<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB IPS Max Ping Size Attack in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51449#M2011</link>
    <description>&lt;P&gt;Was a TAC opened for this?&amp;nbsp; I've seen this on previous firmwares about the same attack.&lt;/P&gt;</description>
    <pubDate>Sun, 21 Apr 2019 11:46:50 GMT</pubDate>
    <dc:creator>Naftali_Oziel</dc:creator>
    <dc:date>2019-04-21T11:46:50Z</dc:date>
    <item>
      <title>SMB IPS Max Ping Size Attack</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51156#M1996</link>
      <description>&lt;P&gt;During the tests for CPs WatchTower App, i found a most interesting entry in Statistics:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IMG_2727.PNG" style="width: 562px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/877i60647E98E99B5A35/image-size/large?v=v2&amp;amp;px=999" role="button" title="IMG_2727.PNG" alt="IMG_2727.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Who is responsible for this traffic ? In logs i could see that my iPhone, connected to SMB wireless, has sent the package to &lt;SPAN class="x-tree-node-text "&gt;LAN6 Switch&lt;/SPAN&gt; where the Wireless network is defined. Why that ? Unclear RFC ?&lt;/P&gt;
&lt;P&gt;But we have exceptions ready:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Exception.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/878iC4D5078566D5CD7A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Exception.png" alt="Exception.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since that was defined, no more Max Ping Size Attack has occured &lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt; !&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 12:23:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51156#M1996</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-04-17T12:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPS Max Ping Size Attack</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51338#M2000</link>
      <description>I saw it on my own gateway as well, and I'm pretty sure I didn't do a large ping through it. &lt;span class="lia-unicode-emoji" title=":grimacing_face:"&gt;😬&lt;/span&gt;&lt;BR /&gt;Probably worth a TAC case.</description>
      <pubDate>Fri, 19 Apr 2019 02:23:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51338#M2000</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-04-19T02:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPS Max Ping Size Attack</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51374#M2002</link>
      <description>&lt;P&gt;Same here.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2019 17:52:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51374#M2002</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-04-19T17:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPS Max Ping Size Attack</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51449#M2011</link>
      <description>&lt;P&gt;Was a TAC opened for this?&amp;nbsp; I've seen this on previous firmwares about the same attack.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Apr 2019 11:46:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51449#M2011</guid>
      <dc:creator>Naftali_Oziel</dc:creator>
      <dc:date>2019-04-21T11:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPS Max Ping Size Attack</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51749#M2018</link>
      <description>&lt;P&gt;I believe I've verified that one of my sites with this message receives these hits from a Samsung Mobile device. I feel like maybe Samsung tries to do some connectivity tests when on WiFi that CheckPoint doesn't like. Not sure if anyone else can see the same thing.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 17:14:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51749#M2018</guid>
      <dc:creator>Aidan_Luby</dc:creator>
      <dc:date>2019-04-24T17:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: SMB IPS Max Ping Size Attack</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51770#M2020</link>
      <description>&lt;P&gt;Large ping to the default gateway is common in mobile devices.&lt;/P&gt;&lt;P&gt;Just bypass this protection from your wireless networks to the gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 19:27:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-IPS-Max-Ping-Size-Attack/m-p/51770#M2020</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2019-04-24T19:27:24Z</dc:date>
    </item>
  </channel>
</rss>

