- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
I am not clear about how chekpoint works in OSI layers, please response and kindly give a breif.
Thanks.
There are multiple Software Blades and products that act on Layer 7: Application control, Content inspection, multiple Threat Prevention blades, WAF, etc.
What do you want to achieve?
As we know packet filtering and statefull inspection are works in network layer with the help of datalink and transport layer. And I think the box is works in physical layer.Similarly, I wanted to know clearly how checkpoints work is done in the rest of the layers.
Thanks.
The topic is very broad, as @_Val_ has indicated a specific example might help to provide a concise answer short of referring you to the CP for beginners materials and similar.
Regarding Application visibility you can review our coverage here:
https://appwiki.checkpoint.com/appwikisdb/public.htm
This statement is incorrect, and it was not true even in 1993 when the Stateful Inspection was conceived: "... stateful inspection works in network layer with the help of datalink and transport layer".
Hi _Val_!
There was a mistake, statefull inspection works in layer 3 and 4 as per many source. And there was no involvement for layer 2.
If the satement is incorrect then can you please explain how statefull inspection works in OSI model?
Please don't feel disturbed, i'm a beginner.
Regards.
It is explained here: https://community.checkpoint.com/t5/Check-Point-for-Beginners-2-0/Brief-History-of-Check-Point-Firew...
The classic Stateful Inspection enforces traffic on layers 3 to 6, and sometimes on layer 7.
Hi @_Val_
Thanks for the information, it will help me a lot. Thanks for your valuable time.
Regards.
In terms of the OSI model:
There are multiple userspace processes that operate in Layer 7 that is, in many cases, have traffic directed to them by the firewall kernel.
Hi PhoneBoy!
Thanks. Yeah as per chat gpt and many tutorial i able to know that. But i wants to know the whole proccess of checkpoint, in OSI model. I know it is a broad proccess, but as a bigenner i wants to know it. Please help me for fullfill my curiosity.
Regards.
Hi @maxtaan,
In these articles I described how the packet flow and the layer 7 processing over CMI, PSL, APAS,... works.
Maybe this will help you!
- R8x - Security Gateway Architecture (Logical Packet Flow)
- R8x - Security Gateway Architecture (Logical Packet Flow) - Update R80.20+
- R8x - Security Gateway Architecture (Content Inspection)
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 5 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY