- Products
- Learn
- Local User Groups
- Partners
- More
CheckMates Fifth Birthday
Celebrate with Us!
days
hours
minutes
seconds
Join the CHECKMATES Everywhere Competition
Submit your picture to win!
Harmony Mobile 4:
New Version, New Capabilities
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hi,
We have a lot of "Host Port Scan" events in.
How can I avoid "Host Port Scan"?
In "Core Protecctions" we can only choice between "Accept" & "Inactive".
Could youo help me?
Hi,
Take a look at this SK How to configure Security Gateway to detect and prevent port scan
What do you mean by avoid? On the internet there's almost no way to avoid it, it happens all the time and everywhere.
Keep in mind that a portscan could be a first phase of an attack, looking at the cyber kill chain (reconnaissance). The amount of info can be annoying if it happens frequently but I would always keep this logged. Unless it's false positive (which I doubt).
I believe that the protection is enabled by default only for the strict profile.
HTH
/Martijn
Use options 4 or 5, depending on the desired outcome.
Hi Vladimir,
What mechanisms use this method? Is this method relevant for VSX infrastructure? For example, we try to use method which Enis Dunic described, but VSX doesn't support SAM mechanism.
VSX R80.20 does support the "fwaccel dos" commands
'fwaccel dos' and 'fwaccel6 dos'
'fwaccel dos blacklist' and 'fwaccel6 dos blacklist'
'fwaccel dos rate' and 'fwaccel6 dos rate'
+
'fw sam_policy add' and 'fw6 sam_policy add'
Description
The 'fw sam_policy add
' and 'fw6 sam_policy add
' commands let you:
Notes:
fw sam_policy add
' and 'fw samp add
'.$FWDIR/database/sam_policy.db
file.$FWDIR/database/sam_policy.mng
.In Gaia Clish, run: set virtual-system <
VSID>
In Expert mode, run: vsenv <
VSID>
Hmm... I really am not sure what the underlying mechanism is.
Can someone from Check Point answer this question:
When scanning or DOS rules are configured in the SmartEvent with the action set to "Block Source" how is it executed in simple (i.e. single gateway or cluster) and in VSX environments?
sam_blocked_ips
on the Security Gateway.sam_alert:
This tool executes FW-1 SAM actions according to information received through Standard input.
This tool is to be used for executing FW-1 SAM actions with FW-1 User Defined alerts mechanism.
sam_alert -t 120 -I -src :
This will set an automatic SAM rule (for all Security Gateways managed by this Security Management Server / Domain Management Server) with the Source IP address of the host that caused a hit on the IPS protection "Host Port Scan" during 120 seconds.
HTH,
Ofir S
If the SmartEvent actions are supposed to trigger SAM rules, is there enough intelligence in them to execute on VSX?
Hi! is it possible to set the automatic SAM rules only on some of the Security Gateways managed by this Security Management Server? I mean, in a situation where IPS is only enabled on the external GWs and detecting only incoming sweeps, and port scans arriving to the external interfaces from the internet, then there is no reason for setting the automatic SAM rules on the internal Gateways...
Best regards
I have just seen that you can specify on sam_alert command the gateways or group of gateways on which you want to apply the rules, I think it should be someting such us:
sam_alert -t 120 -f <nameGWs> -l src
Hi Vladimir,
One more question: where can I see IP addresses, which were blocked?
It should be in a SmartEvent view, not the SmartLog.
Hi Vladimir,
Yes, I understand this, but as I understand I will see only some events. Where can I see a list of blocked IPs by "Port Scan" signature?
I am actually not certain that you can see it in the list format. If the scan is blocked by creating a SAMP rule, and I do not see any other way it can be done without policy installation, it is added to the gateways kernel table.
You can see them using "fw tab -t sam_blocked_ips" in hex, but will have translate the output to readable yourself.
Alternatively, you can see the rules and the IPs blocked by SAMP here:
Hello Vladimir,
we are using R80.40 and i can't see that this Smart Event Policy will do anything.
This means that the behavior is the same whether I use the tool or not. Can you tell me if you can be preventing some scans with this ?
Can i troubleshoot this somehow ?
Many Thanks
thomas
This Host port scan provides many features as I know this is Shows the open TCP ports, services, and version information, Includes operating system information and reverse DNS results, The original Nmap output is also included.
Hello Berry, i know what scans are.
To make it sure... I can identify over IPS the Host Port Scans and the Sweep Scans, but i´m not able to prevent them. Neither with Smart Event or with "sam_alert -t 120 -l src" in Global Properties as Alert. Since I don't have much experience with checkpoint, I'm trying to figure out what I need to do differently to stop these scans. I was hoping that other people here also had this problem and could give me some help or ideas to make that is working. As I said: In smart event i have all scans with automatic replays configured. (Block source and block event activity - Source all Internet to any) AND i have configured what was recommended in the sk110873. But if i look " fw tab -t sam_blocked_ips" the table is still empty and the scan is to see in SMART LOG as Alert and IDS detect. Now i try to understand why checkpoint can identify the scan but what i have to do more to prevent.
If you have a idea , it would be create.
Thanks thomas
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY