Hi all,
I noticed in our IPS logs many "Accept" events, from Internet traffic accessing our DMZ systems. Opening the logs, in forensic details it shows:
"HTTP parsing error detected. Bypassing the request as defined in the Inspection Settings."
And the precise error as:
"illegal startline in request"
I do not totally understand this error, and whether it should be a cause for concern. To me it sounds like the firewall couldn't properly inspect the traffic and so defaults to accept? But as I understand, it "Accepts" this due to the fail mode being set to "Fail-open" as is default. (Setting found in: Manage & settings --> Blades --> Threat Prevention --> Advanced Settings)
Is it a better practice to change this to Fail-close, would this prevent traffic like above instead of accepting? Is there a log filter to identify exactly what traffic this would block?
I appreciate any feedback you can offer, maybe some of you guys have changed to Fail-close and know of any risk?
- Allow all connections (Fail-open) - All connections are allowed in a situation of engine overload or failure (default).
- Block all connections (Fail-close) - All connections are blocked in a situation of engine overload or failure.
To me this sounds like it could be a security risk, if threat prevention was to allow all traffic in the event of overload/failure.