- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Need to check the possibility to inspect content on SFTP connection.
R81.20 admin guide doesn't show SFTP as supported protocols.
the exact requirement as below.
Noted, Informed the SE and got the confirmation that specific requirement is not yet available and not in road map. Will ask to create a RFE
Thanks for the update on the same and will try the mentioned sk.
Currently SSH Deep Packet Inspection (which can inspect inside an SFTP connection) only supports Anti-Virus, IPS and Threat Emulation. What are the criteria for knowing which traffic is legitimate?
Customer has developed an SFTP application which destinated to a specific external IP of the Check Point firewall. They wanted to allow only that SFTP and Block all other SFTP applications.
Through the SFTP they wanted all limited number of file types
I just enabled content awareness in the lab, but dont really see much related to sftp at all.
Best,
Andy
thanks,
I don't know that we at the network/protocol inspection level have a way of distinguishing specific SFTP applications - they're likely all the same at the protocol level. This might be something that's more suitable to do at the application level, but please do work with your local SE on an RFE.
File types can be blocked with AV or TE blade, which are both supported via SSH DPI, so that you can do today. With AV you can configure the Threat Prevention profile under AV > File Types an action per file type for supported files (bypass, inspect, block) or in TE you can add a list of prohibited file types.
Noted, Informed the SE and got the confirmation that specific requirement is not yet available and not in road map. Will ask to create a RFE
Thanks for the update on the same and will try the mentioned sk.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 21 | |
| 20 | |
| 16 | |
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY