Hi All, I am looking for a little guidance on best practices for Inspection Settings. I have Checkpoint R81 for the MGR and R80.40 on my gateways (soon to be upgraded).
The inspection setting I am specifically looking at is "Non HTTP Traffic on HTTP Port". I looked at the recommended and default profiles and both show "Inactive". I set mine to "Active" but just detecting so I could see the traffic. There is so much of it! Is there a reason now-a-days to have this set to inactive? Should we be expecting a lot of non-http traffic coming across on http ports? Is this no longer the threat it used to be? (I am just assuming it used to be a threat or why would they have created it to begin with and now have it inactive).
I found this article on cpug but it is from 2017. Looks like this company saw tons of traffic being dropped and it sounds like it caused issues for them. Unfortunately it was for Illegal Header Format and HTTP .9 https://www.cpug.org/forums/archive/index.php/t-22224.html
SK117392 (mentioned in the article) does not appear to be available and SK163481 is about illegal header format detected (I have none of these), mine seem to be mostly illegal start line.
This advisory makes it sound to me like it is very important to stop the traffic, but it is also old so maybe that is why now it is set to inactive...
https://www.checkpoint.com/defense/advisories/public/2012/cpai-2012-118.html/
I am really going down a rabbit hole here, if anyone has any insight I would surely appreciate it.
Thanks
terri