<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Preventing TLS 1.0 to a specific destination IP in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166974#M27770</link>
    <description>&lt;P&gt;So If I understood the question correctly you are intercepting the inbound https traffic using certificate and have put source as any in your https inspection rule? Then why not go for WAF or something - That way you will get granular inspection.&lt;/P&gt;&lt;P&gt;I always have taken this approach and for my inbound servers have deployed the waf. Nowa days I am using Appsec with Nginx instead of intercepting inbound traffic.&lt;/P&gt;</description>
    <pubDate>Sat, 07 Jan 2023 04:45:56 GMT</pubDate>
    <dc:creator>Blason_R</dc:creator>
    <dc:date>2023-01-07T04:45:56Z</dc:date>
    <item>
      <title>Preventing TLS 1.0 to a specific destination IP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166568#M27738</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;We have a scenario where one of our external facing web servers is showing to support TLS 1.0 and 1.1 despite disabling this locally on the server. The reason seems to be because HTTPS inspection is used on the Checkpoint firewall with this server, and the firewall is enabling it.&lt;/P&gt;&lt;P&gt;I did see&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Disable-TLS-1-0/m-p/70338#M14237" target="_self"&gt;THIS&lt;/A&gt;&amp;nbsp;previous checkmates post which shows how to set the minimum supported SSL version globally with the GuiDBedit tool, however this would obviously prevent ALL TLS 1.0 connections. We only want to prevent it to this specific server.&lt;/P&gt;&lt;P&gt;Also&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk126613&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank" rel="noopener"&gt;sk126613&lt;/A&gt;&amp;nbsp;shows how to disable specific ciphers, but this is for the whole gateway, again impacting ALL TLS connections.&lt;/P&gt;&lt;P&gt;One method we thought for sure would work was creating an IPS exception for TLS 1.0 &amp;amp; 1.1 with the action set to Prevent with the server destination IP. But this unfortunately did not work, the exception isn't triggered, the signature seemingly isn't identified.&lt;/P&gt;&lt;P&gt;We also noticed there are default objects in smartconsole named tls1.0 and tls1.1, we tried creating a standard firewall rule (also in the Application policy) to block this tls traffic destined to the server IP. But we found it blocked ALL https traffic (the objects seemingly match against tcp/443)&lt;/P&gt;&lt;P&gt;I was wondering if any of you guys had any other ideas of things we could try?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 12:13:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166568#M27738</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-01-03T12:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing TLS 1.0 to a specific destination IP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166629#M27751</link>
      <description>&lt;P&gt;I'm guessing this service won't work the way you expect until you enable the Protocol Signature for it:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 601px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18988i7B3565EB1ACA2421/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Push policy after making this change.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2023 22:50:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166629#M27751</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-03T22:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing TLS 1.0 to a specific destination IP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166941#M27769</link>
      <description>&lt;P&gt;Thank you, I did try this but unfortunately the TLS1.0 protocol still shows to be supported when testing.&lt;/P&gt;&lt;P&gt;I noticed that I could however still access the server on HTTPS, so it seemingly isn't blocking all HTTPS traffic as the rule did previously before enabling this setting. But the rule isn't showing to be blocking anything either in it's traffic logs.&lt;/P&gt;&lt;P&gt;I did try placing the rule as both a Network and Application rule to ensure both policies enforced this (Application blade is enabled).&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2023 14:45:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166941#M27769</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-01-06T14:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing TLS 1.0 to a specific destination IP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166974#M27770</link>
      <description>&lt;P&gt;So If I understood the question correctly you are intercepting the inbound https traffic using certificate and have put source as any in your https inspection rule? Then why not go for WAF or something - That way you will get granular inspection.&lt;/P&gt;&lt;P&gt;I always have taken this approach and for my inbound servers have deployed the waf. Nowa days I am using Appsec with Nginx instead of intercepting inbound traffic.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Jan 2023 04:45:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/166974#M27770</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-01-07T04:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing TLS 1.0 to a specific destination IP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/174259#M29105</link>
      <description>&lt;P&gt;Hi all, apologies I forgot to update this sooner with the resolution. So we had the global IPS expectation in place to prevent TLS 1.0 &amp;amp; 1.1 traffic destined for our target web servers, however the traffic was still being permitted.&lt;/P&gt;&lt;P&gt;It turns out that the default profile behavior for the TLS 1.0 and 1.1 protections is "inactive". We changed this to "Detect" for the specific profile, and then the prevent exception became active and began blocking the TLS traffic.&amp;nbsp;Which makes sense, having the protection set to "Inactive" essentially turns the protection off I guess, so any exception you make using the protection won't be enforced.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 15:39:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/174259#M29105</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-03-09T15:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: Preventing TLS 1.0 to a specific destination IP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/174260#M29106</link>
      <description>&lt;P&gt;Thanks, we have been looking into WAF products, it does seem like this type of solution would be more suitable to be honest.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 15:40:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Preventing-TLS-1-0-to-a-specific-destination-IP/m-p/174260#M29106</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-03-09T15:40:50Z</dc:date>
    </item>
  </channel>
</rss>

