- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
What are the Protocol Signatures doing?
Hi @Christian_Wagen,
In R80.xx and R81, the identification of most common protocols are done using Firewall services with protocol signature.
Signatures are pieces of information taken from both "Client to Server" and "Server to Client" packets that eventually identify the protocol. During the Service matching process, signatures validate that the content of the connection is truly the configured protocol. Protocol Signatures are part of the matching process.
SecureXL packet flow:
After policy installation, all traffic matching the Service with Protocol Signature enabled, will use the Medium Patch of traffic flow (PXL, new name PSLXL).
To use matching by protocol signature and services:
- Add the matching service to the appropriate rule.
- Activate the Protocol Signature option.
- Enable Application Control and/or URL Filtering Blades
Hi @Christian_Wagen,
In R80.xx and R81, the identification of most common protocols are done using Firewall services with protocol signature.
Signatures are pieces of information taken from both "Client to Server" and "Server to Client" packets that eventually identify the protocol. During the Service matching process, signatures validate that the content of the connection is truly the configured protocol. Protocol Signatures are part of the matching process.
SecureXL packet flow:
After policy installation, all traffic matching the Service with Protocol Signature enabled, will use the Medium Patch of traffic flow (PXL, new name PSLXL).
To use matching by protocol signature and services:
- Add the matching service to the appropriate rule.
- Activate the Protocol Signature option.
- Enable Application Control and/or URL Filtering Blades
Please look here: https://community.checkpoint.com/t5/Security-Management/White-Paper-Protecting-IoT-Internet-of-Thing..., in the paper itself.
Protocol signature ensures the protocol is used according to RFC.
Hi All.
Considering that Protocol Signature is a feature to provide more security and reliability to traffic inspection process, why is not enabled by default? Shouldn't this be the opposite, enabled by default and I disable if I need?
Regards.
Valter Junior
The Protocol Signature checkbox is not enabled on any TCP or UDP services by default. It is probably not enabled by default due to the performance hit, as it silently kills the SecureXL Accept templating rate to zero, and requires Medium Path streaming of the first few packets of the connection to determine a final match. This is going to cause far more rulebase lookup overhead than a regular Column-based matching Firewall/Network policy rulebase lookup. With a high new connection rate the performance impact of the "Protocol Signature" feature can become quite pronounced.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY