- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello, Team
I have the following scenario, which I would like to clarify my doubt.
I have a Cluster R81.10
We have a publication of a service, so that from the Internet (From certain public IPs, can access our service pointing to a TCP port 1122)
The problem I see is that the traffic is not doing MATCH with the first explicit rule that I have, which has the #585, but is doing MATCH with a rule that is below with #594, and I do not understand the "why", because the first rule has a "custom" group where we are explicitly declaring the IP that we want to connect to our server, but for some reason, the traffic "ignores" the first rule, and goes to the rule that is below.
Is this a normal behavior? Is it something that can be corrected?
The purpose is that the traffic makes MATCH with the 585.
I hope you can support me with your point of view.
Greetings.
The reason I see is that one has source any.
Buddy,
But rule #585, is much more explicit than rule #594, other than that, it is more "up" in the rulebase.
I don't see the logic in it. 😕
K, so whats the source IP you are coming from and is it included in that group in rule 585?
Andy
Rule #585, has as its origin a general group.
The group is called GRP_SFTP_200.48.202.52.
Within this group, there are several additional "subgroups", 1 of them is the group GRP_RE, in which there are several public IPs to which we are allowing access to our public one.
So, I do not understand why the traffic "ignores" this rule, and goes to the rule that has as origin an ANY.
Maybe try disable,re-enable rule,push policy and test. Otherwise, try below example
Andy
That's like a Cisco Packet-Tracert, isn't it?
To validate the rule for certain traffic?
Sort of...
I got almost the same result as what can be seen by the SmartConsole.
As I interpret it, it first "matches" rule #585.
Thats what it shows, right...BUT, as I said, if it fails, I would try what I found to be easy fix in the past. Disable rule 585, push policy, re-enable, push policy. If that fails, disable rule 594, push policy and test. Does traffic get dropped?
Andy
We have not observed "traffic down", but for auditing purposes, the traffic should match the rule that has been defined for it (Rule #585).
I agree bro, you are 100% right. I cant see why its not catching that rule, UNLESS there is some sort of nat or something causing it. If not, then I would get in touch with TAC to solve it via remote session. Before that, try my suggestion and see what happens.
This is probably going to require the TAC to investigate.
https://help.checkpoint.com
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY