- CheckMates
- :
- Products
- :
- General Topics
- :
- Re: Abnormality in pattern matching of APP CONTRL ...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Abnormality in pattern matching of APP CONTRL BLADE
Hi Checkmates,
I have a security policy created for communication between a pair of device, I'm using a custom created TCP high port (TCP 30K+) in service and no applications are mentioned inside the rule. But when I'm checking the logs it is matched against an APP named net.TCP.
Can someone shed light on how this is happening, how is traffic matched against an APP which I never specified in the rule.
Thanks in advance!
======
WR,
FH
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This is TCP 8080, not TCP high port (TCP 30K+) in service ! And 8080 is used by:
Protocol | Port number | Service Name and Comment | Usage |
Endpoint Security | |||
TCP | 8080 | not predefined | Loopback port (used by EPM process). Endpoint Security Management Server and Directory Scanner -> Apache Tomcat HTTP on Endpoint Security Management Server. |
Threat Emulation | |||
TCP | 8080 | not predefined | HTTP - FakeServer listens for packets coming from the VM during WebEmulation. SSL Proxy. |
Mobile Access | |||
TCP | 8080 | HTTP_and_HTTPS_proxy | Front-end daemon of Mobile Access (used by multi-processes - mpdaemon) |
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@G_W_Albrecht Thanks for your reply!
Actually I'm trying to make a different point, I'm not using the 8080 service inside the policy but somehow it is matching against an APP that uses 8080.
The service that I'm using in my policy is TCP 32000.
Hope you got my point!
========
WR,
FH
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can you try something like below?
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I see no screenshots e.g. from rule base and logs that show your point !
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Technically, what Guenther sent is right, its from below:
https://support.checkpoint.com/results/sk/sk52421
High ports would start from 49152 and this port is way below that.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When I create a policy to allow TCP 320000, why would the inspection module match it against an APP that uses 8080. Please help me on this.
====
WR,
FH
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
See the screenshot I attached in my last response, not sure if thats how you have it configured currently.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@the_rock , Yes you are right !
That is how the port is configured.
Can you tell me what is wrong in this?
========
WR,
FH
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you can send us the screenshot of the rule/logs, would help, for sure.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thats fair, no problem! Can we see what that tcp_30k looks like?
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I think everyone saw my messages about remote, haha. Thats okay, Im always happy to do my best to help. Not sure what time zone you are in, but Im in Canada EST, so its 9 am here, so I can do during my lunch, so say at 12 pm est, in 3 hours.
If that works, let me know and I can send you zoom link few mins before then.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How is the service itself defined ? You only show us a service group, not a service definition like:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
PFA.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That looks right to me. Anyway, if you are still good for remote, just let me know, so I can arrange.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Let's do it , can you please let me know the exact timing so that I can be ready for it.
========
WR,
FH
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Will send you zoom in direct message 5 mins before, so at 11.55 am EST (or 4.55 pm GMT), so 2 hours from now.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
OK 👍
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Awesome! Let me grab quick "lunch" now, so I dont have to eat while talking to you, haha 🙂
Talk soon mate.
Best,
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just sent you direct message with the link.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hey everyone,
I did remote session with the guys and below are my suggestions. @Firewall_Head , if you have anything SPECIFIC in mind for testing, just let me know and I can easily try it in the lab.
Andy
RS notes:
-remote session
-verified the port settings
-custom port 32500-32503
app name net.tcp_protocol
since there is single layer in policy with fw and appc+urlf enabled, advised its best to disable urlf+appc blade and create another ordered layer
I believe net tcp app uses port 32501
default net.tcp uses port 8080, so advised to try and block the protocol via the rule
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In general, logs show the explicit port that was accessed.
That port is translated to a "service" (either /etc/services or a defined TCP/UDP service object in SmartConsole).
Not sure if/how this works when a range is used for a TCP/UDP object.
The service definition shown in the logs is used in rulebase matching in one of two cases:
- It's explicitly listed in the rule.
- The rule uses service Any and the service in question is marked as "Match for Any"
In any case, the rulebase is matching per the service(s) you've defined.
However, the logs will show whatever "service" was resolved per above.
This is expected behavior.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That was also my impression based on what I saw with the guys on the remote session, because the log showed the mentioned application with port 32501.
I still asked them to consider things I mentioned...
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@the_rock , Thank you so much for spending your valuable time !
Will try out the steps you mentioned and update you.
==
WR
FH
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Always happy to do my best to help mate. I dont need 1 hour for lunch like I did back in my 20s...now in my mid 40s, 20 mins is enough, haha.
Anyway, as I mentioned to you guys yesterday on zoom remote, if you have SPECIFIC scenario you want me to test in the lab, will do so. I also have R82 lab as well, but no host behind it, so makes way more sense to do it in R81.20 lab with windows 11 behind it, plus, it has ssl inspection on.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hey @the_rock ,
We have a news for you, remember the net.TCP application which was getting matched against one of the rules ?
Now the same traffic is shown as "Unknown Traffic" .
Not sure what's happened here, can we check this ?
======
WR,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
O yes, I do remember that. So does the rule look like before?
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
NO changes done !
===
WR,
FH
