CP R80.10 IPS BestPractices Guide
CP R80.10 IPS BestPractices Guide
CHECK POINT
R80.10 IPS
Best Practices
Classification: [Protected]
© 2018 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date
with the latest functional improvements, stability fixes, security enhancements and
protection against new and evolving attacks.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:cp_techpub_feedback@checkpoint.com?subject=Feedback on Check Point
R80.10 IPS Best Practices.
Revision History
Date Description
28 May 2018 Added IPS Protections removed in R80 (on page 6)
Introduction
In This Section:
R80.10 Improvements ....................................................................................................6
IPS Protections removed in R80 ....................................................................................6
R80.10 Improvements
Check Point R80.10 IPS makes it easy to manage security for complex networks. Please review
these new features in the Check Point R80.10 Security Management Administration Guide:
http://downloads.checkpoint.com/dc/download.htm?ID=54842
• Separated Access Control and Threat Prevention Policy
• Multiple Threat Prevention profiles per gateway.
• IPS protections pre-defined tags.
• Automatically saves multiple IPS updates, allowing reverting to a previous IPS update without
impacting other security configuration such as configuring profiles, rules, exceptions etc.
These new features help the administrator customize IPS profiles to fit the organization topology
and create the Threat Prevention Rule Base accordingly.
Initial Installation
The Check Point IPS Software Blade uses thousands of protections to keep your network safe.
When you set up IPS for the first time, it is impossible to analyze each protection.
The Optimized Profile gives excellent security with good performance impact. This profile enables
all protections that:
• Protect against relevant and important threats in commonly used products.
• Detect the attack in a reliable way.
• Have a moderate performance impact.
We recommend using the Optimized profile.
Updating Protections
When enabling IPS for the first time, the most recent IPS protections will be loaded. We
recommend that you use a manual update the first time you update IPS and then automate the
process.
IPS Updates
Check Point releases new IPS protections almost daily. Review the published Check Point IPS
Security Update, which contains new and updated protections including protections against urgent
and zero-day vulnerabilities. If the protections are crucial for your network, deploy them in
Prevent mode. Consider the benefit of preventing active malware and attacks in the wild using
Check Point IPS.
Software Upgrades
It is important to review the Release Notes for new software versions and regularly install
software updates. Check Point IPS combines the features of the IPS engine and new protections
that are continually added. The engine is the core code that parses and inspects the traffic and it is
often improved as part of software upgrades for Security Gateways. These upgrades give better
IPS protections and performance.
User Communities
We encourage you to learn, share and inspire using our CheckMates platform
http://community.checkpoint.com.
6. To edit a Web server, select the Web server in the list and click Edit.
The Check Point Host window opens, displaying the Web Server category, which is added to a
host that is defined as a Web server.
You can configure connectivity-security balance for each type of Web Intelligence protection in the
protection’s window, but enforcement of these configurations always depends on whether they are
activated by the Web server’s IPS profile.
Excluding Protections
The IPS profile may include protections that are not necessary for your network. You can exclude
these IPS protections and improve network performance. For example, if an organization does not
use VoIP services, exclude the IPS protection for VoIP traffic.
Separate Profiles
The initial performance tuning focuses on a single IPS profile that is optimized for many
situations. However, we recommend you create a different policy per network segment and
gateway according to the protected assets and assign different profiles to each rule in the policy.
Examples of separate profiles:
• Gateways on the perimeter frequently use a different profile than gateways that protect data
centers
• Different network segments protect different types of protocols, client/server, applications etc.
Performance Tuning
In This Section:
Overview ........................................................................................................................17
Monitoring Performance Impact .................................................................................17
Configuring the Security Gateway Performance Settings ..........................................18
Overview
The following sections show different methods to reduce IPS protections performance impact and
to improve gateway performance.
Note - The performance impact of a protection is almost the same for Prevent and Detect modes.
Prevent mode sometimes drops traffic and does not inspect it.