Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
nabil_l
Explorer

IPS - HTTP parsing error detected

Hello,

 

I am getting lots of log related to 

IPS-ISSUE.PNG. Bypassing the request as defined in the Inspection Settings. in IPS Blage log. It is allowing the traffic.

Why its bypassing?

0 Kudos
14 Replies
the_rock
Legend
Legend

How do you have geo policy defined? I see Nepal as dst country.

Andy

0 Kudos
nabil_l
Explorer

Hello,

I have implemented default Optimized cloned rule, all the setting are by default.

0 Kudos
the_rock
Legend
Legend

That was not my question though. Im wondering how you have geo policy defined, ie are you using updatable objects for it? If not, what version is this and how is legacy geo policy defined? Can you send a screenshot?

Andy

0 Kudos
nabil_l
Explorer

I have not configured any geo policy . This is R81.10 version.

0 Kudos
nabil_l
Explorer

I have not define any geo policy for now, all coutry name is shown in IPS Blade log with their public IPs.

0 Kudos
nabil_l
Explorer

Above screenshot is from Server to One of the public client, IPS is detecting but is not taking any action and allowing to pass the traffic.

0 Kudos
the_rock
Legend
Legend

I would see what remediation options it gives and follow that. Usually, inspection settings ALWAYS show as default, UNLESS you really want to protect further against ddos, then you set it to recommended. But again, this is DIFFERENT than optimized profile for IPS.

Andy

0 Kudos
nabil_l
Explorer

No any remediation available for this result as it has not detected any Attack Name, Protection Type, Protection Details. Is there is any way to block or inspect this type of Traffic i case any Event is detected by IPS Blade.

0 Kudos
the_rock
Legend
Legend

Screenshot_2.png

0 Kudos
nabil_l
Explorer

Even after doing this still i am getting same bypass log.

0 Kudos
nabil_l
Explorer

When i click on Add Exception, it say This protection Doesnot support Exception.

0 Kudos
the_rock
Legend
Legend

Then it has to be done via inspection settings.

0 Kudos
Timothy_Hall
Legend Legend
Legend

It is bypassing because you have fail-open (the default) set under Manage & Settings...Blades...Threat Prevention...Advanced Settings...General Settings...Fail Mode.  This setting still controls the Inspections Settings protections too even though they are part of the Access Control policy now (but didn't used to be). 

A situation occurred in which the inspection engine could not properly scan the traffic due to it being out of state, and the default behavior is to let it through.  Be careful about setting fail-close here since any traffic that cannot be properly scanned will be denied.  There are many, many situations that this can apply to that you may not be expecting, such as a password-protected zip file or a file larger than 150MB being encountered with certain types of inspection set.  These will start getting denied if you change this setting.

This setting is covered in the new Check Point Threat Prevention Specialist 2-day course, which was released to ATCs worldwide last month.  I recently ran this class for the first time and it got rave reviews for its detailed coverage of IPS (including Inspection Settings), AV, and ABOT.

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos
the_rock
Legend
Legend

Well, thats default setting out of the box, but let @nabil_l confirm how its configured.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events