- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: IPS Core Protections
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
IPS Core Protections
IPS core protections are installed via the access policy. However, even though you don't need a threat prevention and or IPS license, you need to activate the IPS blade, correct?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Not sure that's required since the entire reason they are enforced as part of Access Policy is because these protections are built into the firewall.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Not sure that's required since the entire reason they are enforced as part of Access Policy is because these protections are built into the firewall.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I believe what Phoneboy said has been the case for a long time now actually.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I think you can do it without IPS blade. You can attach the 'optimized setting' to a gateway that has no IPS blade enabled or license. Also same goes for GEO protection.
If you like this post please give a thumbs up(kudo)! 🙂
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Where can I find the optimized setting?
I guess I can try with no IPS blade but the policy type linked with the gateway needs to be both types access control and threat prevention, right?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Oh yeah, so you don't need to enable the IPS blade but you need to configure the policy as "threat prevention" policy type.
It feels a bit complex, because the policy contains all the IPS protections even though only the IPS core protections are expected to work without the IPS license. It would be nice if these 39 nine core protections were independent a bit like the inspection settings
Cool. Than you very much.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Of course mate, any time, happy to assist. By the way, keep in mind, these core protections are super basic, specially if you are NOT using ips blade, I think thats been there since long time ago.
Andy
Btw, I have really good eve-ng and Azure cp labs, so if you need me to test anything, happy to do it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Reference link, though Im sure you had seen it already.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Indeed what the_rock posted as his last screenshot
If you like this post please give a thumbs up(kudo)! 🙂
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
thanks. Yeah, I was aware of that way of filtering the core protections
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I figured you knew, since you said number 39, which is what shows there 🙂
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The 39 Core Activations exist in a kind of no man's land between Access Control & Threat Prevention, but everything stated in this thread is correct, you don't need the IPS feature enabled to use them. Core Activations have always been a bit confusing to deal with, and I'm happy to report that they are covered very nicely in the upcoming 2-day Threat Prevention Specialist course which should be released to Check Point ATCs worldwide later this month.
CET (Europe) Timezone Course Scheduled for July 1-2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Should the installation look like the file attached?
Threat prevention box available but not ticked.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Right you don't need Threat Prevention ticked.
CET (Europe) Timezone Course Scheduled for July 1-2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
All you need to remember is this...core protection will be ACTIVE, regardless if you have ips enabled. or install or not TP policy.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
But the problem is that I can't assign my gateway neither a threat prevention profile or a IPS Core Protection Profile.
I wonder if it has something to do with an Threat Prevention Layer generated by the system called IPS layer assigned (with 0 rules - coming from a migration from r77) and it is not used by it still exists
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you are allowed to do remote, Im sure we can figure it out quickly. Make sure policy editor looks something similar to below.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks Andy, I managed to configured it but with IPS blade enabled on the gateway.
There is no way to configure it IPS blade is not enabled as far I can see
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hm, thats odd, cause I did it in my lab without IPS on.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
how is it possible? Are we making a wrong assumption or perhaps different firmware version may have different behaviour.
I am in r80.40
Now, with the IPS blade on, I have tested removing the threat prevention layer and the IPS core protections profile is still applied.
So my conclusions:
1) I need the IPS blade installed on the gateway
2) I don't need the policy type to be threat prevention type and/or a threat prevention layer
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I dont have R80.40 to test, so cant say, sorry. I tested on R81.20 and worked for me WITHOUT ips blade enabled.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's possible that IPS Blade may need to be enabled to configure the protections in earlier releases (speaking to what @Luis_Miguel_Mig is saying).
However, they should still be enforced as part of the Access Policy.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Im thinking thats probably true 🙂
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
More and more this sounds like a SmartConsole GUI issue. Here is a very similar one for Inspection Settings that was fixed:
Inspection Settings GUI Change Question
Make sure you have the latest SmartConsole GUI software; it does not update automatically in R80.40.
CET (Europe) Timezone Course Scheduled for July 1-2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have just enabled the IPS blade and all of the sudden I can assign the IPS core protections profile.
So it seems like the IPS blade needs to be enabled even though the policy installation goes through the access policy.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As I mentioned the IPS blade was on so I could see the IPS core protections profile assigned to my cluster and I could even tested a few port-scans I could see port-scan alerts.
Now all of the sudden I have realized that the IPS process is down. I have followed https://support.checkpoint.com/results/sk/sk163752 to try to bring the IPS process on again but I can't. The cli tells me to do it from smartconsole but smartconsole doesn't manage do it anymore.
I wonder if there may be some license checks that don't allow me to run the IPS process if I don't have the IPS license
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can you send output of cplic print -x from the gateway?
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have manage to bring the IPS process on by installing the threat prevention layer.
And it seems like by doing that now, a trial license has been installed too.
I am trying to get use IPS core protections without any IPS license. And even though I expected it is possible due to the documentation and the conversations we had it seems that the IPS license is required. In R77.2O I was able to run port-scan detection without IPS license and it sounds that it is possible in R81.20 too. But in R80.40 (GW) and R81.10(MG) I am still not sure if it works.
Can I run the IPS process without the trial license? What will it happen when the trial license expires?
I was worried about being able to assign the IPS Core protections profile to the gateway but perhaps I don't need to be worried about it, and the default optimize IPS core protections may just work even if you can see the attached screen coreprotections_gateway.jpg (where I can only see my gateway and profiles if IPS blade is enabled)
[Expert@host:dplane]# cplic print -x
Host Expiration Signature Features
trial 19Jul2024 axxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx PNP_BLADE_IPS:V1:trial CPSB-IPS
ip never xxx CPSG-C-4-U CPSB-FW CPSB-ADNC CK-D1816C91E9CE
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Im pretty sure you can run it without trial license, BUT, it wont get any updates at all.
