<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB inspection  in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SMB-inspection/m-p/9883#M1342</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;sk101606&amp;nbsp; SMB/CIFS traffic by Anti-Virus blade or Threat Emulation blade. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;I am talking about restricting access for a specific path&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;the topology is:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp;APP&amp;nbsp;server on DMZ ----&amp;gt; Check Point R80.10 cluster ----&amp;gt; File Server&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;The connection between the APP Server on the DMZ to the file server is via SMB. the App is accessing a specific directory on the file server and pulling files.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;we tested it with CIFS resource but:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;1. CIFS Resource doesn't work in R80.10 (&lt;SPAN style="color: #000000; font-size: 14px;"&gt;&lt;STRONG&gt;sk110519&lt;/STRONG&gt; -&amp;nbsp;&amp;nbsp;&lt;SPAN style="background-color: #ffffff;"&gt;When configuring a rule with CIFS resource, policy enforcement does not work as expected and is denied to access all the permitted CIFS shares.&amp;nbsp;As a result, all CIFS traffic is dropped.&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PRHF-612,&lt;/SPAN&gt;&lt;BR style="background-color: #ffffff;" /&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PMTR-12889,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PMTR-17086,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PMTR-17087 )&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 14px;"&gt;2. CIFS resources disable SecureXL accept templates&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 14px;"&gt;Any other idea on how to restrict SMB access to a specific path on the file server via Check Point gateway will be very&amp;nbsp;helpful&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Oct 2018 19:10:33 GMT</pubDate>
    <dc:creator>Shahar_Grober</dc:creator>
    <dc:date>2018-10-25T19:10:33Z</dc:date>
    <item>
      <title>SMB inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMB-inspection/m-p/9881#M1340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gurus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to inspect access to specific shares using SMB on R80.10&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is there a resource for SMB as there is a resource for CIFS which allow creating a rule with access only to specific share&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from what I have&amp;nbsp;checked, CIFS resource is working with&amp;nbsp;&amp;nbsp;microsoft-ds service which uses port 445 which is the same as SMB. is this equivalent configuration to SMB inspection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72263_pastedImage_1.png" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know what the performance implication of enabling it on a security policy rule (does it disable SecureXL)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone point out how to configure it (documentation/SK)?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2018 22:17:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMB-inspection/m-p/9881#M1340</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2018-10-24T22:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: SMB inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMB-inspection/m-p/9882#M1341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've never tried but there is an SK for activating inspection (AV, &amp;amp; TE) on SMB : sk101606&lt;/P&gt;&lt;P&gt;You have to do that with Guibdedit, not in the smart console.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Benoit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 15:30:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMB-inspection/m-p/9882#M1341</guid>
      <dc:creator>Benoit_Verove</dc:creator>
      <dc:date>2018-10-25T15:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: SMB inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SMB-inspection/m-p/9883#M1342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;sk101606&amp;nbsp; SMB/CIFS traffic by Anti-Virus blade or Threat Emulation blade. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;I am talking about restricting access for a specific path&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;the topology is:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp;APP&amp;nbsp;server on DMZ ----&amp;gt; Check Point R80.10 cluster ----&amp;gt; File Server&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;The connection between the APP Server on the DMZ to the file server is via SMB. the App is accessing a specific directory on the file server and pulling files.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;we tested it with CIFS resource but:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;1. CIFS Resource doesn't work in R80.10 (&lt;SPAN style="color: #000000; font-size: 14px;"&gt;&lt;STRONG&gt;sk110519&lt;/STRONG&gt; -&amp;nbsp;&amp;nbsp;&lt;SPAN style="background-color: #ffffff;"&gt;When configuring a rule with CIFS resource, policy enforcement does not work as expected and is denied to access all the permitted CIFS shares.&amp;nbsp;As a result, all CIFS traffic is dropped.&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PRHF-612,&lt;/SPAN&gt;&lt;BR style="background-color: #ffffff;" /&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PMTR-12889,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PMTR-17086,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff;"&gt;PMTR-17087 )&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 14px;"&gt;2. CIFS resources disable SecureXL accept templates&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 14px;"&gt;Any other idea on how to restrict SMB access to a specific path on the file server via Check Point gateway will be very&amp;nbsp;helpful&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 19:10:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SMB-inspection/m-p/9883#M1342</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2018-10-25T19:10:33Z</dc:date>
    </item>
  </channel>
</rss>

