Hi,
Im trying to get some info regarding the process of incoming traffic , What blades it follows .
According to Chat if its correct :
For an incoming packet on a Check Point Security Gateway, the blades are typically processed in the following order: first, anti-spoofing and then the Security Policy (which includes Application Control, URL filtering, and Content Inspection). If the connection is accepted, Threat Prevention (including Antivirus, IPS, and other features) is applied. TLS/SSL Inspection may occur before or during the Security Policy inspection depending on configuration.
Here's a breakdown of the typical order:
1. Anti-Spoofing:
The first check is to prevent spoofed IP addresses from entering the network.
2. Security Policy:
This is the main set of rules that determines whether traffic is allowed or denied.
TLS/SSL Inspection (Conditional): If TLS/SSL Inspection is enabled on the gateway, it's applied at this stage, before or during the main security policy inspection.
Application Control, URL Filtering, Content Inspection: These blades are part of the Security Policy and inspect the traffic for allowed applications, web sites, and specific content.
3. Threat Prevention:
If the traffic is accepted by the Security Policy, it then moves to the Threat Prevention stage.
Antivirus (AV), IPS, etc.: This includes features like Intrusion Prevention System (IPS) and other threat detection and prevention mechanisms.
Key Considerations
Configuration Dependent:
The exact order can vary based on the specific features enabled and how they are configured in your Security Policy and blade settings.
Firewall Policy:
The Security Policy is where you define the rules for accepting or blocking traffic based on various criteria.
f-monitor:
You can use the fw monitor tool to see the actual inspection points for incoming traffic (e.g., i for pre-inbound, I for post-inbound).
There is a security Policy with a source IP : dst : Any : all ports drop.
But we see that IP in the IPS Log with a prevent .
Why would we see this IPS log and not a drop.