- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi guys
Some firewall settings may cause a certain packet size to not pass through the ping.
for example:
Ping 8.8.8.8 -l 1000 Passes
Ping 8.8.8.8 -l 4000 Does not pass
I've attached a test image.
#WorksForMe 😕
check your IPS core protections for "max ping size" - I am seeing a default of 2500 bytes if it is enabled.
Oh, that's different. 😆 I thought you were trying to report some other issue.
😁
There are actually two protections that can limit the size of pings:
To make things even more confusing the first is one of the fixed 39 Core Activations, while the other one is part of the much more numerous (and always growing) ThreatCloud Protections. The main thing to watch out for is they are controlled by their own profiles and exceptions, so adding a standard Threat Prevention exception will only apply to the second protection and not the first. Core Activations have their own separate set of exceptions (and better yet so do the 146 Inspection Settings).
The differences between working with Core Activations vs. IPS ThreatCloud protections is a major source of confusion, and nicely covered by the Check Point Threat Prevention Specialist (CTPS) course available from ATCs worldwide.
Regarding the two IPS protections:
A client's recent pentest report recommended setting the maximum ping size to 64 bytes. I am concerned that this may break valid traffic. Should i be concerned?
A typical ping packet has 32 payload bytes, plus 8 bytes of ICMP header, for a total of 40 bytes, then another 20 bytes for the IP header, and another 14 bytes or so for the Ethernet header. I'm assuming the Protection limit is for the ICMP portion (40 bytes by default).
I actually like sending large pings as they tend to aggravate packet loss issues and make them a little easier to see:
Gaia/Linux: ping -s 1400 129.82.102.32
Windows: ping -l 1400 129.82.102.32
I can't think of any scenario where ping packets larger than standard would be used other than the above.
You will affect some hosts that try to do Path MTU discovery with ICMP (by sending giant ping packets), but they will still work unless they also switch to other methods such as TCP. There are other (more proper) ways to do PMTU discovery, and giant ICMP packets aren't the best, but some firmware programmers never seemed to understand that.
You'll know who they are when you see IPS Prevent logs for ICMP. At that point, you can decide if you want to create exceptions for them or not. You won't destroy their ability to function, but you will generate more logs.
Thank you for the replies. Looking at the settings, i cannot see where to change the max ping size from its default value. Where can i adjust that?
It's in the list of IPS Protections. Here's the configuration you want:
Select and edit the protection item:
Set it to Accept for your profile, if it's not already:
Edit the Advanced section and enter the max number of bytes you want:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 76 | |
| 30 | |
| 14 | |
| 13 | |
| 13 | |
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 8 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY