- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
I am getting lots of log related to
. Bypassing the request as defined in the Inspection Settings. in IPS Blage log. It is allowing the traffic.
Why its bypassing?
How do you have geo policy defined? I see Nepal as dst country.
Andy
Hello,
I have implemented default Optimized cloned rule, all the setting are by default.
That was not my question though. Im wondering how you have geo policy defined, ie are you using updatable objects for it? If not, what version is this and how is legacy geo policy defined? Can you send a screenshot?
Andy
I have not configured any geo policy . This is R81.10 version.
I have not define any geo policy for now, all coutry name is shown in IPS Blade log with their public IPs.
Above screenshot is from Server to One of the public client, IPS is detecting but is not taking any action and allowing to pass the traffic.
I would see what remediation options it gives and follow that. Usually, inspection settings ALWAYS show as default, UNLESS you really want to protect further against ddos, then you set it to recommended. But again, this is DIFFERENT than optimized profile for IPS.
Andy
No any remediation available for this result as it has not detected any Attack Name, Protection Type, Protection Details. Is there is any way to block or inspect this type of Traffic i case any Event is detected by IPS Blade.
Even after doing this still i am getting same bypass log.
When i click on Add Exception, it say This protection Doesnot support Exception.
Then it has to be done via inspection settings.
It is bypassing because you have fail-open (the default) set under Manage & Settings...Blades...Threat Prevention...Advanced Settings...General Settings...Fail Mode. This setting still controls the Inspections Settings protections too even though they are part of the Access Control policy now (but didn't used to be).
A situation occurred in which the inspection engine could not properly scan the traffic due to it being out of state, and the default behavior is to let it through. Be careful about setting fail-close here since any traffic that cannot be properly scanned will be denied. There are many, many situations that this can apply to that you may not be expecting, such as a password-protected zip file or a file larger than 150MB being encountered with certain types of inspection set. These will start getting denied if you change this setting.
This setting is covered in the new Check Point Threat Prevention Specialist 2-day course, which was released to ATCs worldwide last month. I recently ran this class for the first time and it got rave reviews for its detailed coverage of IPS (including Inspection Settings), AV, and ABOT.
Thank you for this info
Honestly though, if I were you, I would still open TAC case about it.
Andy
Hello, I have opened TAC. Thank you for your sugessation.
Hello, Please tell me, did you manage to find a solution to this problem?
Well, thats default setting out of the box, but let @nabil_l confirm how its configured.
Hello, I have used default setting and not changed Fail Safe mode. Failsafe mode is in bypass.
You can try change it, but not sure it may make a difference, but worth a shot.
Andy
I cant try this, as it is production environment and cant take risk.
I've seen this before and it started with Chrome browsers enabled that hybridised kyber thing. We enabled some support for it in JHF take 150 but I've not been able to validate if this stops those IPS accepts. What JHF take do you have on that gateway?
JHF 130
If you can, it would be good to update to the current recommended JHF and see if that has an effect.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
12 | |
6 | |
6 | |
6 | |
5 | |
4 | |
4 | |
4 | |
3 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY