<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Syslog packets dropped by IPS in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Syslog-packets-dropped-by-IPS/m-p/174340#M29131</link>
    <description>&lt;P&gt;Hi mates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a problem with the IPS. I have configured the SMS to send logs to a SIEM server, and the IPS started blocking the syslog packets. So I added an exception defining the source, destination and service, and I tried with "Apply on the matched rule" and "Add to global exception group (apply on all rules)", and neither of them works, I still see this logs:&lt;/P&gt;&lt;P&gt;[Expert@fw1:0]# fw ctl zdebug + drop | grep "192.168.1.8"&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;/P&gt;&lt;P&gt;I have only seen this post with no solution&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Threat-Prevention/fw-spii-execute-inspections-Reason-spii-inspection-matrix-drop/td-p/30071" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Threat-Prevention/fw-spii-execute-inspections-Reason-spii-inspection-matrix-drop/td-p/30071&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Julián&lt;/P&gt;</description>
    <pubDate>Fri, 10 Mar 2023 11:17:08 GMT</pubDate>
    <dc:creator>fjulianom</dc:creator>
    <dc:date>2023-03-10T11:17:08Z</dc:date>
    <item>
      <title>Syslog packets dropped by IPS</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Syslog-packets-dropped-by-IPS/m-p/174340#M29131</link>
      <description>&lt;P&gt;Hi mates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a problem with the IPS. I have configured the SMS to send logs to a SIEM server, and the IPS started blocking the syslog packets. So I added an exception defining the source, destination and service, and I tried with "Apply on the matched rule" and "Add to global exception group (apply on all rules)", and neither of them works, I still see this logs:&lt;/P&gt;&lt;P&gt;[Expert@fw1:0]# fw ctl zdebug + drop | grep "192.168.1.8"&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;BR /&gt;@;1786452969;[vs_0];[tid_1];[fw4_1];fw_log_drop_ex: Packet proto=17 192.168.100.132:9271 -&amp;gt; 192.168.1.8:514 dropped by fw_spii_execute_inspections Reason: spii inspection matrix drop;&lt;/P&gt;&lt;P&gt;I have only seen this post with no solution&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Threat-Prevention/fw-spii-execute-inspections-Reason-spii-inspection-matrix-drop/td-p/30071" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Threat-Prevention/fw-spii-execute-inspections-Reason-spii-inspection-matrix-drop/td-p/30071&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Julián&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 11:17:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Syslog-packets-dropped-by-IPS/m-p/174340#M29131</guid>
      <dc:creator>fjulianom</dc:creator>
      <dc:date>2023-03-10T11:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: Syslog packets dropped by IPS</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Syslog-packets-dropped-by-IPS/m-p/174415#M29132</link>
      <description>&lt;P&gt;What is the precise log card for this?&lt;BR /&gt;Please post with sensitive data redacted.&lt;/P&gt;
&lt;P&gt;In any case, you can try and disable the "Cisco IOS IPv4 Denial of Service" protection as mentioned here:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk61542" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk61542&lt;/A&gt;&lt;BR /&gt;Otherwise, I recommend a TAC case.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 23:53:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Syslog-packets-dropped-by-IPS/m-p/174415#M29132</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-10T23:53:03Z</dc:date>
    </item>
  </channel>
</rss>

