SlideShare a Scribd company logo
©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content
Q2, 2016 | 1
GENERAL CONFIGURATION (FOR ALL VENDORS)
 Networking - Use Layer 3 interfaces and routing instead of bridge mode/virtual wire/span port/port
mirror to reflect production network settings
 Policy Rules - Create policy rules with NAT & full session logging which reflect production policies
and has effect on performance
 Best Practices –Configure policy according to each vendor security best practices
Palo Alto Networks
 Enable Advanced Security – set Vulnerability and Anti-spyware security profiles to strict and
Antivirus profile to drop (equivalent to CP recommended protection)
 Logging – enable logging at the session start and at session end
 Disable Shortcuts – disable DSRI on all policy rules to prevent partial scan of traffic (this feature is
activated in PoC to gain better performance results)
*Palo Alto Web GUI > Policies > Add/edit rule > Actions
When testing different vendors in a PoC, it is important to do an Apples-to-Apples Comparison in order
to measure all vendors’ capabilities equally. Unfortunately, some security vendors use shortcuts with
their security solutions and products (e.g. IPS, AV) in order to gain better performance results in a
competitive PoC, which do not reflect their actual functionality and performance in production networks.
Shortcuts can improve performance but on the expense of the solution overall security. The list below,
will show how to expose if a vendor attempted to shortcuts and how to disable those shortcuts in a PoC
HOW TO EXPOSE SHORTCUTS IN COMPETITIVE POC
©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content
Q2, 2016 | 2
 Disable out-of-order Bypass –Palo Alto allow bypass of out-of-order packets by default.
Run the following command which disable bypass of out-of-order packets.(follow PAN best
practices guide https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/best-practices-for-securing-
your-network-from-layer-4-and-layer-7-evasions#16594 )
Check that out of order packets bypass is disabled by running the following commands:
> show system setting ctd state
Notify user for APP block : no
Alternative AHO : no
Skip CTD : no
Parse x-forwarded-for : no
Strip x-fwd-for : no
Bloom Filter : yes
HTTP Proxy Use Transaction : yes
Enable Regex Statistics : no
URL Category Query Timeout : 5
Bypass when exceeds queue limit for TCP: no
Bypass when exceeds queue limit for UDP: no
> show running application setting
Application setting:
Application cache : yes
Supernode : yes
Heuristics : yes
Cache Threshold : 16
Bypass when exceeds queue limit: no
©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content
Q2, 2016 | 3
Fortinet
 Enable Advanced Security – set IPS and Anti-Virus security profiles to block malware in all
policy rules , and set AV profile to proxy mode vs. quick/flow mode which is often used n
POC but has minimum security effect
*Fortigate > Policies & Objects > IPv4 Policies > Add/edit rule > Security Profiles
 Disable Shortcuts – disable intelligent-mode which scans only part of IPS/AV traffic
*Fortigate CLI > ‘config IPS global’ > ‘set intelligent-mode disable’
Cisco
 Enable Advanced Security – set IPS security profile to security over connectivity
 Disable Shortcuts – set the HTTP Client Body Extraction Depth to zero to inspect all HTTP
traffic
*FireSIGHT > Access Policy > Network Analysis Policy > create new > Choose ‘Security
over connectivity’ > go to ‘HTTP Configuration’ > change ‘HTTP Client Body Extraction
Depth’ from 4000 to 0

More Related Content

PDF
Check point response to Cisco NGFW competitive
PDF
How to Choose a SandBox - Gartner
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PDF
Check Point mission statement
PPTX
Check Point NGFW
PDF
Check point presentation june 2014
PPTX
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Check point response to Cisco NGFW competitive
How to Choose a SandBox - Gartner
CPX 2016 Moti Sagey Security Vendor Landscape
Check Point mission statement
Check Point NGFW
Check point presentation june 2014
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products

What's hot (20)

PPTX
Check Point: From Branch to Data Center
PPT
checkpoint
PPTX
Detección y mitigación de amenazas con Check Point
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PDF
Moti Sagey CPX keynote _Are All security products created equal
PPTX
Check Point Virtual Systems
PDF
Advanced threat security - Cyber Security For The Real World
PPT
Next Generation Security
PPTX
Check Point sizing security
PDF
Cisco Security Architecture
PPTX
TechWiseTV Workshop: OpenDNS and AnyConnect
PDF
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
PPT
Palo alto networks next generation firewalls
PDF
Check Point SandBlast and SandBlast Agent
PDF
Complete Endpoint protection
PPT
Panda Security2008
PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
PPTX
Check Point Threat emulation 2013
PPTX
Checkpoint Overview
PDF
Next Generation Security
Check Point: From Branch to Data Center
checkpoint
Detección y mitigación de amenazas con Check Point
Sourcefire Webinar - NEW GENERATION IPS
Moti Sagey CPX keynote _Are All security products created equal
Check Point Virtual Systems
Advanced threat security - Cyber Security For The Real World
Next Generation Security
Check Point sizing security
Cisco Security Architecture
TechWiseTV Workshop: OpenDNS and AnyConnect
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
Palo alto networks next generation firewalls
Check Point SandBlast and SandBlast Agent
Complete Endpoint protection
Panda Security2008
Building Up Network Security: Intrusion Prevention and Sourcefire
Check Point Threat emulation 2013
Checkpoint Overview
Next Generation Security
Ad

Viewers also liked (16)

PPTX
Palo Alto Networks authentication
PPTX
Checkpoint Firewall for Dummies
PDF
Hillstone-Corporate-Overview-EN-V3.0
PDF
When vendors post false claims (alternative facts)
PDF
Intel Security Endpoint Protection 2015
PPTX
IXIA Breaking Point
PDF
Joseph Indolos Palo Alto Networks - Accredited Sales Expert (ASE) Certificate
PPTX
Joseph indolos nutanix sales academy npsr-certificate
PPTX
Lecture The Search for Innovation
PDF
NGFW Brochure 08 08
PDF
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
PPTX
Zero Trust Networking with Palo Alto Networks Security
PDF
Palo Alto Networks VM en el AWS Summit Santiago 2016
PPTX
Malware analysis
PPTX
Summit x870
PDF
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks authentication
Checkpoint Firewall for Dummies
Hillstone-Corporate-Overview-EN-V3.0
When vendors post false claims (alternative facts)
Intel Security Endpoint Protection 2015
IXIA Breaking Point
Joseph Indolos Palo Alto Networks - Accredited Sales Expert (ASE) Certificate
Joseph indolos nutanix sales academy npsr-certificate
Lecture The Search for Innovation
NGFW Brochure 08 08
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Zero Trust Networking with Palo Alto Networks Security
Palo Alto Networks VM en el AWS Summit Santiago 2016
Malware analysis
Summit x870
Palo Alto Networks 2016 Cybersecurity Predictions
Ad

Similar to How to expose shortcuts in competitive poc (20)

PDF
2022 Update PCNSE Certification Exam Questions
PPTX
Palo Alto Networks, The Networking Security Company
PPTX
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
PPTX
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
PDF
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
PDF
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdf
PPTX
Palo Alto Networks Juniper CheckPoint.pptx
PDF
Palo alto networks product overview
PDF
Checkpoint 156-315.80 free demo download
PDF
Palo Alto Networks y la tecnología de Next Generation Firewall
PPTX
Palo Alto Networks 28.5.2013
PDF
Fact vs-hype top10
PPTX
User Expert forum Wildfire configuration
PDF
Securing your presence at the perimeter
PDF
4.1-cnse-study-guide.pdf
PDF
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
PPTX
Mind the gap_cpx2022_moti_sagey_final
PPT
Palo_Alto_Networks_Cust_June_2009.ppt
PDF
Palo alto outline course | Mostafa El Lathy
PDF
Locking down server and workstation operating systems
2022 Update PCNSE Certification Exam Questions
Palo Alto Networks, The Networking Security Company
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
pcnsa-study-guide_PAN-OS_v11.0-1__01.pdf
Palo Alto Networks Juniper CheckPoint.pptx
Palo alto networks product overview
Checkpoint 156-315.80 free demo download
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks 28.5.2013
Fact vs-hype top10
User Expert forum Wildfire configuration
Securing your presence at the perimeter
4.1-cnse-study-guide.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
Mind the gap_cpx2022_moti_sagey_final
Palo_Alto_Networks_Cust_June_2009.ppt
Palo alto outline course | Mostafa El Lathy
Locking down server and workstation operating systems

More from Moti Sagey מוטי שגיא (13)

PDF
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
PDF
Why Check Point - Top 4 Facts
PDF
Why check point win top 4 facts
PDF
Why Check Point - Moti Sagey
DOCX
NGFW RFP TEMPLATE - TEST PLAN
PPTX
Check point Infinity Overview
PPTX
Check Point vs competition security effectiveness
PDF
Why Check Point - Top 4
PPTX
Check Point Corporate Overview 2020 - Detailed
DOCX
Security architecture proposal template
PDF
Cyber Security Coverage heat map
PPTX
Check Point Solutions Portfolio- Detailed
PPTX
Cyber intro 2017_hebrew
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Why Check Point - Top 4 Facts
Why check point win top 4 facts
Why Check Point - Moti Sagey
NGFW RFP TEMPLATE - TEST PLAN
Check point Infinity Overview
Check Point vs competition security effectiveness
Why Check Point - Top 4
Check Point Corporate Overview 2020 - Detailed
Security architecture proposal template
Cyber Security Coverage heat map
Check Point Solutions Portfolio- Detailed
Cyber intro 2017_hebrew

Recently uploaded (20)

PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Testing WebRTC applications at scale.pdf
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
DOCX
Unit-3 cyber security network security of internet system
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
innovation process that make everything different.pptx
PPTX
Internet___Basics___Styled_ presentation
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
Introuction about ICD -10 and ICD-11 PPT.pptx
The Internet -By the Numbers, Sri Lanka Edition
Testing WebRTC applications at scale.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
Module 1 - Cyber Law and Ethics 101.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Unit-3 cyber security network security of internet system
Slides PDF The World Game (s) Eco Economic Epochs.pdf
An introduction to the IFRS (ISSB) Stndards.pdf
innovation process that make everything different.pptx
Internet___Basics___Styled_ presentation
international classification of diseases ICD-10 review PPT.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Slides PPTX World Game (s) Eco Economic Epochs.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
introduction about ICD -10 & ICD-11 ppt.pptx
Sims 4 Historia para lo sims 4 para jugar

How to expose shortcuts in competitive poc

  • 1. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content Q2, 2016 | 1 GENERAL CONFIGURATION (FOR ALL VENDORS)  Networking - Use Layer 3 interfaces and routing instead of bridge mode/virtual wire/span port/port mirror to reflect production network settings  Policy Rules - Create policy rules with NAT & full session logging which reflect production policies and has effect on performance  Best Practices –Configure policy according to each vendor security best practices Palo Alto Networks  Enable Advanced Security – set Vulnerability and Anti-spyware security profiles to strict and Antivirus profile to drop (equivalent to CP recommended protection)  Logging – enable logging at the session start and at session end  Disable Shortcuts – disable DSRI on all policy rules to prevent partial scan of traffic (this feature is activated in PoC to gain better performance results) *Palo Alto Web GUI > Policies > Add/edit rule > Actions When testing different vendors in a PoC, it is important to do an Apples-to-Apples Comparison in order to measure all vendors’ capabilities equally. Unfortunately, some security vendors use shortcuts with their security solutions and products (e.g. IPS, AV) in order to gain better performance results in a competitive PoC, which do not reflect their actual functionality and performance in production networks. Shortcuts can improve performance but on the expense of the solution overall security. The list below, will show how to expose if a vendor attempted to shortcuts and how to disable those shortcuts in a PoC HOW TO EXPOSE SHORTCUTS IN COMPETITIVE POC
  • 2. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content Q2, 2016 | 2  Disable out-of-order Bypass –Palo Alto allow bypass of out-of-order packets by default. Run the following command which disable bypass of out-of-order packets.(follow PAN best practices guide https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/threat-prevention/best-practices-for-securing- your-network-from-layer-4-and-layer-7-evasions#16594 ) Check that out of order packets bypass is disabled by running the following commands: > show system setting ctd state Notify user for APP block : no Alternative AHO : no Skip CTD : no Parse x-forwarded-for : no Strip x-fwd-for : no Bloom Filter : yes HTTP Proxy Use Transaction : yes Enable Regex Statistics : no URL Category Query Timeout : 5 Bypass when exceeds queue limit for TCP: no Bypass when exceeds queue limit for UDP: no > show running application setting Application setting: Application cache : yes Supernode : yes Heuristics : yes Cache Threshold : 16 Bypass when exceeds queue limit: no
  • 3. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non-confidential content Q2, 2016 | 3 Fortinet  Enable Advanced Security – set IPS and Anti-Virus security profiles to block malware in all policy rules , and set AV profile to proxy mode vs. quick/flow mode which is often used n POC but has minimum security effect *Fortigate > Policies & Objects > IPv4 Policies > Add/edit rule > Security Profiles  Disable Shortcuts – disable intelligent-mode which scans only part of IPS/AV traffic *Fortigate CLI > ‘config IPS global’ > ‘set intelligent-mode disable’ Cisco  Enable Advanced Security – set IPS security profile to security over connectivity  Disable Shortcuts – set the HTTP Client Body Extraction Depth to zero to inspect all HTTP traffic *FireSIGHT > Access Policy > Network Analysis Policy > create new > Choose ‘Security over connectivity’ > go to ‘HTTP Configuration’ > change ‘HTTP Client Body Extraction Depth’ from 4000 to 0