<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: No prevent option in IPS signature in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25362#M58869</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you configure User Defined Alerts, you can timeout connections that meet the criteria for the Host Port Scan IPS signature:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SK110873 - How to configure Security Gateway to detect and prevent port scan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 May 2018 17:14:21 GMT</pubDate>
    <dc:creator>Kyle_Danielson</dc:creator>
    <dc:date>2018-05-23T17:14:21Z</dc:date>
    <item>
      <title>No prevent option in IPS signature</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25358#M58865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;We have only Detect option available for “Host Port Scan” category so we can’t prevent this from our IPS rules. We cannot block the source that ip is being used as nat ip (public ip from another branch) for many users .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;If we don't have option to prevent can we have a TCP session limit for the source IP from the user pool ? If it can be done, what the procedure?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;Sagar Manandhar&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 13:40:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25358#M58865</guid>
      <dc:creator>Sagar_Manandhar</dc:creator>
      <dc:date>2018-05-23T13:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: On detect option in IPS signature</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25359#M58866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sagar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the source of scans is NATed by the Check Point gateway itself, you should still be able to to identify it by the actual IP and treat its traffic in IPS whichever way you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is being NATed by other device before hitting the Check Point, the best course of action will be to exempt CP GW from it's scanner's configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Incidentally, do you have a stealth rule configured in your policy?&lt;/P&gt;&lt;P&gt;What, if any effect does it have on this traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 14:27:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25359#M58866</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-05-23T14:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: No prevent option in IPS signature</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25360#M58867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, it not the checkpoint IP. We have been using different public ip in different branches. it comming from there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 15:42:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25360#M58867</guid>
      <dc:creator>Sagar_Manandhar</dc:creator>
      <dc:date>2018-05-23T15:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: No prevent option in IPS signature</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25361#M58868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then either configure the scanner exemptions or their scopes.&lt;/P&gt;&lt;P&gt;Alternatively, at the branch in question you can play with ACLs to only allow necessary traffic to predetermined scopes from the original source IP, but it may prove labor intensive.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 17:04:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25361#M58868</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-05-23T17:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: No prevent option in IPS signature</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25362#M58869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you configure User Defined Alerts, you can timeout connections that meet the criteria for the Host Port Scan IPS signature:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SK110873 - How to configure Security Gateway to detect and prevent port scan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 17:14:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-prevent-option-in-IPS-signature/m-p/25362#M58869</guid>
      <dc:creator>Kyle_Danielson</dc:creator>
      <dc:date>2018-05-23T17:14:21Z</dc:date>
    </item>
  </channel>
</rss>

