<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Attack detected by IPS: TCP Urgent Data Enforcement in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/65976#M2515</link>
    <description>As you probably know, some IPS signatures are actually lower-level firewall checks.&lt;BR /&gt;On regular R80.x gateways, these would be in Inspection Settings or even Core Protections.</description>
    <pubDate>Sun, 27 Oct 2019 00:15:32 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-10-27T00:15:32Z</dc:date>
    <item>
      <title>Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/65892#M2509</link>
      <description>&lt;P&gt;Testing the WatchTower App, Statistics page started showing a strange attack:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="UrgentData.jpg" style="width: 562px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2852iA08BEB554A407FDC/image-size/large?v=v2&amp;amp;px=999" role="button" title="UrgentData.jpg" alt="UrgentData.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But IPS Protections do not include this attack ! But we have an SK to the rescue:&amp;nbsp;sk36869 "TCP segment with urgent pointer. Urgent data indication was stripped. Please refer to sk36869." log in SmartView Tracker / SmartLog&lt;/P&gt;
&lt;P&gt;This includes a hint for Locally Managed 600 / 700 / 1100 / 1200R / 1400 appliances - and look where this is hidden:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="TCP streaming engine.jpg" style="width: 651px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2853iCE0BFA679A544C6D/image-size/large?v=v2&amp;amp;px=999" role="button" title="TCP streaming engine.jpg" alt="TCP streaming engine.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is the TCP streaming engine, stupid&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_sweat:"&gt;😅&lt;/span&gt; !&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 08:20:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/65892#M2509</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-10-25T08:20:19Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/65976#M2515</link>
      <description>As you probably know, some IPS signatures are actually lower-level firewall checks.&lt;BR /&gt;On regular R80.x gateways, these would be in Inspection Settings or even Core Protections.</description>
      <pubDate>Sun, 27 Oct 2019 00:15:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/65976#M2515</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-27T00:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170432#M8183</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I'm having an issue related to the "&lt;/SPAN&gt;&lt;SPAN&gt;TCP segment with urgent pointer" protection, I have an app that's using the rlogin protocol on an non default port.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Does anyone knows if it's possibly make an exclusion for this core protection on the SMB firewalls? We are using an 1800 (R81.10 (996000575)), since this protection it's not directly related to the IPS blade I can't create an exception for it.&lt;/P&gt;&lt;P&gt;The log mentions the sk&lt;SPAN&gt;sk36869, but this sk only explains how to change the fw to not strip the tcp urgent flag.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I would like to keep that protection active and make only an exception for the required flow.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TCP Urgent.png" style="width: 920px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19465iFD16ED08E02C26F3/image-size/large?v=v2&amp;amp;px=999" role="button" title="TCP Urgent.png" alt="TCP Urgent.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 13:11:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170432#M8183</guid>
      <dc:creator>leonarit</dc:creator>
      <dc:date>2023-02-06T13:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170450#M8184</link>
      <description>&lt;P&gt;I think in the context of locally managed devices atleast you only have the option of Detect vs Prevent here (for this protection in Advanced settings). Nothing I can find in the CLI or Web UI suggests differently unfortunately.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 13:53:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170450#M8184</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-06T13:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170479#M8186</link>
      <description>&lt;P&gt;You should be able to apply the require change for the specific port in $FWDIR/lib/user.def on the SMB appliance for the specified port (which you say is non-standard).&lt;BR /&gt;The (undocumented) command&amp;nbsp;fw_configload can be used to recompile the policy with this change.&lt;/P&gt;
&lt;P&gt;For an exception that can be configured via the WebUI, this is quite likely an RFE.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 16:18:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170479#M8186</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-06T16:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170590#M8196</link>
      <description>&lt;P&gt;Thanks for the information, I noticed that in the&amp;nbsp;sk36869 it says:&lt;/P&gt;&lt;H3&gt;Procedure for Locally Managed Quantum Spark appliances with Gaia Embedded OS&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Connect to the Gaia Portal on the appliance.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Go to the "&lt;EM&gt;Device&lt;/EM&gt;" tab.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Click "&lt;EM&gt;Advanced Settings&lt;/EM&gt;".&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Search for "&lt;EM&gt;Streaming Engine Settings&lt;/EM&gt;".&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Change the value of "&lt;EM&gt;TCP Urgent Data Enforcement&lt;/EM&gt;" from "prevent" to "detect"&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Despite that information I tried to configure the user.def but it didn't work, the fw still classifies the tcp port an attack.&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;&lt;P&gt;#ifndef __user_def__&lt;BR /&gt;#define __user_def__&lt;/P&gt;&lt;P&gt;//&lt;BR /&gt;// User defined INSPECT code&lt;BR /&gt;//&lt;/P&gt;&lt;P&gt;tcp_urgent_ports_user={&amp;lt;6400;URGENT_DATA_INLINE&amp;gt;};&lt;/P&gt;&lt;P&gt;#endif /* __user_def__ */&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems I will have to keep the global &lt;SPAN&gt;TCP&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Urgent&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Data Enforcement&amp;nbsp;&lt;/SPAN&gt;protection disabled.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 14:28:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170590#M8196</guid>
      <dc:creator>leonarit</dc:creator>
      <dc:date>2023-02-07T14:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170608#M8197</link>
      <description>&lt;P&gt;This is not possible as it is the same Advanced Setting as above: sk36869 mentions TCP Urgent Data Enforcement - setting this to detect should be the solution, but exclusion is not possible. You can ask TAC, though...&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 15:34:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170608#M8197</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-02-07T15:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170615#M8198</link>
      <description>&lt;P&gt;Did you execute fw_configload after making the change and wait a few minutes before trying?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 16:22:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170615#M8198</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-07T16:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170616#M8199</link>
      <description>&lt;P&gt;Yes, I did run the f&lt;SPAN&gt;w_configload command and the policy was loaded without any errors.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;After some minutes I also changed the advanced settings "&lt;SPAN&gt;&amp;nbsp;TCP Urgent Data Enforcement&amp;nbsp;" from detect to prevent and the test was done after 5 minutes since the last policy change.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'm assuming the changes made from the webgui call the&amp;nbsp; f&lt;SPAN&gt;w_configload to load the policy, and the changes in the user.def are also reflected in the policy installed.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 16:31:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170616#M8199</guid>
      <dc:creator>leonarit</dc:creator>
      <dc:date>2023-02-07T16:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Attack detected by IPS: TCP Urgent Data Enforcement</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170632#M8203</link>
      <description>&lt;P&gt;Yes, when you make changes in the WebUI that require access policy changes, they will be compiled and installed in the background.&lt;BR /&gt;I believe "fw stat" will actually confirm the last time the policy was compiled/installed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 18:42:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Attack-detected-by-IPS-TCP-Urgent-Data-Enforcement/m-p/170632#M8203</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-07T18:42:55Z</dc:date>
    </item>
  </channel>
</rss>

