- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
What are the Protocol Signatures doing?
Hi @Christian_Wagen,
In R80.xx and R81, the identification of most common protocols are done using Firewall services with protocol signature.
Signatures are pieces of information taken from both "Client to Server" and "Server to Client" packets that eventually identify the protocol. During the Service matching process, signatures validate that the content of the connection is truly the configured protocol. Protocol Signatures are part of the matching process.
SecureXL packet flow:
After policy installation, all traffic matching the Service with Protocol Signature enabled, will use the Medium Patch of traffic flow (PXL, new name PSLXL).
To use matching by protocol signature and services:
- Add the matching service to the appropriate rule.
- Activate the Protocol Signature option.
- Enable Application Control and/or URL Filtering Blades
Hi @Christian_Wagen,
In R80.xx and R81, the identification of most common protocols are done using Firewall services with protocol signature.
Signatures are pieces of information taken from both "Client to Server" and "Server to Client" packets that eventually identify the protocol. During the Service matching process, signatures validate that the content of the connection is truly the configured protocol. Protocol Signatures are part of the matching process.
SecureXL packet flow:
After policy installation, all traffic matching the Service with Protocol Signature enabled, will use the Medium Patch of traffic flow (PXL, new name PSLXL).
To use matching by protocol signature and services:
- Add the matching service to the appropriate rule.
- Activate the Protocol Signature option.
- Enable Application Control and/or URL Filtering Blades
Please look here: https://community.checkpoint.com/t5/Security-Management/White-Paper-Protecting-IoT-Internet-of-Thing..., in the paper itself.
Protocol signature ensures the protocol is used according to RFC.
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY