Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
dbran_2903
Explorer

How have you resolved port scanning issues in a VSX environment?

I have noticed that SAM Rules do not work in a VSX environment, and so far, I have not found any alternative solutions. I would like to prevent port scanning on a specific Virtual System. While the Core Protection 'Host Port Scan' signature does exist and can be modified from 'Inactive' to 'Accept,' according to SK110873, a SAM Rule must be created for it to take effect. What other solutions exist to address this issue?

 

Topology:

-Maestro enviroment

-Security Group as VSX mode (4 Gateways)

-Many Virtual Systems is running

 

0 Kudos
4 Replies
PhoneBoy
Admin
Admin

The only thing the "prevention" does is issue a block to the relevant IP address (why it needs a SAM rule).
You can do something similar with rate limiting: https://support.checkpoint.com/results/sk/sk112454
Granted, it's not tied to the specific Core Protection, though.

0 Kudos
Lesley
Mentor Mentor
Mentor

Can you share the SAM rule config? I am not aware this should not work on VSX. PS I am struggling with the same issue. 

I am trying to get SAMv2 working for port scan. 

-------
If you like this post please give a thumbs up(kudo)! 🙂
0 Kudos
Chris_Atkinson
Employee Employee
Employee

Any more specifics you can share on the scans you're attempting to guard against?

https://community.checkpoint.com/t5/Security-Gateways/Block-all-Shodan-scanners/m-p/113338

CCSM R77/R80/ELITE
0 Kudos
Timothy_Hall
Legend Legend
Legend

I'm assuming this is a concern because VSX does not support automatically growing the connections table, and must be set to a fixed value that can be overflowed by a port scan's traffic that is accepted.

As already mentioned in the thread, you can use the fwaccel dos rate command to limit the number of new connections allowed per second, just make sure you execute this in the proper VS context (also check the new-conn-rate-ratio option to see if that would be more appropriate):

fwaccel dos rate add -a d -l a service any source X.X.X.X/24 destination any new-conn-rate 20

Another option is to ensure the Inspection Setting signature "Aggressive Aging" is enabled in the Inspection Settings profile your VS gateway is using, then configure it even more aggressively than the defaults like below.  You could even drop the default trigger percentage from 80% to something like 50% if you want to get even more aggressive, doing so should keep port scans from causing a major disruption:

aggressive.png

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events