<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suspicious Activity Monitoring (SAM) Rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72172#M57028</link>
    <description>fw tab -t sam_blocked_ips -u will dump all the table entries.</description>
    <pubDate>Mon, 13 Jan 2020 23:55:17 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-01-13T23:55:17Z</dc:date>
    <item>
      <title>Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72143#M57021</link>
      <description>&lt;P&gt;The challenge was to block a lot of pub IPs. Allocated via Mgmt-Server.&lt;/P&gt;&lt;P&gt;Example to allocate on all SGW's I do following on Mgmt Server (CP R80.30)&lt;/P&gt;&lt;P&gt;fw sam -I subdst 2.237.76.249 255.255.255.255&lt;/P&gt;&lt;P&gt;Everything is fine and this IP is blocked on all our SGW's R80.10 til R80.30.&lt;/P&gt;&lt;P&gt;Problem is to check which IPs are in kernel table in this "blocking modus".&lt;/P&gt;&lt;P&gt;-----&lt;/P&gt;&lt;P&gt;So I did on the SGW:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;[Expert@SGW:0]# &lt;STRONG&gt;fw tab -t sam_blocked_ips&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;localhost:&lt;/P&gt;&lt;P&gt;-------- sam_blocked_ips --------&lt;/P&gt;&lt;P&gt;dynamic, id 8141, num &lt;STRONG&gt;ents 1175&lt;/STRONG&gt;, load factor 2.29, attributes: keep, , hashsize 512, limit 50000&lt;/P&gt;&lt;P&gt;&amp;lt;a7567bb0; 00000000, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;-&amp;gt;Example: a7=167&amp;nbsp; .56=186&amp;nbsp; .7b= 123 .b0=176 von HeX nach dEz !!!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&amp;nbsp; IPv4=&amp;nbsp; 167.186.123.176&amp;nbsp;&amp;nbsp; !!!!&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Actually 1175 entries are on this SGW active.&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT color="#000000"&gt;How can I see all this entries ? ?&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#000000"&gt;Is there a table to copy and to relocate to IPv4 (all this 1175 IPs ) ??&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;---&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;My output is following:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;[Expert@SGW:0]# &lt;STRONG&gt;fw tab -t sam_blocked_ips&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;localhost:&lt;/P&gt;&lt;P&gt;-------- sam_blocked_ips --------&lt;/P&gt;&lt;P&gt;dynamic, id 8141, num &lt;STRONG&gt;ents 1175&lt;/STRONG&gt;, load factor 2.29, attributes: keep, , hashsize 512, limit 50000&lt;/P&gt;&lt;P&gt;&amp;lt;a7567bb0; 00000000, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;46a935ea; 00000000, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;9a78e3ce; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;68efafd3; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;2d5094a8; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;830067c8; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;ba926e6c; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;be8ec86c; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;18b57d3e; 00000000, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;d44996e9; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;02ed4cf9; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;ba54ad99; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;92b9fdaf; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;59bc7c91; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;566240bd; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;4845632f; 00000001, 00000001, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000, 00000000&amp;gt;&lt;/P&gt;&lt;P&gt;...(16434 More)&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 13:10:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72143#M57021</guid>
      <dc:creator>Thomas_Bauer</dc:creator>
      <dc:date>2020-01-13T13:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72148#M57022</link>
      <description>&lt;P&gt;You may try with "-f" prameter.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 14:39:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72148#M57022</guid>
      <dc:creator>Neville_Kuo</dc:creator>
      <dc:date>2020-01-13T14:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72151#M57023</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;One below command is there to see the IP address other than you mentioned.&amp;nbsp;&lt;/P&gt;&lt;P&gt;fw sam_policy get&lt;/P&gt;&lt;P&gt;But, you can check all the IP addresses in SmartView Monitor --&amp;gt;Suspicious Activity Rules.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 14:43:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72151#M57023</guid>
      <dc:creator>Yatiraj_Panchal</dc:creator>
      <dc:date>2020-01-13T14:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72152#M57024</link>
      <description>&lt;P&gt;Hi , sorry but&amp;nbsp;&lt;SPAN&gt;fw sam_policy get&amp;nbsp; output is:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Get operation succeeded&lt;BR /&gt;no corresponding SAM policy requests&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 15:05:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72152#M57024</guid>
      <dc:creator>Thomas_Bauer</dc:creator>
      <dc:date>2020-01-13T15:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72153#M57025</link>
      <description>&lt;P&gt;Hi,&amp;nbsp; the -f parameter don't show me all 1125 entries ! Only a lot of actually session.&lt;/P&gt;&lt;P&gt;&lt;FONT face="impact,chicago"&gt;I did SAM rules via CLI&lt;/FONT&gt; !!!! That's important !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 15:11:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72153#M57025</guid>
      <dc:creator>Thomas_Bauer</dc:creator>
      <dc:date>2020-01-13T15:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72155#M57026</link>
      <description>&lt;P&gt;On SmartViewTracker I can see in a table following&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Unbenannt.JPG" style="width: 677px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3971i40FD4F8854EBD38A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Unbenannt.JPG" alt="Unbenannt.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;..but how can I export or edit it for "CLI" Administration ? I have more than 1000 entries to check .&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 15:25:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72155#M57026</guid>
      <dc:creator>Thomas_Bauer</dc:creator>
      <dc:date>2020-01-13T15:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72171#M57027</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18092"&gt;@Thomas_Bauer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is better - for performance reasons - to block this on SecureXL level.&lt;/P&gt;
&lt;P&gt;The SecureXL penalty box is a mechanism that performs an early drop of packets arriving from suspected sources.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why not sam policy rules?&lt;/P&gt;
&lt;P&gt;The SAM policy rules consume some CPU resources on Security Gateway. We recommend to set an expiration that gives you time to investigate, but does not affect performance. The best practice is to keep only the SAM policy rules that you need. If you confirm that an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk. Or better use SecureXL penalty box from a performance point of view.&lt;/P&gt;
&lt;P&gt;The purpose of this feature is to allow the Security Gateway to cope better under high load, possibly caused by a DoS/DDoS attack. These commands „fwaccel dos“ and „fwaccel6 dos“&amp;nbsp; control the Rate Limiting for DoS mitigation techniques in SecureXL on the local security gateway or cluster member.&lt;/P&gt;
&lt;P&gt;In version R80.20, the penalty box feature is now supported in VSX mode and each virtual system can be independently configured for penalty box operation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Attention!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In R80.20, all "sim erdos" commands are no longer supported. They have been replaced with equivalent commands which can be found under "fwaccel dos". Penalty box is configured separately for IPv4 and IPv6. IPv4 configuration is performed using the "fwaccel dos" command. IPv6 configuration is performed using the "fwaccel6 dos" command.&lt;/P&gt;
&lt;P&gt;More read here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/docs/DOC-3407-r80x-performance-tuning-tip-ddos-fw-sam-vs-fwaccel-dos" target="_blank" rel="noopener"&gt;R80.x - Performance Tuning Tip - DDoS „fw sam“ vs. „fwaccel dos“&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2020 21:33:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72171#M57027</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-01-13T21:33:04Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72172#M57028</link>
      <description>fw tab -t sam_blocked_ips -u will dump all the table entries.</description>
      <pubDate>Mon, 13 Jan 2020 23:55:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72172#M57028</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-01-13T23:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72175#M57029</link>
      <description>&lt;P&gt;Hello PhoneBoy,&lt;/P&gt;&lt;P&gt;many thanks.&lt;/P&gt;&lt;P&gt;fw tab -t sam_blocked_ips -u&amp;nbsp; &amp;nbsp;works and show all entries.&lt;/P&gt;&lt;P&gt;AddOn: Please add this cli command to a SK Articel - because I can't found it on any manuel /description.&lt;/P&gt;&lt;P&gt;Danke&lt;span class="lia-unicode-emoji" title=":clapping_hands:"&gt;👏&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 06:53:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72175#M57029</guid>
      <dc:creator>Thomas_Bauer</dc:creator>
      <dc:date>2020-01-14T06:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious Activity Monitoring (SAM) Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72762#M57030</link>
      <description>Pretty sure the "fw tab" command is documented in SK and in regular documentation as it's been around since the beginning of Check Point time. &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;</description>
      <pubDate>Mon, 20 Jan 2020 21:50:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-Activity-Monitoring-SAM-Rules/m-p/72762#M57030</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-01-20T21:50:27Z</dc:date>
    </item>
  </channel>
</rss>

