- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All
On a checkpoint Firewall, how is the traffic processed? does it look at the Firewall rules first, then pass to IPS, then threat prevention etc? Or are they all scanned at the same time?
Also, what about if you used the URL filtering blade, would you still need to allow a rule to anywhere under the Firewall, then use the URL to lock down to url's ?
cheers
This has been discussed deeply already here: R80.x Security Gateway Architecture (Logical Packet Flow)
This has been discussed deeply already here: R80.x Security Gateway Architecture (Logical Packet Flow)
When teaching the CCSA class and covering ordered vs. inline layers, I use the following simplified order of operations to provide insight into how ordered layers are handled on R77.30 and earlier gateways, then map it into how these layers are represented in the Security Polices tab of the R80+ SmartConsole. Sites that are upgraded into R80+ management start with their existing policies defined as ordered layers, which tends to be the case for most class attendees.
Keep in mind this list is used solely for discussing and understanding ordered layers in an introductory-level class and glosses over a LOT of internal details that are covered in Heiko's excellent article https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Logical-Packe... Some items on this list are executed by the gateway simultaneously, particularly elements of the Threat Prevention blades. This list assumes that all possible blades are enabled (except QoS) and does not take SecureXL into account at all. Packets that reach the end of the list without being dropped at one of these steps will successfully exit the firewall towards their destination. So with all the caveats laid out here it is:
Shadow Peak Policy Layers and Order of Operations - Ordered Layers
(packet arrives)
0) Antispoofing check via Firewall interface topology settings
1) Geo Policy
2) State table lookup - existing connection? If so jump to #5, otherwise goto #3
***Network Access Control
(inspect first packet of new connection - usually TCP SYN)
3) Firewall/Network Layer based on IP Address & Ports - Should we let the connection start?
4) NAT Policy - How should this connection be NATed?
(TCP three-way handshake completes)
5) HTTPS Inspection/IPSec VPN - need to decrypt?
6) APCL/URLF - Inspect data flow: Is this an allowed application or URL category?
7) Content Awareness - Is the permitted application/category carrying prohibited data types?
8) Mobile Access Blade - Is this a Mobile Access VPN Connection, if so any additional restrictions?
***Threat Prevention
9) IPS: Does the inspected traffic contain any known attacks against client and/or servers?
10) Anti-Bot: Does the inspected traffic exhibit signs of host compromise?
11) Anti-virus: Does the inspected traffic contain known malware/viruses?
12) Sandblast: Threat Extraction - Strip all active content and deliver a sanitized copy
13) Sandblast: Threat Emulation - Detonate unknown executables in a sandbox and watch for carnage
14) HTTPS Inspection/IPSec VPN - need to encrypt?
Hello Timothy,
something not clear to me.
I added a Geo policy on top (Block Asia to my gw and my country).
Anyway, I can see IPS policy hitted by china (especially on port 443) and no reference to Access Policy.
I checked implied rules but no web services found.
So my question is: why that traffic is hitting my TP profile?
thanks !
Which version is your gateway and are you using legacy geo policy that has dependencies on IPS or are you using updatable geo objects in your access policy?
Hello Chris,
I noticed this behavoir on different version that I installed (R80.40, R81, SMB).
Of course I mean Updatable Objects, sorry to miss this sentence.
My question is related to traffic flow: if i add an access policy on top of my rulebase with deny Country A to my Gw and my country, why IPS is involved in some logs for Country A and access policy seems to be bypassed?
Maybe i'm missing something
Thank you for your reply
Likely implied rules per sk105740.
As Chris said this is a special case because you are using Updatable Objects to block traffic specifically to your gateway, which has "First" implied rules allowing access to various portals such as captive portal, MAB, Gaia web interface, etc. When these implied rules are matched they are not logged by default when they permit the traffic, which then allows it to reach your TP policy.
Interestingly the legacy Geo Policy is actually applied before any implied rules can be reached (as shown in my list above) and would outright block this traffic if configured to do so before ever reaching the Access Control policy or its implied rules.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
22 | |
14 | |
4 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 | |
2 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY