &amp;quot;Destination&amp;quot; in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/134344#M58795</link>
    <description>&lt;P&gt;I would like to know what the official answer is from Check Point.... anyone?&lt;/P&gt;</description>
    <pubDate>Thu, 18 Nov 2021 08:33:37 GMT</pubDate>
    <dc:creator>cosmos</dc:creator>
    <dc:date>2021-11-18T08:33:37Z</dc:date>
    <item>
      <title>Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/29566#M58793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Whats the difference between "Destination" and "Protected Scope" in the Threat Prevention policy and Global Exception rules and when would you use either?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 13:42:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/29566#M58793</guid>
      <dc:creator>Ruben_Starkovsk</dc:creator>
      <dc:date>2018-06-08T13:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/29567#M58794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe "Protected Scope" is used in the Threat Prevention policy to designate an entity that you want protected (i.e. a single host, group of hosts, network, etc...). It is my understanding that this applies the protections in the policy to those nodes whether the malicious traffic is inbound or outbound.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whereas "Destination" would only apply the rule to traffic headed outbound.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 16:30:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/29567#M58794</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2018-06-08T16:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/134344#M58795</link>
      <description>&lt;P&gt;I would like to know what the official answer is from Check Point.... anyone?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 08:33:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/134344#M58795</guid>
      <dc:creator>cosmos</dc:creator>
      <dc:date>2021-11-18T08:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/134409#M58796</link>
      <description>&lt;P&gt;Protected Scope means match/scan all traffic going to/from this object regardless of which way the connection was originally initiated, as generally we don't care about "directionality" for the process of Threat Prevention.&amp;nbsp; We most certainly do care about that in Access Control policies.&lt;/P&gt;
&lt;P&gt;If however the hidden Threat Prevention Source/Destination policy fields are exposed then populated (they both default to Any), you are implying directionality for what you want to scan.&amp;nbsp; So if in your TP policy Source is "net1", Destination is Any, and Protected Scope is Any, only connections initiated from net1 and the replies will match that rule and be scanned via the associated profile.&amp;nbsp; Connections initiated from outside net1 into it will not match that TP rule at all for traffic in both directions.&lt;/P&gt;
&lt;P&gt;I got this question a lot in various classes so here is the coverage of this topic from my 2021 IPS/AV/ABOT Video Series class:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tp_src_dst.png" style="width: 960px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14300i0023D1F4CD02D0B3/image-size/large?v=v2&amp;amp;px=999" role="button" title="tp_src_dst.png" alt="tp_src_dst.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 14:58:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/134409#M58796</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-18T14:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233097#M58797</link>
      <description>&lt;P&gt;Hello Team!&lt;BR /&gt;&lt;BR /&gt;iam not sure if it best practice to open follow up question to very old posts, anyway.&lt;BR /&gt;&lt;BR /&gt;Protected Scope vs SRC and DST in the TP Rulebase.&lt;BR /&gt;Does it have any Peformance implications?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;currently iam working on a performace issue, CIFS traffic over 100Mbit line.&lt;BR /&gt;mostly we achieve 100Mbits throughout, sometimes not.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;we have enabled all blades.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;enabled_blades&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;fw vpn cvpn urlf av appi ips SSL_INSPECT anti_bot content_awareness mon zero_phishing&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;ISP redundancy&lt;/EM&gt; is enabled&lt;BR /&gt;-&amp;gt; kills SXL&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Zones&lt;/EM&gt; are enabled on all interfaces&lt;BR /&gt;-&amp;gt; Kills SXL Templating&lt;BR /&gt;&lt;BR /&gt;TP Profile with AV Deep and and even Archive Scan.&lt;BR /&gt;This are all settings which negatively affects SXL&lt;BR /&gt;ISP Redundancy sets all my traffic in slow path, but i think VPN is not affected by ISP Redundacy, at least i dont see any&amp;nbsp; VPN connections is slow path (checked with&amp;nbsp;fw tab -t connections -z)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we need to test more, but i think settings a policy with Protected Scope does alot harm for performance instead of using SRC &amp;amp; DST. Of Course when using SRC and DST and can narrow down on true use case.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;so what is your performance related experiance Protected Scope VS SRC &amp;amp; DST policies?&lt;BR /&gt;&lt;/STRONG&gt;second:&lt;STRONG&gt;&lt;BR /&gt;Protected Scope in the profile:&lt;BR /&gt;(Yes we enabled all blades and all functions, because We Secure The Internet and pay for it!)&lt;BR /&gt;&lt;/STRONG&gt;setting &lt;EM&gt;&lt;STRONG&gt;Inspect incoming files from the following interface&lt;/STRONG&gt; &lt;/EM&gt;to ALL and&lt;EM&gt;&lt;STRONG&gt; Inspect incoming and outgoing&amp;nbsp; file&lt;/STRONG&gt;&lt;/EM&gt; is almost equel expect the outgoing part. but i think this settings kicks our performace down, even compared to Deep &amp;amp; Archive Scan.&lt;BR /&gt;also our TP Policy is based on SRC &amp;amp; DST and not on Protected Scope. Does this mess up somehow with the profile?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="9.PNG" style="width: 567px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28486i1EC790471897D5C4/image-size/large?v=v2&amp;amp;px=999" role="button" title="9.PNG" alt="9.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;my impression is, when &lt;STRONG&gt;using Protected Scope it is slower, SRC &amp;amp; DST makes it faster.&lt;/STRONG&gt;&lt;BR /&gt;but we need more tests to give it a clear picture.&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;Software is always the latest and greatest, R81.20 HFA84&lt;BR /&gt;3600 (100Mbit line)&amp;nbsp; and 3800 (300Mbit line) appliances&lt;BR /&gt;&lt;BR /&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 11:39:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233097#M58797</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2024-11-19T11:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233162#M58798</link>
      <description>&lt;P&gt;It &lt;EM&gt;&lt;STRONG&gt;might&lt;/STRONG&gt;&lt;/EM&gt; force more traffic into medium path to use Protected Scope, but it seems like the bigger issue is that ISP Redundancy is killing SecureXL.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 18:56:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233162#M58798</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-11-19T18:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233194#M58799</link>
      <description>&lt;P&gt;Using Protected Scope vs. Src/Dst should not directly affect what path traffic ends up in.&amp;nbsp; Using Src and Dst and leaving Protected Scope as Any may subject less traffic to inspection in the Medium Path as Phoneboy mentioned.&lt;/P&gt;
&lt;P&gt;ISP Redundancy does cause all Internet-bound traffic to go F2F/slowpath, but only in Active-Active mode.&amp;nbsp; In Active/Backup mode it does not affect SecureXL.&lt;/P&gt;
&lt;P&gt;Use of Security Zones does not kill templates.&amp;nbsp; I assume you mean by "kill templates" that the output of &lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt; shows that Accept Templates are "enabled" yet the Accelerated Conns percentage displayed by &lt;STRONG&gt;fwaccel stats -s&lt;/STRONG&gt; is zero.&amp;nbsp; This is almost always due to policy construction in that some blade other than just Firewall is enabled in the first layer (ordered layers) or in the top/parent rules (inline layers); it can also be caused by setting "Protocol Signature" on service objects used in the top/first layer of the policy.&amp;nbsp; The new R81.20 command &lt;STRONG&gt;fwaccel templates -R&lt;/STRONG&gt; will give you a detailed diagnosis, "Prevented by Policy" as a reason means one of the situations I just detailed is present in the policy.&lt;/P&gt;
&lt;P&gt;Using deep scan (which invokes Active Streaming and security server process interaction), combined with scanning of SMB/CIFS traffic which tends to be high-speed internal traffic, combined with scanning all files in all directions is the fastest way to kill the firewall possible.&amp;nbsp; Archive Scanning is acceptable, deep scanning outside of a lab is not.&amp;nbsp; In theory deep scanning might catch certain evasion situations that the passive streaming approach might miss, but the resulting overhead of deep scanning is well in excess of any supposed security benefit gained in my opinion.&lt;/P&gt;
&lt;P&gt;Use &lt;STRONG&gt;fwaccel conns&lt;/STRONG&gt; to see what path a connection is in, lack of an "S" (streaming) flag means it is fastpath.&amp;nbsp; If "S" flag is present run the&amp;nbsp;&lt;STRONG&gt;fw_mux&lt;/STRONG&gt; or &lt;STRONG&gt;fw_streaming&lt;/STRONG&gt; commands to see if the connection is Passive Streaming or Active Streaming.&amp;nbsp; If the connection does not show up at all in &lt;STRONG&gt;fwaccel conns&lt;/STRONG&gt; at all, it is slowpath so use &lt;STRONG&gt;fw tab -t connections -z&lt;/STRONG&gt; to see these connections and the reason they are slowpath.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 03:59:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233194#M58799</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-11-20T03:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233380#M58800</link>
      <description>&lt;P&gt;Hello Timothy,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;thank you very much for your comprehensive summary.&lt;BR /&gt;regarding the usage of zones and SXL, i mean the usage Zones does not allow the creation of Drop Templates,&amp;nbsp;&lt;SPAN&gt;sk131793.&lt;BR /&gt;&lt;/SPAN&gt;The Kernel Parameter in this SK never worked for me.&lt;BR /&gt;I saw situations when a storm of dropped packets sent powerful firewalls to its knees because of the lack of Drop Templates (at least i think thats what happened) because Zones were used on the interfaces. Reason was wrongly configured MS Teams Mass event which triggered millions of point to point connections between all participants &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;when checking this:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="23.PNG" style="width: 671px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28516iEE363A3C731F3252/image-size/large?v=v2&amp;amp;px=999" role="button" title="23.PNG" alt="23.PNG" /&gt;&lt;/span&gt;&lt;BR /&gt;what is &lt;EM&gt;&lt;STRONG&gt;MISP&lt;/STRONG&gt;&lt;/EM&gt;? perhaps ISP Redundancy?&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;NON TCP/UDP PROTO&lt;/STRONG&gt;&lt;/EM&gt;, maybe ESP?&lt;BR /&gt;and this "&lt;EM&gt;&lt;STRONG&gt;Set Security Zone Out Interface Failed&lt;/STRONG&gt;&lt;/EM&gt;" just 2%, but what is failing here?&lt;BR /&gt;&lt;BR /&gt;we ran through all those commands, fw_mux and fw_streaming to analyze the traffic, since we want to use the whole battery of protections, and scan it to the maximum, we suffer from inconsistent throughput.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 10:04:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233380#M58800</guid>
      <dc:creator>Thomas_Eichelbu</dc:creator>
      <dc:date>2024-11-21T10:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between "Protected Scope" and "Destination"</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233408#M58801</link>
      <description>&lt;P&gt;MISP stands for Multiple ISP, which suggests ISP Redundancy.&lt;BR /&gt;Non TCP/UDP is just that: traffic that isn’t TCP or UDP that passes the gateway (this traffic is not accelerated by SecureXL).&lt;BR /&gt;This could be ESP traffic that doesn’t terminate on the gateway, for instance.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 13:28:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Difference-between-quot-Protected-Scope-quot-and-quot/m-p/233408#M58801</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-11-21T13:28:04Z</dc:date>
    </item>
  </channel>
</rss>

