<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking malicious IP addresses SAMP rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151280#M24673</link>
    <description>&lt;P&gt;But, if I am right,&amp;nbsp;Custom Intelligence Feeds are only available if there is a TP license (Antivirus, AntiBot) on the GW, isn't it?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jun 2022 12:29:47 GMT</pubDate>
    <dc:creator>Diego_dg</dc:creator>
    <dc:date>2022-06-20T12:29:47Z</dc:date>
    <item>
      <title>Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151235#M24653</link>
      <description>&lt;P&gt;hey all,&lt;/P&gt;&lt;P&gt;I'm using the script from&amp;nbsp;&lt;SPAN&gt;sk103154 - How to block traffic coming from known malicious IP addresses, and I have a database of 100,000 malicious IPs, now I realize that I have only a little less than 7000 samp rules.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is it because of a limited number of samp rules or is that something with the script from the sk?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 08:12:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151235#M24653</guid>
      <dc:creator>israelgl</dc:creator>
      <dc:date>2022-06-20T08:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151259#M24662</link>
      <description>&lt;P&gt;Hi, I don't know if this could be related with your issue, but there is a limit in the size of the SAM file. You can enable/disable or change it on the Gateway object properties, under Other-&amp;gt; SAM , "purge sam file when it reaches...".&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 10:20:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151259#M24662</guid>
      <dc:creator>Diego_dg</dc:creator>
      <dc:date>2022-06-20T10:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151260#M24663</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Did you try sk112454, (6)&amp;nbsp;Deny List Configuration&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The deny list is configured using "&lt;CODE&gt;fwaccel dos deny&lt;/CODE&gt;" commands.&lt;BR /&gt;In R80.40 and higher versions, the deny list scales to millions of IP addresses.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 10:21:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151260#M24663</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-06-20T10:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151273#M24668</link>
      <description>&lt;P&gt;&lt;STRONG&gt;In order to block designated IP list, Check Point strongly recommend to use Custom Intelligence Feeds feature introduced in R80.30 - refer to&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193" target="_blank" rel="noopener"&gt;sk132193&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 11:37:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151273#M24668</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-06-20T11:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151280#M24673</link>
      <description>&lt;P&gt;But, if I am right,&amp;nbsp;Custom Intelligence Feeds are only available if there is a TP license (Antivirus, AntiBot) on the GW, isn't it?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 12:29:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151280#M24673</guid>
      <dc:creator>Diego_dg</dc:creator>
      <dc:date>2022-06-20T12:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151287#M24676</link>
      <description>&lt;P&gt;custom intelligence feed block traffic from outside only in r81.&lt;/P&gt;&lt;P&gt;in r80.40 I used sk&lt;SPAN&gt;103154&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 14:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151287#M24676</guid>
      <dc:creator>israelgl</dc:creator>
      <dc:date>2022-06-20T14:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151304#M24686</link>
      <description>&lt;P&gt;You are correct the IOC are used by Antivirus and AntiBot blades.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For what you needed, I would look into Generic DataCenter objects - we're using them for similar needs/requirements like you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Generic Data Center Object&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;From&amp;nbsp;R81, you can enforce access to and from IP addresses defined in files located in external web servers.&lt;/P&gt;
&lt;P&gt;To do that, use the Generic Data Center object in&amp;nbsp;SmartConsole. The Generic Data Center object points to a JSON file in an external server which contains the IP addresses which you want to access. This way, when the Generic Data Center object is used in a policy,&amp;nbsp;SmartConsole&amp;nbsp;can retrieve the IP information from the JSON file as necessary.&lt;/P&gt;
&lt;P&gt;You can host the JSON file also locally on the&amp;nbsp;Security Management Server.&lt;/P&gt;
&lt;P&gt;This feature is useful in cases where one&amp;nbsp;administrator&amp;nbsp;creates the&amp;nbsp;Rule Base&amp;nbsp;and defines the objects, and another&amp;nbsp;administrator&amp;nbsp;manages the content of these objects.&lt;/P&gt;
&lt;P&gt;This feature is supported in the&amp;nbsp;Access Control,&amp;nbsp;Threat Prevention,&amp;nbsp;HTTPS Inspection, and NAT&amp;nbsp;Rule Bases.&lt;/P&gt;
&lt;P&gt;The feature is supported only on a&amp;nbsp;Security Management Server&amp;nbsp;R81&amp;nbsp;and higher and&amp;nbsp;Security Gateway&amp;nbsp;(Cluster)&amp;nbsp;R81&amp;nbsp;and higher.&lt;/P&gt;
&lt;P&gt;After you create the Generic Data Center object, any change made in the file is automatically enforced on the&amp;nbsp;Security Gateway&amp;nbsp;with no need to install policy.&lt;/P&gt;
&lt;P&gt;To create the JSON file, follow the guidelines described in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167210" target="_blank"&gt;sk167210&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;For more information, see&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Generic-DC-Object.htm" target="_blank"&gt;&lt;I&gt;Generic Data Center Objects&lt;/I&gt;&lt;/A&gt;."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2022 16:47:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151304#M24686</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-20T16:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151409#M24722</link>
      <description>&lt;P&gt;i don't want to use object because i want to reduce load from the applince&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 05:17:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151409#M24722</guid>
      <dc:creator>israelgl</dc:creator>
      <dc:date>2022-06-22T05:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151411#M24723</link>
      <description>&lt;P&gt;IOC feeds or Generic DataCenter objects would imply similar appliance load, from my knowledge.&lt;/P&gt;
&lt;P&gt;Only difference is that they apply at different levels.&lt;/P&gt;
&lt;P&gt;Your choice&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 06:02:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151411#M24723</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-22T06:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151615#M24863</link>
      <description>&lt;P&gt;I used "fwaccel dos deny" and it works great and I even created a script that update the list every 20 min.&lt;/P&gt;&lt;P&gt;but I didn't find a way to see match table or logs, is there an option to log the drops?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 14:35:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151615#M24863</guid>
      <dc:creator>israelgl</dc:creator>
      <dc:date>2022-06-23T14:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151618#M24864</link>
      <description>&lt;P&gt;We also use "fwaccel dos deny" and we see&amp;nbsp; the drops on the logs, with the message shown below, maybe you need to configure "log drops: enable" with command "fwaccel config set ":&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;The packet's source IP is in the deny list (SecureXL device 0)&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;feature_name:&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;DOS/Rate Limiting Deny List&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;comment:&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Deny list&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 23 Jun 2022 14:49:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151618#M24864</guid>
      <dc:creator>Diego_dg</dc:creator>
      <dc:date>2022-06-23T14:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses SAMP rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151659#M24895</link>
      <description>&lt;P&gt;I have laid out a strategy for my company to use this too (sk103154).&amp;nbsp; The script is easily modified to also add your own site to maintain a list of internally designated IPs to drop.&amp;nbsp; And, it should work on VSX.&amp;nbsp; Then you just need a process to update your internally maintained blacklist and a hosting site inside your company.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 18:39:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-SAMP-rules/m-p/151659#M24895</guid>
      <dc:creator>George_Ellis</dc:creator>
      <dc:date>2022-06-23T18:39:11Z</dc:date>
    </item>
  </channel>
</rss>

