<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Excessive Denies from a source ip in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-Denies-from-a-source-ip/m-p/142551#M25272</link>
    <description>&lt;P&gt;It sounds like the firewall is doing its job. However if you are concerned about all the drops coming from single source IP address, this is a great use case for enabling the SecureXL penalty box which can very efficiently start blocking this type of traffic, and avoid the overhead of a full rulebase lookup for every dropped packet.&amp;nbsp; See section 9 of this SK:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank"&gt;sk112454: How to configure Rate Limiting rules for DoS Mitigation (R80.20 and higher)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 26 Feb 2022 15:37:31 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-02-26T15:37:31Z</dc:date>
    <item>
      <title>Excessive Denies from a source ip</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-Denies-from-a-source-ip/m-p/142530#M25270</link>
      <description>&lt;P&gt;We have recently set up SOC monitoring for our R80.40 Gateways. There have been constant alerts related to excessive denies from a single source or excessive prevent action logged by IPS.&lt;/P&gt;&lt;P&gt;My query is if the action is drop/reject or prevent for either neutral reputation or malicious reputation... are these kind of alerts relevant enough to be addressed or they are best left unattended considering Firewall on its own is taking care of these.&lt;/P&gt;&lt;P&gt;Or do i need to worry about Firewall Health or look at if a certain benchmark has been breached from a single source . for example : if there are more than150k or 100k hits from a single source then i should check certain things such as Firewall Health , Memory etc. ?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 16:34:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-Denies-from-a-source-ip/m-p/142530#M25270</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-02-25T16:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive Denies from a source ip</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-Denies-from-a-source-ip/m-p/142533#M25271</link>
      <description>&lt;P&gt;You can make IPS exception for it, or SAM rule to block it, but it sounds like the firewall is doing its job.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 18:38:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-Denies-from-a-source-ip/m-p/142533#M25271</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-25T18:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive Denies from a source ip</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-Denies-from-a-source-ip/m-p/142551#M25272</link>
      <description>&lt;P&gt;It sounds like the firewall is doing its job. However if you are concerned about all the drops coming from single source IP address, this is a great use case for enabling the SecureXL penalty box which can very efficiently start blocking this type of traffic, and avoid the overhead of a full rulebase lookup for every dropped packet.&amp;nbsp; See section 9 of this SK:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank"&gt;sk112454: How to configure Rate Limiting rules for DoS Mitigation (R80.20 and higher)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Feb 2022 15:37:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Excessive-Denies-from-a-source-ip/m-p/142551#M25272</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-02-26T15:37:31Z</dc:date>
    </item>
  </channel>
</rss>

