<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Are IoC feeds processed before Access Control policy? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145302#M22868</link>
    <description>&lt;P&gt;One more question &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/177"&gt;@Peter_Elmer&lt;/a&gt;: Is this early &lt;SPAN&gt;IP reputation IoC list check performed in sim/SecureXL/SND or in a Firewall Worker/instance/fwk?&amp;nbsp; I would suspect the latter.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 02 Apr 2022 14:06:23 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-04-02T14:06:23Z</dc:date>
    <item>
      <title>Are IoC feeds processed before Access Control policy?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/143173#M22206</link>
      <description>&lt;P&gt;Our access control policy blocks specific countries in the source column of rule #1 (&lt;A href="https://community.checkpoint.com/t5/General-Topics/HowTo-Protections-against-a-Cyber-War/m-p/142613#M25304" target="_self"&gt;Geo block&lt;/A&gt;).&lt;BR /&gt;We also have IoC Feeds for that countries' IP addresses in place.&lt;/P&gt;
&lt;P&gt;Our firewall log shows:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 695px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15625iE61E4927E798B9A3/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Rule #1 (Geo Block) isn't listed within 'Matched Rules', just IPS and Threat Prevention:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 274px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15626i3B6E60E1BB798ABB/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Usually Access Control gets processed before Threat Prevention while it absolutely makes sense to block blacklisted IP addresses before Access Control. Since IoC Feeds are configured and installed with the Threat Prevention policy I'm trying to understand how IoC feeds work before Access Control.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 17:44:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/143173#M22206</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2022-03-08T17:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Are IoC feeds processed before Access Control policy?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/143262#M22241</link>
      <description>&lt;P&gt;You've asked a very good question as this runs counter to my understanding of the Order of Operations as well. After some digging I think I figured it out.&lt;/P&gt;
&lt;P&gt;From&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154&amp;amp;partition=Basic&amp;amp;product=Quantum" target="_blank" rel="noopener"&gt;sk103154: How to block traffic coming from known malicious IP addresses&lt;/A&gt;&amp;nbsp;which was the precursor to the newer Custom feeds:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;The traffic is blocked using the Anti-DoS feature (named "Rate Limiting for DoS mitigation" in &lt;A href="https://sc1.checkpoint.com/documents/R77/CP_R77_SecurityGatewayTech_WebAdmin/html_frameset.htm" target="_blank" rel="noopener"&gt;R77.X Security Gateway Technical Administration Guide&lt;/A&gt; - refer to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454" target="_blank" rel="noopener"&gt;sk112454 - How to configure Rate Limiting rules for DoS Mitigation&lt;/A&gt;).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The DoS mitigation features are implemented directly by SecureXL/sim and can match IP addresses to block before the packet even reaches the Access Control policy in the F2F path, I assume they are doing this feeds enforcement alongside the anti-spoofing enforcement inside SecureXL which would be pretty easy to add on.&amp;nbsp; It looks to me like when they introduced the Custom Feeds feature they retained the SecureXL-based enforcement mechanism from the older "drop malicious IP" feature.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Mar 2022 15:57:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/143262#M22241</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-08T15:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: Are IoC feeds processed before Access Control policy?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145144#M22742</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/687"&gt;@Danny&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;let me share what I found:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Where in packet processing is the enforcement of IP addresses listed in IoC feeds taking place?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;ATRG for Anti-Virus and AntiBot documents that ‘IP reputation’ engine is ignited by CMI Loader. CMI Loader is taking elements from Protocol Parsers (see IPS ATRG for details &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95193&amp;amp;partition=Advanced&amp;amp;product=IPS%22" target="_blank" rel="noopener"&gt;sk95193&lt;/A&gt;). Reading the text below the diagram of &lt;A title="ATRG AV + AB" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92264&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot,#Connection%20Flow" target="_blank" rel="noopener"&gt;sk92264 &lt;/A&gt;you see that ‘on new connection arrival’ we check IP address against ‘IP Reputation’.&lt;/P&gt;
&lt;P&gt;Extract from sk92264&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"On new connection arrival, in the first packet, before the Security rulebase:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- Malware rulebase matches a profile for Anti-Bot and Anti-Virus&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;- IP is classified by reputation IP address"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Conclusion&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;If you enable Anti-Virus and AntiBot you enable IP reputation verification software instance. As stated above ‘on new connection arrival’ this engine is called FIRST – BEFORE check for HTTPS Inspection and/or Access Control and/or Threat Prevention rule base. This is to save cycles on rule base processing in case the traffic is send from a source listed in the IP reputation IoC list.&lt;/P&gt;
&lt;P&gt;best regards&lt;/P&gt;
&lt;P&gt;pelmer&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 13:53:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145144#M22742</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-03-31T13:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Are IoC feeds processed before Access Control policy?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145146#M22743</link>
      <description>&lt;P&gt;Confirms more or less what I suspected earlier in the thread, thanks Peter!&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 13:57:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145146#M22743</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-03-31T13:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: Are IoC feeds processed before Access Control policy?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145171#M22751</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;this was my intention&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt; I wanted to back up your statement with the sk&amp;nbsp;&lt;/P&gt;
&lt;P&gt;greetings from Milano&lt;/P&gt;
&lt;P&gt;pelmer&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 16:16:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145171#M22751</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-03-31T16:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: Are IoC feeds processed before Access Control policy?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145302#M22868</link>
      <description>&lt;P&gt;One more question &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/177"&gt;@Peter_Elmer&lt;/a&gt;: Is this early &lt;SPAN&gt;IP reputation IoC list check performed in sim/SecureXL/SND or in a Firewall Worker/instance/fwk?&amp;nbsp; I would suspect the latter.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2022 14:06:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145302#M22868</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-04-02T14:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: Are IoC feeds processed before Access Control policy?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145347#M22883</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;it is my understanding that only capabilities documented in &lt;A title="Flow diagram" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454#Network%20Packet%20Flow" target="_blank" rel="noopener"&gt;sk112454&lt;/A&gt; are integrated in SecureXL when looking at the two flow diagrams documented in the sk.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-pelmer&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 05:49:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Are-IoC-feeds-processed-before-Access-Control-policy/m-p/145347#M22883</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-04-04T05:49:55Z</dc:date>
    </item>
  </channel>
</rss>

