<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fail Mode in Threat Prevention settings - good idea to change to fail-close? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Fail-Mode-in-Threat-Prevention-settings-good-idea-to-change-to/m-p/186694#M31190</link>
    <description>&lt;P&gt;A previous similar discussion was had here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Threat-Prevention/IPS-Connection-accepted-But-why/td-p/136294" target="_blank"&gt;https://community.checkpoint.com/t5/Threat-Prevention/IPS-Connection-accepted-But-why/td-p/136294&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Yes fail-close is more secure.&lt;/P&gt;
&lt;P&gt;Which gateway version and hotfix is used, if it's already current I would follow-up with TAC to investigate further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jul 2023 12:52:14 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2023-07-18T12:52:14Z</dc:date>
    <item>
      <title>Fail Mode in Threat Prevention settings - good idea to change to fail-close?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Fail-Mode-in-Threat-Prevention-settings-good-idea-to-change-to/m-p/186685#M31187</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I noticed in our IPS logs many "Accept" events, from Internet traffic accessing our DMZ systems. Opening the logs, in forensic details it shows:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;"HTTP parsing error detected. Bypassing the request as defined in the Inspection Settings."&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;And the precise error as:&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;EM&gt;"illegal startline in request"&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;I do not totally understand this error, and whether it should be a cause for concern. To me it sounds like the firewall couldn't properly inspect the traffic and so defaults to accept? But as I understand, it "Accepts" this due to the fail mode being set to "Fail-open" as is default. (Setting found in: Manage &amp;amp; settings --&amp;gt; Blades --&amp;gt; Threat Prevention --&amp;gt; Advanced Settings)&lt;/P&gt;&lt;P&gt;Is it a better practice to change this to Fail-close, would this prevent traffic like above instead of accepting? Is there a log filter to identify exactly what traffic this would block?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate any feedback you can offer, maybe some of you guys have changed to Fail-close and know of any risk?&amp;nbsp;&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Allow all connections (Fail-open)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- All connections are allowed in a situation of engine overload or failure (default).&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Block all connections (Fail-close)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- All connections are blocked in a situation of engine overload or failure.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;To me this sounds like it could be a security risk, if threat prevention was to allow all traffic in the event of overload/failure.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 10:00:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Fail-Mode-in-Threat-Prevention-settings-good-idea-to-change-to/m-p/186685#M31187</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-07-18T10:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Fail Mode in Threat Prevention settings - good idea to change to fail-close?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Fail-Mode-in-Threat-Prevention-settings-good-idea-to-change-to/m-p/186694#M31190</link>
      <description>&lt;P&gt;A previous similar discussion was had here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Threat-Prevention/IPS-Connection-accepted-But-why/td-p/136294" target="_blank"&gt;https://community.checkpoint.com/t5/Threat-Prevention/IPS-Connection-accepted-But-why/td-p/136294&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Yes fail-close is more secure.&lt;/P&gt;
&lt;P&gt;Which gateway version and hotfix is used, if it's already current I would follow-up with TAC to investigate further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 12:52:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Fail-Mode-in-Threat-Prevention-settings-good-idea-to-change-to/m-p/186694#M31190</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-07-18T12:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Fail Mode in Threat Prevention settings - good idea to change to fail-close?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Fail-Mode-in-Threat-Prevention-settings-good-idea-to-change-to/m-p/186705#M31192</link>
      <description>&lt;P&gt;Thanks Chris, we are running R81.10 soon to be R81.20.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suppose any traffic currently accepted by this will have the message included in it's log:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Bypassing the request as defined in the Inspection Settings.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Maybe this is a good log filter to use to gauge what traffic is currently being permitted by the Fail-open, and subsequently what traffic would be blocked with fail-close.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 14:18:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Fail-Mode-in-Threat-Prevention-settings-good-idea-to-change-to/m-p/186705#M31192</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2023-07-18T14:18:24Z</dc:date>
    </item>
  </channel>
</rss>

