Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Christian_Wagen
Contributor

Protocol Signatures

Jump to solution

What are the Protocol Signatures doing?

C_pro_sig_1.JPG

1 Solution

Accepted Solutions
HeikoAnkenbrand
Champion
Champion

Hi @Christian_Wagen,

In R80.xx and R81, the identification of most common protocols are done using Firewall services with protocol signature. 
Signatures are pieces of information taken from both "Client to Server" and "Server to Client" packets that eventually identify the protocol. During the Service matching process, signatures validate that the content of the connection is truly the configured protocol. Protocol Signatures are part of the matching process.

SecureXL packet flow:
After policy installation, all traffic matching the Service with Protocol Signature enabled, will use the Medium Patch of traffic flow (PXL, new name PSLXL).

To use matching by protocol signature and services:

- Add the matching service to the appropriate rule.
- Activate the Protocol Signature option.
- Enable Application Control and/or  URL Filtering Blades

View solution in original post

2 Replies
HeikoAnkenbrand
Champion
Champion

Hi @Christian_Wagen,

In R80.xx and R81, the identification of most common protocols are done using Firewall services with protocol signature. 
Signatures are pieces of information taken from both "Client to Server" and "Server to Client" packets that eventually identify the protocol. During the Service matching process, signatures validate that the content of the connection is truly the configured protocol. Protocol Signatures are part of the matching process.

SecureXL packet flow:
After policy installation, all traffic matching the Service with Protocol Signature enabled, will use the Medium Patch of traffic flow (PXL, new name PSLXL).

To use matching by protocol signature and services:

- Add the matching service to the appropriate rule.
- Activate the Protocol Signature option.
- Enable Application Control and/or  URL Filtering Blades

View solution in original post

_Val_
Admin
Admin

Please look here: https://community.checkpoint.com/t5/Security-Management/White-Paper-Protecting-IoT-Internet-of-Thing..., in the paper itself.

Protocol signature ensures the protocol is used according to RFC.

0 Kudos