- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We are running R81.10 JHF 132 on Quantum 6600 appliances. We are hosting DNS services for the public internet in a DMZ on TCP/UDP 53. Some time ago, our IPS started preventing DNS Data Overflow (Response packet too long, potential buffer overflow) attacks on TCP/53. In combination with these attacks, IPS bypass is activated and CPU Load increases to >80%. The appliance stops responding for some time, causing outages.
The traffic pattern usually includes a relatively low numer of connections from distributed source IPs. To me if looks like a OS vulnerability exploited by attackers.
To prevent this, we have contacted CheckPoint support, and activated DoS features such as rate limiting and penalty box. However, due to the traffic pattern mentioned above, these mitigations are not completely effective.
I am contacting the community, hoping to some more input on alternative mitigation methods regarding this specific attack. Maybe somebody has experienced the same type of attack and managed to find a solution?
Is the traffic accepted by implied rules or specific rules you have configured?
As a side how is the memory utilization throughout and do your UDP DNS (domain-udp) service objects in the policy use the default timeout values?
Hi, thanks for your input! Traffic is accepted by specific rules that were configured, and and memory usage does not show a noteable increase while CPU usage is high. We do use custom service objects for TCP/53 and UDP/53, but they use default timeout values. The only difference is that "Match for Any" in the custom object is checked...to my understanding this is not relevant.
DDoS attacks can have both a "volume" element and an application-specific element.
The DDoS Mitigation features can definitely help with traffic volume portions of a DDoS, though it sounds like this is targeting something specific to your DNS implementation.
Check Point does offer DDoS Protector appliances that are more geared towards addressing these challenges.
Are you using a cluster? DNS is notorious for causing a very high amount of state sync traffic which can drive up the CPU. On the Advanced setting of your services matching DNS, uncheck "Synchronize connections...".
There is a relatively new setting on the cluster object that only syncs connections/sessions that have lasted more than 3 seconds, but because UDP is stateless and the UDP session timeout is 40 seconds by default, these UDP DNS sessions always get synced and hang around for awhile.
If this doesn't help next step is setting Aggressive Aging and possibly lowering the more aggressive UDP timeout from its default of 15 seconds.
Thanks for your reply. I changed the parameters you suggested and will observe @PhoneBoy Thanks, I agree... something application-specific is being targeted. We have DDoS mitigation service we can activate during an attack, but not running permanently.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY