You are on page 1of 34

IPS BEST PRACTICES

Peter Elmer | Threat Prevention Solutions Expert, Europe


pelmer@checkpoint.com
November 2016

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 1
Understanding the NGTP Engine
Maintaining the IPS Profile
Obtaining Visibility

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 2
Introduction to Check Point IPS

• Check Point IPS is working as using the NGTP Packet


Processing infrastructure.
̶ This presentation includes information about this
infrastructure. Some slides are hidden but the reader is
encouraged to study them all 

• Before enabling IPS get familiar with the health status


of your Security Gateway.
̶ The IPS functionality adds load to the system. It is
recommended to optimize the system before you enable
IPS.
The better You know Your system
the quicker You are troubleshooting it.

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 3
Introduction to Check Point IPS
IPS Signature Update Mailing List

• IPS Update Advisories

Subscribe to: https://www.checkpoint.com/advisories/


©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 4
Introduction to Check Point IPS
Innovative Protections against Ransomware

• Blocking the outbreak of Ransomware

File Server in
Data Center

Computer infected with Ransomware


©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 5
Introduction to Check Point IPS

• There are various IPS enforcement elements


̶ Engine Settings
̶ Signatures
̶ Protocol Anomalies
̶ Application Controls

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 6
Introduction to Check Point IPS

• Looking at a Signature

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 7
Introduction to Check Point IPS

• Enable Troubleshooting Mode for a Profile

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 8
Integrating
the IPS

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 9
Integrating the Check Point IPS
Where to place the IPS functionality?

• Close to the resources You want to protect.

• Why?
̶ You want to limit...
̶ the resources used
̶ the protections enabled
̶ the number of possible events
̶ the risk of false positives and false negatives

You want to achieve a clear reporting to be quick


in following up the events.

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 10
Integrating the Check Point IPS

External API Security Management


Data Center
Systems 3 Party
rd
Service
Management

Update Service
Internet

Local Security Gateway


Data Center
Services

Protection Scope Users


Users

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 11
Maintaining the IPS Policy

Detect Learn

Revise Decide

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 12
Create a Profile
Observe what is matching
Observe Performance Impact
Decide if what you see is what you expect
Revise the Profile Definitions

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 13
Protections and Profiles

• A Profile is
̶ Including a list of protections
̶ Applied to a gateway

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 14
Protections and Profiles

• Activate the protections needed for the protection


scope

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 15
Protections and Profiles

• Select Protection Categories that do not apply for this


protection scope

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 16
Protections and Profiles

• Use the “Follow Up” flag

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 17
Protections and Profiles

• Use the “Follow Up” flag and “right click” menu

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 18
IPS Updates

• Consider to work with Database Revision Control

Remember that Revision Control is not supported


when managing VSX Gateways (sk65420)
©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 19
Protections For Specific hosts
Application Intelligence

• Host objects may be flagged as a server to have


specific IPS Protections will be applied to this host

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 20
Protections for specific hosts
Web Intelligence

• HTTP Methods

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 21
Protections For Specific hosts
Application Intelligence

• Mail: POP3/IMAP

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 22
Monitoring

• Check Point Support sk43733 documents a tool to


measure the CPU resources
̶ Learn which IPS Protections are causing High CPU Load
̶ The script collects information to csv files

• In addition statistics about the Pattern Matcher can be


collected.
̶ These information can be analyzed by Check Point R&D

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 23
Monitoring and Performance Tuning

• Use SNMP to monitor the CPU and memory usage

• Extract from “IPS Best Practices Guide”


̶ Average load of the CPUs should be lower than 30%
̶ Peak load of the CPUs should not exceed 50%
̶ At least 20% of RAM should be free

Detect and Prevent Action have almost the same


performance impact.

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 24
Monitoring and Performance Tuning

• Consider if you need IPS Protections with


Performance Impact “Critical”.

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 25
Monitoring and Performance Tuning

• Best Practices for


Performance Tuning
are documented in
sk98348

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 26
IPS Reporting

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 27
IPS Reporting using R80 SmartEvent

• Flexible Reporting

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 28
NSS Labs
NGIPS Results 2016

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 30
NSS Labs NGIPS 2016

• Security Value Map

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 31
NSS Labs NGIPS 2016

Coverage by Attack Vector

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 32
NSS Labs NGIPS 2016

Concurrent TCP Connections

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 33
NSS Labs NGIPS 2016

“Real World” traffic mix performance

Performance given in the Datasheet

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 35
THANK YOU!

©2016 Check Point Software Technologies Ltd.  [Confidential] For designated groups and individuals​ 36

You might also like