- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Good morning. I have a Quantum Spark 1575 appliance that I cannot seem to get a rule to work to allow from & to a specific IP address. Our accounting system is a predominatly PHP app that runs on a Ubuntu 24..04 server. In the program is a update link for checking / updating the accounting software. When the link is executed, it fails to run but not 100% certain it is the firewall appliance. The logs are showing the IPS blade intercepting & blocking a command injection which under normal circumstances would be good. However, I verified it is occuring when executing the update link. I tried creating rules from the Thread Prevention -> Exceptions, new Access policy & even going as far as disabling all blades but cannot get the IPS to stop blocking the outgoing / incoming connection. Apparently, the continuing discussion with their tech support shows no functionality impairments or errors so, trying to eliminate this problem. Where & how to proceed???
Hi @Jon_AK
I suppose that, you sre using central management. (if not, and you are using local management, the method can be similar)
If I understand correctly you are unable to create an exception for this "command injection"
I don't know how tried to do that but you can apply an exception by the Core protections
The descriptions of the steps is under the screenshot
1-3 steps: this is straightforward
4-5: add the "Type" critera to the filter column
6: select the Core
7: choose the "command injection"
8: select exceptions
9: add the exception as you wish
Unfortunately I can't test it in my lab, because I can't reproducate the issue.
The corresponding documentation: documentation: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/...
Editing Core IPS Protections
To edit core protections|
Step |
Instructions |
|---|---|
|
1 |
Go to Security Policies > Threat Prevention > Custom Policy Tools > IPS Protections. Note - To filter for core protections, select Type Core in the Filters pane. |
|
2 |
Right-click a core protection and select Edit. |
|
3 |
Configure the required settings. |
|
4 |
Install the Threat Prevention policy. |
I hope it helps,
Akos
Hi @Jon_AK
I suppose that, you sre using central management. (if not, and you are using local management, the method can be similar)
If I understand correctly you are unable to create an exception for this "command injection"
I don't know how tried to do that but you can apply an exception by the Core protections
The descriptions of the steps is under the screenshot
1-3 steps: this is straightforward
4-5: add the "Type" critera to the filter column
6: select the Core
7: choose the "command injection"
8: select exceptions
9: add the exception as you wish
Unfortunately I can't test it in my lab, because I can't reproducate the issue.
The corresponding documentation: documentation: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/...
Editing Core IPS Protections
To edit core protections|
Step |
Instructions |
|---|---|
|
1 |
Go to Security Policies > Threat Prevention > Custom Policy Tools > IPS Protections. Note - To filter for core protections, select Type Core in the Filters pane. |
|
2 |
Right-click a core protection and select Edit. |
|
3 |
Configure the required settings. |
|
4 |
Install the Threat Prevention policy. |
I hope it helps,
Akos
Unfortunately, my screens don't come close to yours. I believe I found the core protections but the only thing available to do is disable or set to log only
It is a locally managed device. 😞 I don't have SMB appliance with local management, so I can't help further.
Otherwise. why don't you open a ticket by TAC? There are a lot of SMB experts 🙂
Ok, I am not sure what I was doing wrong, been to this particular setting several times but with the 1575 on local administration, it is Threat Prevention -> Exceptions. In the Protection column, Can't just type in Command Injection, had to search for it & then select it from the list. This was the first place I went to when working to allow this connection but could not get it to work. Now it is working fine. Thank you for your help. Guess I just wasn't holding my mouth right.....
No worries, that's why the forum was created (I think). And thanks for the screenshot, I haven't seen it before how is it looks like on a SMB appliance.
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY