<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190951#M35261</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22250i7083B9EA6808E05C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Tue, 29 Aug 2023 17:32:25 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-08-29T17:32:25Z</dc:date>
    <item>
      <title>BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/141589#M21864</link>
      <description>&lt;P&gt;Hello experts,&lt;/P&gt;
&lt;P&gt;Kindly guide me if its possible to have like a rule, blade or external connector or any recommended configuration in order to have protection on the Gateway perimeter&amp;nbsp; to block malicious reported IP address range like botnets, hackers etc? This is with the purpose to reduce having to create objects and manually applied to specific existing block rule on the network access layer.&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 20:49:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/141589#M21864</guid>
      <dc:creator>K_montalvo</dc:creator>
      <dc:date>2022-02-15T20:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/141594#M21865</link>
      <description>&lt;P&gt;ioc_feeds, available natively in R81 SmartConsole - refer&amp;nbsp;&lt;SPAN&gt;sk132193.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Importing-External-Custom-Intelligence-Feeds-in-SmartConsole.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Importing-External-Custom-Intelligence-Feeds-in-SmartConsole.htm&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Other options exist depending on your enabled blades and might leverage dynamic / imported&amp;nbsp;objects (sk167210) or the available APIs.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 00:28:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/141594#M21865</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-02-16T00:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/141595#M21866</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;What I always do is use below link, get all IPs from the txt file, slap it in .csv file, import in mgmt, create a rule with group object containing the file you import and thats it.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Chassis_AdminGuide/Topics-Chassis-AG/IP-Block-Feature.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Chassis_AdminGuide/Topics-Chassis-AG/IP-Block-Feature.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can also use below sites to confirm if site might be malicious.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.virustotal.com/gui/home/upload" target="_blank"&gt;https://www.virustotal.com/gui/home/upload&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.urlvoid.com" target="_blank"&gt;https://www.urlvoid.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 00:21:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/141595#M21866</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-16T00:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172171#M31265</link>
      <description>&lt;P&gt;known bad IP shouldn´t that be filtered within the IPS blade?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 13:50:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172171#M31265</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2023-02-21T13:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172173#M31266</link>
      <description>&lt;P&gt;Anti-bot &amp;amp; Anti-virus have such reputation based protections but if you wish to leverage external or custom feeds you need to use something else.&lt;/P&gt;
&lt;P&gt;- ioc_feed&lt;/P&gt;
&lt;P&gt;- Network feed objects (R81.20)&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 14:30:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172173#M31266</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-21T14:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172174#M31267</link>
      <description>&lt;P&gt;Sure but correct me out am wrong.&lt;/P&gt;&lt;P&gt;anti bot us for outgoing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;having a checkpoint provided ip list of bad stuff for incoming would be great, such as know bot network. Ips would be perfect for this.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 14:36:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172174#M31267</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2023-02-21T14:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172180#M31269</link>
      <description>&lt;P&gt;"perfect" is relative, some also might prefer fwaccel dos (SecureXL) level mitigation of such similar lists.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 14:57:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172180#M31269</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-21T14:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172181#M31271</link>
      <description>&lt;P&gt;Sure, seen also from check point &amp;nbsp;side as IPS is something you pay for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would be more than happy to have this as a regular dynamic object just as O365 to have “suspected IP ranges and DNS”&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 15:02:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172181#M31271</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2023-02-21T15:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172187#M31275</link>
      <description>&lt;P&gt;so true &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 15:11:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172187#M31275</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-21T15:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172190#M31278</link>
      <description>&lt;P&gt;The “incoming only” block for Anti-Bot was fixed in R81.&lt;BR /&gt;Even in R80.40 and earlier, while an outbound packet was allowed, the inbound replies were correctly blocked.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 15:20:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172190#M31278</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-21T15:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172245#M31293</link>
      <description>&lt;P&gt;Do you mean that Anti-Bot would block incoming attempts from known “bad” ip addresses to a web server based on these lists it has?&lt;/P&gt;&lt;P&gt;my understanding was been that anti-not was a post infection blade killing the C&amp;amp;C traffic or similar originating from the inside network to destination to C&amp;amp;C “bad ip”&lt;/P&gt;&lt;P&gt;if it dose both then it’s great &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Maybe something I just misunderstood.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Feb 2023 19:32:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172245#M31293</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2023-02-21T19:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172268#M31304</link>
      <description>&lt;P&gt;I had it reversed prior to R81: Inbound wasn't blocked, but the outbound reply was.&lt;BR /&gt;Either way, in R81 and above, feeds imported via ioc_feeds will be blocked inbound or outbound.&lt;BR /&gt;This is documented here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193&amp;amp;partition=Basic&amp;amp;product=Anti-Virus," target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193&amp;amp;partition=Basic&amp;amp;product=Anti-Virus,&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 01:55:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172268#M31304</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-22T01:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172271#M31306</link>
      <description>&lt;P&gt;How about anti bot without using custom feeds?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 02:13:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172271#M31306</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2023-02-22T02:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172272#M31307</link>
      <description>&lt;P&gt;On ThreatCloud feeds, I don't believe we block inbound (but could be wrong about that).&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 02:17:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/172272#M31307</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-22T02:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/173294#M31499</link>
      <description>&lt;P&gt;To utilise custom feeds do need both AB and AV blades enabled not just one of them in R81.10 anyway&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 06:27:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/173294#M31499</guid>
      <dc:creator>cem82</dc:creator>
      <dc:date>2023-03-02T06:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190935#M35250</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;the_rock! &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;can you please let me know how to block multiple IP's on Locally managed R81.10.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks &amp;amp; Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Shanil&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 16:52:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190935#M35250</guid>
      <dc:creator>shanil420</dc:creator>
      <dc:date>2023-08-29T16:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190936#M35251</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/84587"&gt;@shanil420&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Im not overly familiar with SMB appliances, so dont know if same method would work or not, but Im sure there is a way to import a list that can be blocked. Let me spin up a demo and will check for you,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 16:56:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190936#M35251</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-08-29T16:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190938#M35252</link>
      <description>&lt;P&gt;Please look at IOC Feeds feature:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;sk132193&amp;nbsp;What is the "Custom Intelligence Feeds" feature?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk132193" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk132193&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also refer to:&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Threat-Prevention/CheckMates-Tips-and-Tricks-IOCs-TAXII-feeds-and-API-automation/td-p/155890" target="_blank"&gt;https://community.checkpoint.com/t5/Threat-Prevention/CheckMates-Tips-and-Tricks-IOCs-TAXII-feeds-and-API-automation/td-p/155890&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 17:00:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190938#M35252</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2023-08-29T17:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190940#M35253</link>
      <description>&lt;P&gt;Thank you so much for your quick reply. Much appreciate the support&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 17:04:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190940#M35253</guid>
      <dc:creator>shanil420</dc:creator>
      <dc:date>2023-08-29T17:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190941#M35254</link>
      <description>&lt;P&gt;I was more thinking of adding generic data center object that can be used with .json file to block the bad known IPs, but I dont believe thats possible on locally managed SMB?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 17:06:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BLOCK-BAD-REPUTATION-IPS-IN-A-DYNAMIC-WAY/m-p/190941#M35254</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-08-29T17:06:13Z</dc:date>
    </item>
  </channel>
</rss>

