<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS Policy in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/218031#M36336</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;one more thing do we expect to see any logs from those exception ?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jun 2024 04:27:28 GMT</pubDate>
    <dc:creator>sushantjoshi</dc:creator>
    <dc:date>2024-06-19T04:27:28Z</dc:date>
    <item>
      <title>IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217695#M36285</link>
      <description>&lt;P&gt;I am trying to get my head around IPS Policy.&lt;/P&gt;&lt;P&gt;Firewall I am managing was setup by another guy who is no longer in the company&lt;/P&gt;&lt;P&gt;There are three rules in my existing Custom policy INTERNET_IN_PROFILE , INTERNET_OUT_PROFILE, VPN_IN_PROFILE ( image attached)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPS-POLICY.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26285i4BF14D97F2BCECFB/image-size/large?v=v2&amp;amp;px=999" role="button" title="IPS-POLICY.png" alt="IPS-POLICY.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;There is no protected scope applied with any of these rules but interestingly when I check the logs the first rule (Internet IN - Threat Policy) only prevents/detects IPS in the incoming traffic i.e inbound traffic mainly towards my application.&lt;/P&gt;&lt;P&gt;The second rule only prevents/detects IPS outbound traffic i.e traffic usually generated from my internal network.&lt;/P&gt;&lt;P&gt;There is no scope defined so bit confused about how this is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 07:22:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217695#M36285</guid>
      <dc:creator>sushantjoshi</dc:creator>
      <dc:date>2024-06-17T07:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217696#M36286</link>
      <description>&lt;P&gt;Right click on the dark blue bar and add the missing column like source. Then you will understand the policy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 07:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217696#M36286</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-06-17T07:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217724#M36287</link>
      <description>&lt;P&gt;Thank You Lesley and sorry for being a noob on this one.&lt;/P&gt;&lt;P&gt;One more thing how does this rule work ? Match from top to bottom or will the E-1.1 , E1.2 will get bypassed from the Threat Prevention profile and rest of them will get inspected ? Does the Inactive in the Action section refers to not inspect the matching source and destination ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPS-EXCEPTION.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26291i6BB1ABBE4D6B5AE0/image-size/large?v=v2&amp;amp;px=999" role="button" title="IPS-EXCEPTION.png" alt="IPS-EXCEPTION.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 10:28:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217724#M36287</guid>
      <dc:creator>sushantjoshi</dc:creator>
      <dc:date>2024-06-17T10:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217770#M36295</link>
      <description>&lt;P&gt;I dont believe top to bottom approach even matters here, like it would in normal policy rules. Btw, yes, you are correct, inactive means it will NOT inspect/apply to source/dst.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 13:27:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217770#M36295</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-17T13:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217787#M36297</link>
      <description>&lt;P&gt;Rules E-1.1 and E-1.2 are exceptions that can change the final decision (Inactive, Prevent, Detect) of what to do only if rule 1 is matched.&amp;nbsp; If rule 1 is not matched, E-1.1 and E-1.2 are skipped.&amp;nbsp; Overall in the Threat Prevention layers just the first matching rule is taken, unless there is more than one Threat Prevention policy layer (not common), in which case the first matching rule is selected in all TP layers, and the most stringent action wins unless there is an exception which changes it.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 14:31:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217787#M36297</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-06-17T14:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217818#M36299</link>
      <description>&lt;P&gt;What the guys told me below applies here. Only advise I can give is consider to remove the exceptions because they seem to whitelist a lot. 1.2 is whitelist for traffic TOWARDS internet. So if a hosts connects to a C&amp;amp;C server on internet it will be skipped due the exception and not inspected by for example anti-bot blade.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 18:25:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217818#M36299</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-06-17T18:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217875#M36311</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp; there is an Edge firewall as well and before the packet goes out to the internet it has to be traverse the Edge firewall. We do not want to be using Threat Prevention with same signatures and everything in 2 places and on top of that both of them are Checkpoint&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 03:02:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/217875#M36311</guid>
      <dc:creator>sushantjoshi</dc:creator>
      <dc:date>2024-06-18T03:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/218031#M36336</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;one more thing do we expect to see any logs from those exception ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 04:27:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/218031#M36336</guid>
      <dc:creator>sushantjoshi</dc:creator>
      <dc:date>2024-06-19T04:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/218079#M36352</link>
      <description>&lt;P&gt;Definitely you should get them. I know few customers who use them and we always see the logs. By default, when you create them, logging is enabled.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 11:52:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPS-Policy/m-p/218079#M36352</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-19T11:52:31Z</dc:date>
    </item>
  </channel>
</rss>

