Check Point Advisories

DNS Tunneling

Check Point Reference: CPAI-2013-1300
Date Published: 1 Jun 2015
Severity: N/A
Last Updated: 27 Nov 2018
Source:
Protection Provided by:

Security Gateway
R80, R77, R75, R71, R70

Who is Vulnerable?
Vulnerability Description DNS Tunneling is used to pass non-DNS information using DNS messages, which are normally allowed by security devices. Malicious users or malware may use DNS tunnels to bypass inspection by the security gateway. This protection is only applicable for IPS gateway version R77.30 and above. See sk103094: IPS protection "DNS Tunneling" is activated, but it does not generate any logs.

Protection Overview

This protection will detect and block attempts to setup a DNS tunnel.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75 / R71 / R70

  1. In the IPS tab, click Protections and find the DNS Tunneling protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Tunneling Detection.
Attack Information:  DNS Tunneling

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO