
Originally Posted by
dbrown3611
- Smart-1 225 SMS
- Two 5800 Active/Standby clusters
- All running R77.30 Build 092 with Jumbo HFA 286
In early August we enabled IPS protection for Non HTTP Traffic over HTTP port, immediately started seeing traffic being blocked to our web servers in DMZ. Being unable to determine why so much incoming traffic was caught by this protection, we set it to "Detect" and opened support ticket with our 3rd party support provider. They were unable to determine if this was a legitimate block or a false positive. They escalated to Check Point on August 11. All requests for information have been met in a timely manner.
It is now two months on and no determination has been provided. I have twice asked for escalation within Check Point support. I have engaged my regional Check Point Account Rep and Security Engineer. None of this has led to anything beyond updates stating "we are still looking at the problem". This leaves my management asking if we are receiving good value for the annual fees we pay to use Check Point products. I continue to answer in the affirmative.
The point of this post is to see if others in the community have similar behavior with inspections for "Non HTTP Traffic over HTTP port", and if so are they false positives. More so to ask, how does one get a determination out of Check Point support when methods used above are ineffective?
Kind regards,
dbrown
Bookmarks