- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Checkmates,
Using VSX mode, 2 checkpoint 12000 series, R77.30
I got this log when trying to access a website, and it deny access.
Anyone facing this problem already.
Please help me on this case,
Thank you guys,
Zed
Sure (if Checkpoint allows)
How to increase / disable max_header_length
| Solution ID | sk44674 |
| Product | IPS |
| Version | R70, R71, R75, NGX R65, R76, R77 |
| OS | SecurePlatform, Windows, Linux |
| Platform / Model | All |
| Date Created | 28-Apr-2010 |
| Last Modified | 18-Feb-2014 |
It was not changed for all instances in Smart Defense / IPS. Each profile has its own setting. All the settings need to be changed.
On the Security Management via GuiDBedit.
1.Log out of all smart console applications.
2.Log in to GuiDBedit.
3.Search guidbedit for the following data string http_max_header_length.
Make sure the value is the value you want it set to on all profiles (detailed below). The default is 2100, max is 12288. (Left side shows current value changeable, right side shows default value not changeable).
Then click Ctrl+F and click find next. You should see this parameter for each of the following object names. For each of them, perform the change. They should, but might not appear in the following order:
AdvancedSecurityObject
TemplateAdvancedSecurityObjectConnectra
DeactivatedAdvancedSecurityObject
AdvancedSecurityObjectConnectra
TemplateAdvancedSecurityObject
RecommendedAdvancedSecurityObject
If Smart Defense / IPS is deactivate and the issue persists (traffic still being dropped), adjust the DeactivatedAdvancedSecurityObject to the desired length.
4.After performing the changes, save and exit.
5.Install policy.
6.If the drop is still present, consider increasing the value even further.
In case the solution fails completely, consider disabling http_max_header_length enforcement:
1.Log out of all smart console applications.
2.Log in to GuiDBedit.
3.Search guidbedit for the following data string http_enforce_max_header_length.
Change it's value from true to false on all profiles:
AdvancedSecurityObject
TemplateAdvancedSecurityObjectConnectra
DeactivatedAdvancedSecurityObject
AdvancedSecurityObjectConnectra
TemplateAdvancedSecurityObject
RecommendedAdvancedSecurityObject
4.After performing the changes, save and exit.
5.Perform cpstop and cpstart on the Security Management.
6.Install policy.
Hi Zed,
just check sk44674, maybe it helps.
Cheers
Vincent
Hi Vincent,
Thank for your reply.
My UC account doesn't have advance access to see the Solution. Could you please capture the text for me.
Thank in advance,
Zed
Sure (if Checkpoint allows)
How to increase / disable max_header_length
| Solution ID | sk44674 |
| Product | IPS |
| Version | R70, R71, R75, NGX R65, R76, R77 |
| OS | SecurePlatform, Windows, Linux |
| Platform / Model | All |
| Date Created | 28-Apr-2010 |
| Last Modified | 18-Feb-2014 |
It was not changed for all instances in Smart Defense / IPS. Each profile has its own setting. All the settings need to be changed.
On the Security Management via GuiDBedit.
1.Log out of all smart console applications.
2.Log in to GuiDBedit.
3.Search guidbedit for the following data string http_max_header_length.
Make sure the value is the value you want it set to on all profiles (detailed below). The default is 2100, max is 12288. (Left side shows current value changeable, right side shows default value not changeable).
Then click Ctrl+F and click find next. You should see this parameter for each of the following object names. For each of them, perform the change. They should, but might not appear in the following order:
AdvancedSecurityObject
TemplateAdvancedSecurityObjectConnectra
DeactivatedAdvancedSecurityObject
AdvancedSecurityObjectConnectra
TemplateAdvancedSecurityObject
RecommendedAdvancedSecurityObject
If Smart Defense / IPS is deactivate and the issue persists (traffic still being dropped), adjust the DeactivatedAdvancedSecurityObject to the desired length.
4.After performing the changes, save and exit.
5.Install policy.
6.If the drop is still present, consider increasing the value even further.
In case the solution fails completely, consider disabling http_max_header_length enforcement:
1.Log out of all smart console applications.
2.Log in to GuiDBedit.
3.Search guidbedit for the following data string http_enforce_max_header_length.
Change it's value from true to false on all profiles:
AdvancedSecurityObject
TemplateAdvancedSecurityObjectConnectra
DeactivatedAdvancedSecurityObject
AdvancedSecurityObjectConnectra
TemplateAdvancedSecurityObject
RecommendedAdvancedSecurityObject
4.After performing the changes, save and exit.
5.Perform cpstop and cpstart on the Security Management.
6.Install policy.
Hi Vincent,
Very appreciate for your help. Already sloved.
Thank you,
Zed
Hello Zed,
i am glad that I could help, you're welcome!
Cheers
Vincent
Hi Vincent,
Hope you're doing well, could you please help me capture solution of sk36161.
I'm requesting CP allow my account access to solution.
Thank you so much,
Zed
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 15 | |
| 8 | |
| 8 | |
| 8 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY