- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I am not clear about how chekpoint works in OSI layers, please response and kindly give a breif.
Thanks.
There are multiple Software Blades and products that act on Layer 7: Application control, Content inspection, multiple Threat Prevention blades, WAF, etc.
What do you want to achieve?
As we know packet filtering and statefull inspection are works in network layer with the help of datalink and transport layer. And I think the box is works in physical layer.Similarly, I wanted to know clearly how checkpoints work is done in the rest of the layers.
Thanks.
The topic is very broad, as @_Val_ has indicated a specific example might help to provide a concise answer short of referring you to the CP for beginners materials and similar.
Regarding Application visibility you can review our coverage here:
https://appwiki.checkpoint.com/appwikisdb/public.htm
This statement is incorrect, and it was not true even in 1993 when the Stateful Inspection was conceived: "... stateful inspection works in network layer with the help of datalink and transport layer".
Hi _Val_!
There was a mistake, statefull inspection works in layer 3 and 4 as per many source. And there was no involvement for layer 2.
If the satement is incorrect then can you please explain how statefull inspection works in OSI model?
Please don't feel disturbed, i'm a beginner.
Regards.
It is explained here: https://community.checkpoint.com/t5/Check-Point-for-Beginners-2-0/Brief-History-of-Check-Point-Firew...
The classic Stateful Inspection enforces traffic on layers 3 to 6, and sometimes on layer 7.
Hi @_Val_
Thanks for the information, it will help me a lot. Thanks for your valuable time.
Regards.
In terms of the OSI model:
There are multiple userspace processes that operate in Layer 7 that is, in many cases, have traffic directed to them by the firewall kernel.
Hi PhoneBoy!
Thanks. Yeah as per chat gpt and many tutorial i able to know that. But i wants to know the whole proccess of checkpoint, in OSI model. I know it is a broad proccess, but as a bigenner i wants to know it. Please help me for fullfill my curiosity.
Regards.
Hi @maxtaan,
In these articles I described how the packet flow and the layer 7 processing over CMI, PSL, APAS,... works.
Maybe this will help you!
- R8x - Security Gateway Architecture (Logical Packet Flow)
- R8x - Security Gateway Architecture (Logical Packet Flow) - Update R80.20+
- R8x - Security Gateway Architecture (Content Inspection)
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 29 | |
| 18 | |
| 7 | |
| 7 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY