Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
WiliRGasparetto
MVP Diamond
MVP Diamond

Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?

Check Point’s Intrusion Prevention System (IPS) is a core component of Threat Prevention, providing proactive protection against a wide range of network threats. Over time, the IPS engine and its signature formats have evolved, leading to the coexistence of "normal" and "version 2 (Ver 2)" signatures. This post explains the technical reasons for maintaining both, their architectural differences, and best practices for deployment.

IPS Architecture Overview

Check Point IPS uses a multi-layered detection engine:

  • Passive Streaming Library (PSL): Reconstructs network streams for inspection.
  • Protocol Parsers: Identify and separate protocols (HTTP, FTP, DNS, etc.) for context-aware analysis.
  • Context Management Infrastructure (CMI): Determines which protections (signatures) apply to each protocol context.
  • Pattern Matcher: The detection engine that uses signatures to identify malicious patterns.

IPS Inspection Flow Diagram

WiliRGasparetto_0-1773790826936.jpeg

 

Traffic is processed through multiple analysis stages, with signatures applied at different protocol layers.

 

 

Normal vs. V2 Signatures: Technical Comparison

Feature Normal Signature V2 Signature (INSPECTv2)
Detection Engine Classic Pattern Matcher INSPECTv2 (advanced engine)
Coverage Known threats New threats, evasive techniques, improved accuracy
Performance Lower resource usage May require more CPU/memory, but optimized for accuracy
Compatibility Legacy gateways Modern gateways (R80+)
Update Frequency Less frequent Updated regularly
  • Normal Signatures: Use traditional pattern matching, suitable for legacy environments and lower resource consumption.

 

  • V2 Signatures: Leverage the advanced INSPECTv2 engine, supporting complex logic, context awareness, and better detection of modern threats.

 

Why Maintain Both Signature Types?

  • Backward Compatibility: Some older gateways may not support V2 signatures. Keeping both ensures all devices remain protected.
  • Redundancy: If a V2 signature causes issues (e.g., false positives), the normal signature can provide fallback protection.
  • Gradual Migration: Allows administrators to test V2 signatures in "Detect" mode before fully switching from normal signatures.
  • Maximum Coverage: Certain threats may only be detected by one signature type, so using both maximizes security.

 

Performance Considerations

  • V2 signatures can be more resource-intensive due to deeper inspection and advanced logic.
  • IPS Tuning: Administrators can enable/disable specific signatures or use different profiles for perimeter vs. internal gateways.
  • Bypass Under Load: IPS can be configured to bypass traffic during high load to prevent bottlenecks, but this should be used cautiously.

 

Best Practices for Managing Signature Versions

  1. Test in Staging: Always test new V2 signatures in a non-production environment.
  2. Monitor Updates: Review IPS update notes and apply urgent protections as needed.
  3. Separate Profiles: Use different IPS profiles for different gateway roles (e.g., perimeter vs. datacenter).
  4. Monitor Logs: Watch for false positives/negatives and adjust protections accordingly.
  5. Gradual Rollout: Deploy V2 signatures in "Detect" mode before moving to "Prevent."

 

Summary

  • Normal signatures ensure compatibility and stability.
  • V2 signatures provide enhanced detection and future-proofing.
  • Maintaining both allows for a safe, flexible, and comprehensive security posture during transitions and upgrades.

 

References

(1)
35 Replies
PedroMacena24
Participant

Crushed it!

WiliRGasparetto
MVP Diamond
MVP Diamond

thk's bro

the_rock
MVP Diamond
MVP Diamond

So good, as always.

Best,
Andy
"Have a great day and if its not, change it"
WiliRGasparetto
MVP Diamond
MVP Diamond

I had a good teacher who taught me how to make good posts.

(1)
the_rock
MVP Diamond
MVP Diamond

Im 100% sure it was NOT me 😂

Best,
Andy
"Have a great day and if its not, change it"
0 Kudos
WiliRGasparetto
MVP Diamond
MVP Diamond

Reconsider your concepts because it is indeed true, hehe.

Timothy_Hall
MVP Gold
MVP Gold

Thanks @WiliRGasparetto, the recommendation to keep both versions of a signature active did make it into the Check Point Threat Prevention Specialist class, but there wasn't a clear explanation for why.

New Book: "Max Power 2026" Coming Soon
Check Point Firewall Performance Optimization
WiliRGasparetto
MVP Diamond
MVP Diamond

Is the material already released? Is it version 81.20? If it hasn't been released, you can take the text and use it.

ccsjnw
Contributor


Does anything need to be done to enable the V2 variant of IPS ?

We're running R82 with Jumbo Hot Fix Accumulator Take 60.

 

 

0 Kudos
the_rock
MVP Diamond
MVP Diamond

I dont believe so. As long as blade is enabled and updated, you should be good to go.

Best,
Andy
"Have a great day and if its not, change it"
WiliRGasparetto
MVP Diamond
MVP Diamond

exactly

the_rock
MVP Diamond
MVP Diamond

I wondered at one point if it had to be enabled, but since I could not find it anywhere, logically assumed it was enabled by default.

Best,
Andy
"Have a great day and if its not, change it"
WiliRGasparetto
MVP Diamond
MVP Diamond

yes

WiliRGasparetto
MVP Diamond
MVP Diamond

Starting with Check Point version R82, the IPS Engine 2.0 (also called IPS version 2) is natively enabled in the system. In other words, it is not necessary to install any specific Jumbo Hotfix (such as Take 60) to activate or use the IPS Engine 2.0 in this version.

asafebelo
Participant

Congrats, Wili!! Excellent post

WiliRGasparetto
MVP Diamond
MVP Diamond

thank's bro 

0 Kudos
constant69
Contributor

Hello,

In the best practices for Managing Signature Versions, it is recommended to test V2 signatures in a non-production environment or to deploy them in Detect Mode.

I have a question that may sound a bit silly: how can a “V2 UP signature” be identified in SmartConsole?

In SmartConsole, I could not find any filters that allow sorting by IPS signature version.

And when I view the details of an IPS signature (as in the screenshot below of a recent signature), I cannot find any information indicating whether it is a Normal or V2 signatureSignature_IPS.png

 

Thank you in advance for your insights.

WiliRGasparetto
MVP Diamond
MVP Diamond

Your question is not silly at all! @constant69  Most people I know don't know how to see that.

A step-by-step guide on how to find version 2 in an IP signature.

You need to open the SmartConsole.

 

Go to Security Policies.

 
 

 

 

Then go to Threat Prevention.

Open Custom Policy.

 

Captura de tela 2026-03-24 145028.png

In the lower-right corner, go to IPS Protections.

ips pro.png

In the lower-left corner, go to ThreatCloud and select the checkbox.

 

thear.png

At that point, you will need to look for the signature where you want to check version 2, or you can use the filter in the upper-left corner to filter by version 2, and you will see all available version 2 signatures.

ver 2.pngver 2 2 .png

 

From this stage, you can take whatever actions you prefer.
final ips.png

0 Kudos
constant69
Contributor

Hi @WiliRGasparetto 

Thank you very much for your detailed explanations on identifying new IPS signatures.

Regards

0 Kudos
WiliRGasparetto
MVP Diamond
MVP Diamond

Yor Welcome

0 Kudos
WiliRGasparetto
MVP Diamond
MVP Diamond

If you still have any questions, feel free to ask.

0 Kudos
Daniel_
Advisor

The link to "Threat Prevention Administration Guide (R81+)" is not working (for me). I get "Not found"

0 Kudos
AlbertoThree
Participant

Hi,

I have a question that is maybe a bit of topic, but maybe you have an answer to that.

I have some IPS Prevent logs, and some of them have a packet captures available, but not all of them, even though it is enabled.
My question is how can I find out which exact pattern triggered the IPS rule?

Kind regards,
Albert

0 Kudos
Timothy_Hall
MVP Gold
MVP Gold

Only 1 packet capture per IPS protection is saved at any one time, unless you select the "Packet Capture" checkbox on the IPS protection itself (not just in the Track column of the TP policy).  You can examine exactly what pattern the IPS Protection is actually looking for by signing up here: sk182083: IPS Explorer

New Book: "Max Power 2026" Coming Soon
Check Point Firewall Performance Optimization
AlbertoThree
Participant

Hi,
I tried to 'apply' to get access to IPS Explorer, but I got this reaction:

My apologies, this is not an open feature, rather it is a legacy capability that exposes sensitive information and is therefore limited to a small number of customers under strict NDA agreements.

Arthur_DENIS1
Advisor
Advisor

Yep... same for me 😞

WiliRGasparetto
MVP Diamond
MVP Diamond

Yes. same for me

0 Kudos
AlbertoThree
Participant

So if IPS Explorer is not available, what other means do we have to find out the exact pattern the IPS protection matched on?

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events