<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS question in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114022#M21341</link>
    <description>&lt;P&gt;thanks for the reply - two great questions.&lt;/P&gt;&lt;P&gt;we have the typical MITM https inspection for outgoing traffic, but not for incoming and there is no IPS protection triggered for the pen tester's connection.&amp;nbsp; The web programmer doesn't know of anything in his code (cold fusion) or IIS that would do the 5 attempt lockout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Mar 2021 20:48:53 GMT</pubDate>
    <dc:creator>D_TK</dc:creator>
    <dc:date>2021-03-18T20:48:53Z</dc:date>
    <item>
      <title>IPS question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114017#M21339</link>
      <description>&lt;P&gt;Hi - wondering if IPS can prevent this from occurring.&amp;nbsp; We host a few public facing websites behind an R80.40 gateway.&amp;nbsp; Most of the recommended IPS defs are enabled, but we recently got dinged on an external pen test.&lt;/P&gt;&lt;P&gt;This is what the pen tester is able to do (he's referring to the CP gateway as the "WAF"):&lt;/P&gt;&lt;P&gt;"Finding #2 – IP Spoofing Web Application Firewall Bypass – It is still possible to bypass the WAF blocks by adding the “X-Forwarded-For” Header to the POST request and iterating the last octet for 127.0.0.x. Without the “X-Forwarded-For” header, I am blocked after 5 attempts. After adding, I could continue without the WAF hindering me indefinitely."&lt;/P&gt;&lt;P&gt;This is referring to a login screen over https.&lt;/P&gt;&lt;P&gt;Any ideas would be greatly appreciated..&amp;nbsp; thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maskedImage.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11053iCA4D5C5F9C85FF38/image-size/large?v=v2&amp;amp;px=999" role="button" title="maskedImage.jpg" alt="maskedImage.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 20:00:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114017#M21339</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2021-03-18T20:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPS question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114021#M21340</link>
      <description>&lt;P&gt;Do you have HTTPS Inspection enabled?&lt;BR /&gt;Also when it is dropped after 5 attempts without the XFF header, is a specific IPS protection triggering?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 20:24:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114021#M21340</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-18T20:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPS question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114022#M21341</link>
      <description>&lt;P&gt;thanks for the reply - two great questions.&lt;/P&gt;&lt;P&gt;we have the typical MITM https inspection for outgoing traffic, but not for incoming and there is no IPS protection triggered for the pen tester's connection.&amp;nbsp; The web programmer doesn't know of anything in his code (cold fusion) or IIS that would do the 5 attempt lockout.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 20:48:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114022#M21341</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2021-03-18T20:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPS question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114025#M21342</link>
      <description>&lt;P&gt;Until you've enabled HTTPS Inspection for inbound traffic to the relevant server, there's really nothing for us to do here as we cannot see the XFF header, much less take any action upon it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 21:54:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114025#M21342</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-18T21:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPS question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114046#M21343</link>
      <description>&lt;P&gt;Thanks - that's what i figured, but wanted to ask.&amp;nbsp; So....I imported the cert for this site, and created an inbound inspection rule to that server with me as the only source for testing.&amp;nbsp; on just the home page about ten sql injection prevents were triggered just because file names had an "or" in it.&amp;nbsp; Here's an example&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="maskedImage.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11054i404DB6B28BD61138/image-size/large?v=v2&amp;amp;px=999" role="button" title="maskedImage.jpg" alt="maskedImage.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The server sql-injection setting is "low" - does this seem crazy aggressive?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Mar 2021 03:46:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114046#M21343</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2021-03-19T03:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPS question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114118#M21350</link>
      <description>&lt;P&gt;The "Low" in this case refers to performance impact of the protection.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Mar 2021 21:19:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114118#M21350</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-19T21:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPS question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114166#M21356</link>
      <description>&lt;P&gt;Just to follow up on what Phoneboy said, the Performance Impact rating specifies how enabling that particular signature will impact SecureXL acceleration on the firewall.&amp;nbsp; Here is a rough guide taken my my IPS Immersion self-guided video series:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;The Performance Impact rating specifies the level of CPU processing overhead for the gateway enforcing this protection. Gaia embedded appliances (models 1200R–1500) or smaller Check Point gateway appliances will be much more heavily impacted by High and Critical–level IPS Protections than larger gateways.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;BR /&gt;• &lt;STRONG&gt;Critical&lt;/STRONG&gt; – 100% of traffic subject to inspection by this Protection is ineligible for acceleration by SecureXL and will take the slowpath (F2F) through a R80.10 or earlier gateway. (We will cover IPS performance extensively in Module 10)&lt;BR /&gt;• &lt;STRONG&gt;High&lt;/STRONG&gt; – Traffic inspected by this Protection will be inspected ~50% in the non–accelerated slowpath (F2F) and CPASXL path, and ~50% in the partially–accelerated Medium Path (PXL).&lt;BR /&gt;• &lt;STRONG&gt;Medium&lt;/STRONG&gt; – 100% of traffic subject to inspection by this Protection will be handled in the partially–accelerated Medium Path (PXL) on the gateway.&lt;BR /&gt;• &lt;STRONG&gt;Very Low/Low&lt;/STRONG&gt; – Protection is fully accelerated in the fastpath by SecureXL.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Mar 2021 13:47:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-question/m-p/114166#M21356</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-03-21T13:47:45Z</dc:date>
    </item>
  </channel>
</rss>

