<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Indicator vs Implied rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227300#M43705</link>
    <description>&lt;P&gt;For the first issue, see:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk105740" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk105740&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For the second issue, what blades are active?&lt;BR /&gt;Network Feeds only require Firewall to be active, so it might be a better fit.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Sep 2024 22:23:09 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-09-19T22:23:09Z</dc:date>
    <item>
      <title>Indicator vs Implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/107125#M14338</link>
      <description>&lt;P&gt;hey,&lt;/P&gt;&lt;P&gt;anyone had a scenario in which he loaded an indicator file to block IP addresses and than keep seeing traffic from them accepted on implied rule?&lt;/P&gt;&lt;P&gt;i was wondering isn't indicator file should be "stronger" the implied rules ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 12:47:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/107125#M14338</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2021-01-06T12:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Indicator vs Implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/107134#M14341</link>
      <description>&lt;P&gt;Just to understand, are you referring to Thread Indicator file or something else?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 14:12:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/107134#M14341</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-06T14:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: Indicator vs Implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227269#M43702</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm replying to this (old) thread because I'd like to understand more about this topic: I have the same question of &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9638"&gt;@Dor_Marcovitch&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;Check Point version: R81.20&lt;/P&gt;&lt;P&gt;I have an &lt;STRONG&gt;External Indicator&lt;/STRONG&gt; (global) defined in &lt;STRONG&gt;Threat Prevention&lt;/STRONG&gt; blade, pointing to a text file hosted by an internal website (e.g. &lt;A href="https://MySite.com/IoC.txt" target="_blank" rel="noopener"&gt;https://MySite.com/IoC.txt &lt;/A&gt;). That file is listing public IP addresses that must be blocked (30 in total). The &lt;EM&gt;Test Feed&lt;/EM&gt; is working fine (all IP addresses are discovered successfully).&lt;/P&gt;&lt;P&gt;In order to test the new IoC, I put the public IP address of my home computer in that list:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I expected that when attempting to reach the public IP address of the Check Point gateway from my home PC via a browser (&lt;A target="_blank" rel="noopener"&gt;https://&amp;lt;CheckPointPublicIP&amp;gt;&lt;/A&gt;), I would be blocked by Check Point. Instead, according to the SmartConsole logs, the traffic is marked as &lt;STRONG&gt;Accept&lt;/STRONG&gt; by &lt;EM&gt;Implied Rule 0&lt;/EM&gt;.&lt;BR /&gt;I assume, then, that the implied rules take precedence over everything else (?). If that's the case, how can I prevent/solve this?&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;I expected that when attempting to reach a public IP address of an internal website published via Check Point (NAT) from my home PC, I would be blocked by Check Point. However, according to the SmartConsole logs, the traffic is marked as &lt;STRONG&gt;Accepted&lt;/STRONG&gt;&amp;nbsp;by the corresponding &lt;STRONG&gt;Access Rule&lt;/STRONG&gt; (allowing traffic from outside to the website).&amp;nbsp;&lt;BR /&gt;I have a feeling that the Indicator might not be working, or the traffic isn't being blocked because there is no actual malicious activity (I'm simply accessing a website through a browser). What can you tell me about this?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;U&gt;Main goal is to block any IP address on the IoC list, always.&lt;/U&gt;&lt;/P&gt;&lt;P&gt;I also tried with &lt;STRONG&gt;Network Feed&lt;/STRONG&gt; object put as Source in an&amp;nbsp;&lt;STRONG&gt;Access Rule &lt;/STRONG&gt;(destination &lt;EM&gt;Any&lt;/EM&gt;), but, again, traffic from my home computer versus the public IP address of the Check Point gateway is not blocked due to &lt;EM&gt;Implied Rule 0&lt;/EM&gt; (like point &lt;STRONG&gt;1&lt;/STRONG&gt;); however, traffic versus internal website is blocked by the Access Rule matching Network Feed (that is good).&lt;/P&gt;&lt;P&gt;What about all points above ?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 16:43:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227269#M43702</guid>
      <dc:creator>cyberluke365</dc:creator>
      <dc:date>2024-09-19T16:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Indicator vs Implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227300#M43705</link>
      <description>&lt;P&gt;For the first issue, see:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk105740" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk105740&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For the second issue, what blades are active?&lt;BR /&gt;Network Feeds only require Firewall to be active, so it might be a better fit.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 22:23:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227300#M43705</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-19T22:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Indicator vs Implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227330#M43718</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;thank you for your reply.&lt;/P&gt;&lt;P&gt;About the first: The SK you mentioned seems to address the issue with the &lt;EM&gt;Implied Rule&lt;/EM&gt;&amp;nbsp;issue quite well happening for both &lt;STRONG&gt;Threat Indicators&lt;/STRONG&gt; and &lt;STRONG&gt;Network Feeds&amp;nbsp;&lt;/STRONG&gt;(I will look into the matter further).&lt;/P&gt;&lt;P&gt;Network Feeds do their job blocking traffic versus NAT-ted websites (blocked by specific &lt;EM&gt;Access Rule&lt;/EM&gt;).&lt;/P&gt;&lt;P&gt;Regarding the second:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Firewall&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Application Control&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;URL Filtering&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;IPS&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Anti-Bot&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Anti-Virus&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;...&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What is not clear now is why, using (custom) Threat Indicators, traffic coming from blocked IP versus NAT-ted websites is allowed.&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 07:35:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227330#M43718</guid>
      <dc:creator>cyberluke365</dc:creator>
      <dc:date>2024-09-20T07:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: Indicator vs Implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227372#M43725</link>
      <description>&lt;P&gt;Keep in mind that the IP address configured in your feed needs to be the Original, pre-NAT address to block properly.&amp;nbsp; Just like in all Access Control and Threat Prevention policy layers, you need to match against the original IP addresses in the packet prior to any NAT operations.&amp;nbsp; Trying to match and block a post-NAT IP address will not work.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 12:58:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227372#M43725</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-09-20T12:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: Indicator vs Implied rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227416#M43740</link>
      <description>&lt;P&gt;Pre-R81, we didn't block incoming traffic from the Custom Threat Indicator feeds, only the outbound traffic.&lt;BR /&gt;If that's still happening in R81+, it warrants a TAC case.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 19:28:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Indicator-vs-Implied-rules/m-p/227416#M43740</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-20T19:28:38Z</dc:date>
    </item>
  </channel>
</rss>

