Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Lari_Luoma
Ambassador Ambassador
Ambassador

Exceptions on IPS Core Protections

I wanted to share with you a new SK about working with core protections and adding exceptions to them.

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...

More than once I have seen issues with R80.x where exceptions "don't seem to apply". Remember that core protections are different animals from IPS Threat Cloud Protections, enforced on dedicated profiles and installed with access control policy.

6 Replies
Timothy_Hall
Champion
Champion

Thanks for the new SK concerning IPS Core Protection exceptions, very helpful.  Can you elaborate on the "technical reasons" that cause the 39 IPS Core Protections to be configured separately from IPS ThreatCloud Protections and Inspection Settings?  I'm assuming it is related to the merging of the IPS blade into the main Threat Prevention policy under R80+, and the splitting out of some IPS protections into Inspection Settings (and a few other blades such as APCL and ABOT).

I seem to get asked this question in regards to my IPS Immersion class often, and always have to fall back on the murky "technical reasons" phrase.  Thanks!

 

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos
Lari_Luoma
Ambassador Ambassador
Ambassador

Hi @Timothy_Hall

Threat Cloud Protections are enforced with the Pattern Matcher while core protections are implemented with the protocol parser and inspection settings in some lower levels of the NGTP engine. 

In R77.30 and earlier access control policy had to be pushed anyway to enforce IPS. So, I believe that when we moved IPS to be part of Threat Prevention, we actually moved only the Threat Cloud protections, but the core protections still stayed with the access control because they are enforced in a different place than the actual IPS signatures are.

Inspection Settings and Geo Policy are not actually part of the IPS (Inspection settings used to be called engine settings in R77.x) and also enforced with the access control policy.

This is my understanding, but as I'm not R&D I cannot answer in any more detailed why this kind of separation exists. If someone has better understanding, please comment. 🙂

Klaas
Participant
Participant

From my point of view it is an disadvantage that core protections can only defined per gateway in opposite to the general IPS protections there you can define multiple profiles used on one gateway.

It is confusing that the core protections are located in one profile which is used for IPS protections as well. If there is a better segregation between them it would be helpful.

The next disadvantage is, that exceptions on core protections are only based on the entire protection, source ip, destination ip and service port but not for dedicated applications or at least based on an uri.

That means, currently you can not whitelist a core protection for a specific uri.

vas
Contributor

Hi,

Thanks for the info. Actually, IPS requires license and installed via TP updates while Core protection comes with the product and installed with the Access policy.

My query is, if the custom IPS policy is created, core protection enables us to select that custom IPS profile from the drop down. As both are different, by selecting custom IPS profile in core protection, will it be any different than the default 'optimized' profile?

0 Kudos
Timothy_Hall
Champion
Champion

Core Protections have their own separate part of the TP profiles; settings for each of the 39 Core Protections are stored there.  Only one Core Protections profile can be assigned to a single gateway/cluster (and it can be a custom/cloned one); you can't have different Core Protection profiles assigned to the same gateway/cluster. The IPS ThreatCloud Protections and the rest of the TP blades can have different TP profiles applied to different Protected Scopes as specified in the TP rules.

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos
Peter_Baumann
Contributor

Hi Lari_Luoma,
Thanks for this SK.
What we're missing for a customer is the following:

Core Protection "Host Port Scan" ist set to Accept and Track with "Mail"
We can define for this Core Protection an exception, but how can we create an exception for the Track with Mail?

Problem:
When the external scanning host is doing a host port scan we see only detect in the logs but many mails are created then.
We need to create an exception for Track - Mail.

Thanks,
Peter
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events