Hi,

I have an Checkpoint Express NGX R60 box running SmartDefense that has just 
taked to dropping all https traffic that is handled by our Squid proxy server 
which is in a DMZ. The specific SmartDefense error I get in the logs is: 

Number:         282920
Date:              24Oct2005
Time:             13:44:10
Product:         SmartDefense
Attack Name: Malformed HTTP
Interface:       eth0
Origin:            xxxxlfw01 (192.168.1.5)
Type:             Log
Action:            Reject
Service:         Squid_NTLM (3128)
Source:          xxxxxdc02 (192.168.1.7)
Destination:   xxxxxproxy01 (192.168.252.100)
Protocol:        tcp
Source Port:   1281
Reject ID:       435c588a-4-501a8c0-7b6
Information:   reason: WSE0020001 illegal header format detected: Illegal start 
line in request EURL^A^C
                      resource: Unknown

I have been unable to determine exactly which SmartDefense rule is dropping the 
packet - I have systematically gone through them and disbaling them one-by-one 
hasn't turned up the culprit so I've had to turn SmartDefense (as a very 
short-term measure) off to allow https traffic. This may or may not be relevant 
- we changed the address (from 192.168.1.254 to 192.168.1.2) of the firewall 
object on Saturday which caused some issues with SecureClient.

Can anyone suggest how I resolve this?

Thanks,
Duncan

=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to