<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I avoid &amp;quot;Host Port&amp;quot; scan? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/88326#M58610</link>
    <description>&lt;P&gt;Hi! is it possible to set the automatic SAM rules only on some of the&amp;nbsp;&lt;SPAN&gt;Security Gateways managed by this Security Management Server? I mean, in a situation where IPS is only enabled on the external GWs and detecting only incoming sweeps, and port scans arriving to the external interfaces from the internet, then there is no reason for setting the automatic SAM rules on the internal Gateways...&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jun 2020 06:22:43 GMT</pubDate>
    <dc:creator>Diego_dg</dc:creator>
    <dc:date>2020-06-12T06:22:43Z</dc:date>
    <item>
      <title>How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18550#M58596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a lot of "Host Port Scan" events in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I avoid "Host Port Scan"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In "Core Protecctions" we can only choice between "Accept" &amp;amp; "Inactive".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could youo help me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/68303_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Aug 2018 08:44:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18550#M58596</guid>
      <dc:creator>Carlos_Jara</dc:creator>
      <dc:date>2018-08-11T08:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18551#M58597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at this SK&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110873&amp;amp;partition=Advanced&amp;amp;product=Security"&gt;How to configure Security Gateway to detect and prevent port scan&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2018 07:33:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18551#M58597</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2018-08-13T07:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18552#M58598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you mean by avoid? On the internet there's almost no way to&amp;nbsp;avoid it, it happens all the time and everywhere.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind that a portscan could be a first phase of an attack,&amp;nbsp;looking at the cyber kill chain&amp;nbsp;(reconnaissance). The amount of info can be annoying if it happens frequently but I would always keep this logged. Unless it's false positive (which I doubt).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that the protection is enabled by default only for the strict profile.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;/Martijn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2018 10:16:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18552#M58598</guid>
      <dc:creator>MartijnElzenaar</dc:creator>
      <dc:date>2018-08-13T10:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18553#M58599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use options 4 or 5, depending on the desired outcome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/68567_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2018 15:16:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18553#M58599</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-08-13T15:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18554#M58600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;What mechanisms use this method?&amp;nbsp;Is this method relevant for VSX infrastructure? For example, we try to use method which&amp;nbsp;Enis Dunic described, but VSX doesn't support SAM mechanism.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2018 06:47:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18554#M58600</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-10-05T06:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18555#M58601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;VSX R80.20 does support the "fwaccel dos" commands &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/202253.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/202253.htm"&gt;'fwaccel dos' and 'fwaccel6 dos'&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208824.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208824.htm"&gt;fwaccel dos pbox&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208828.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208828.htm"&gt;fwaccel dos whitelist&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208822.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208822.htm"&gt;'fwaccel dos blacklist' and 'fwaccel6 dos blacklist'&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208825.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208825.htm"&gt;'fwaccel dos rate' and 'fwaccel6 dos rate'&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208954_1.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/208954_1.htm"&gt;'fw sam_policy add' and 'fw6 sam_policy add'&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 class="" style="color: #333333; background-color: inherit; font-weight: bold; text-decoration: none; font-size: 24px; margin: 0.5cm 0px 0em; padding: 65px 0pt 1px;"&gt;fw sam_policy add' and 'fw6 sam_policy add'&lt;/H3&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-size: 14px; padding: 0pt;"&gt;Description&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;The '&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;fw sam_policy add&lt;/CODE&gt;' and '&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;fw6 sam_policy add&lt;/CODE&gt;' commands let you:&lt;/P&gt;&lt;UL class="" style="color: #333333; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Add one Suspicious Activity Monitoring (SAM) rule at a time.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Add one Rate Limiting rule at a time.&lt;/LI&gt;&lt;/UL&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-size: 14px; padding: 0pt;"&gt;Notes:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL class="" style="color: #333333; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;You can run these commands interchangeably: '&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;fw sam_policy add&lt;/CODE&gt;' and '&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;fw samp add&lt;/CODE&gt;'.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Security Gateway stores the SAM Policy rules in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;$FWDIR/database/sam_policy.db&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;The SAM Policy management file is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;$FWDIR/database/sam_policy.mng&lt;/CODE&gt;.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;You can run these commands in Gaia Clish, or Expert mode.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;Configuration you make with these commands, survives reboot.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;SPAN style="color: #3366ff;"&gt;VSX Gateway does not support Suspicious Activity Policy configured in SmartView Monitor. See&amp;nbsp;&lt;A class="" href="http://supportcontent.checkpoint.com/solutions?id=sk79700" style="color: #3366ff;" target="_blank" title=""&gt;sk79700&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;SPAN style="color: #ff6600;"&gt;The SAM Policy rules consume some CPU resources on Security Gateway. We recommend &lt;/SPAN&gt;to set&lt;SPAN style="color: #ff6600;"&gt; an expiration that gives you time to &lt;/SPAN&gt;investigate,&lt;SPAN style="color: #ff6600;"&gt; but does not affect performance. The best practice is to keep only the SAM Policy rules that you need. If you confirm that an activity is risky, edit the Security Policy, educate users, or otherwise handle the risk.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;SPAN style="color: #008000;"&gt;On VSX Gateway, &lt;/SPAN&gt;first&lt;SPAN style="color: #008000;"&gt; go to the context of an applicable Virtual System.&lt;/SPAN&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;SPAN style="color: #008000;"&gt;In Gaia Clish, run:&amp;nbsp;&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;set virtual-system &amp;lt;&lt;/CODE&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;VSID&lt;/EM&gt;&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;&amp;gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;SPAN style="color: #008000;"&gt;In Expert mode, run:&amp;nbsp;&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;vsenv &amp;lt;&lt;/CODE&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;VSID&lt;/EM&gt;&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;&amp;gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;In Cluster, you must configure the SecureXL in the same way on all of the cluster members.&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 13:06:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18555#M58601</guid>
      <dc:creator>Ofir_Shikolski</dc:creator>
      <dc:date>2018-10-06T13:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18556#M58602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm... I really am not sure what the underlying mechanism is.&lt;/P&gt;&lt;P&gt;Can someone from Check Point answer this question:&lt;/P&gt;&lt;P&gt;When scanning or DOS rules are configured in the SmartEvent with the action set to "Block Source" how is it executed in simple (i.e. single gateway or cluster) and in VSX environments?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 13:19:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18556#M58602</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-10-06T13:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18557#M58603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/204653.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/204653.htm"&gt;fw sam&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;UL class="" style="color: #333333; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;SAM Requests are stored in the kernel table sam_requests on the Security Gateway.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;IP Addresses that are blocked by SAM rules, are stored in the kernel table&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="" style="background-color: inherit; padding: 0pt;"&gt;sam_blocked_ips&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on the Security Gateway.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;sam_alert:&lt;/STRONG&gt;&lt;BR /&gt;This tool executes FW-1 SAM actions according to information received through Standard input.&lt;BR /&gt;This tool is to be used for executing FW-1 SAM actions with FW-1 User Defined alerts mechanism.&lt;/PRE&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;EM&gt;&lt;STRONG&gt;sam_alert -t 120 -I -src &lt;/STRONG&gt;&lt;/EM&gt;:&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;This will set an automatic SAM rule (for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;all&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Security Gateways managed by this Security Management Server / Domain Management Server) with the Source IP address of the host that caused a hit on the IPS protection "Host Port Scan" during 120 seconds.&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;HTH,&lt;/P&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Ofir S&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 15:03:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18557#M58603</guid>
      <dc:creator>Ofir_Shikolski</dc:creator>
      <dc:date>2018-10-06T15:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18558#M58604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the SmartEvent actions are supposed to trigger SAM rules, is there enough intelligence in them to execute on VSX?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Oct 2018 18:31:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18558#M58604</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-10-06T18:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18559#M58605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This Host port scan provides many features as I know this is Shows the open TCP ports, services, and version information, Includes operating system information and reverse DNS results, The original Nmap output is also included.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2018 08:30:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18559#M58605</guid>
      <dc:creator>Berry_Smith</dc:creator>
      <dc:date>2018-10-11T08:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18560#M58606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question: where can I see IP addresses, which were blocked?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Oct 2018 08:35:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18560#M58606</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-10-18T08:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18561#M58607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should be in a SmartEvent view, not the SmartLog.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Oct 2018 11:41:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18561#M58607</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-10-18T11:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18562#M58608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;Yes, I understand this, but as I understand I will see only some events. Where can I see a list of blocked IPs by "Port Scan" signature?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2018 17:38:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18562#M58608</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-10-23T17:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18563#M58609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am actually not certain that you can see it in the list format. If the scan is blocked by creating a SAMP rule, and I do not see any other way it can be done without policy installation, it is added to the gateways kernel table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see them using "fw tab -t sam_blocked_ips" in hex, but will have translate the output to readable yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively, you can see the rules and the IPs blocked by SAMP here:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71988_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2018 19:38:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/18563#M58609</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-10-23T19:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/88326#M58610</link>
      <description>&lt;P&gt;Hi! is it possible to set the automatic SAM rules only on some of the&amp;nbsp;&lt;SPAN&gt;Security Gateways managed by this Security Management Server? I mean, in a situation where IPS is only enabled on the external GWs and detecting only incoming sweeps, and port scans arriving to the external interfaces from the internet, then there is no reason for setting the automatic SAM rules on the internal Gateways...&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 06:22:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/88326#M58610</guid>
      <dc:creator>Diego_dg</dc:creator>
      <dc:date>2020-06-12T06:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/88328#M58611</link>
      <description>&lt;P&gt;I have just seen that you can specify on sam_alert command the gateways or group of gateways on which you want to apply the rules, I think it should be someting such us:&lt;BR /&gt;&lt;BR /&gt;sam_alert -t 120 -f &amp;lt;nameGWs&amp;gt; -l src&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 07:26:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/88328#M58611</guid>
      <dc:creator>Diego_dg</dc:creator>
      <dc:date>2020-06-12T07:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/108487#M58612</link>
      <description>&lt;P&gt;Hello Vladimir,&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are using R80.40 and i can't see that this Smart Event Policy will do anything.&lt;/P&gt;&lt;P&gt;This means that the behavior is the same whether I use the tool or not. Can you tell me if you can be preventing some scans with this ?&lt;/P&gt;&lt;P&gt;Can i troubleshoot this&amp;nbsp; somehow ?&lt;/P&gt;&lt;P&gt;Many Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;thomas&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 08:57:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/108487#M58612</guid>
      <dc:creator>Thomas_Walter</dc:creator>
      <dc:date>2021-01-22T08:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/108493#M58613</link>
      <description>&lt;P&gt;Hello Berry,&amp;nbsp; i know what scans are.&lt;/P&gt;&lt;P&gt;To make it sure... I can identify over IPS the Host Port Scans and the Sweep Scans, but i´m not able to prevent them. Neither with Smart Event or with "&lt;SPAN&gt;sam_alert -t 120 -l src" in Global Properties as Alert.&amp;nbsp;Since I don't have much experience with checkpoint, I'm trying to figure out what I need to do differently to stop these scans.&amp;nbsp;I was hoping that other people here also had this problem and could give me some&amp;nbsp; help or ideas to make that is working.&amp;nbsp;&amp;nbsp;As I said: In smart event i have all scans with automatic replays configured. (Block source and block event activity - Source all Internet to any) AND i have configured what was recommended in the&amp;nbsp;sk110873. But if i look " fw tab -t sam_blocked_ips" the table is still empty and the scan is to see in SMART LOG as Alert and IDS detect. Now i try to understand why checkpoint can identify the scan but what i have to do more to prevent.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you have a idea , it would be create.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks thomas&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 09:24:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/108493#M58613</guid>
      <dc:creator>Thomas_Walter</dc:creator>
      <dc:date>2021-01-22T09:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: How can I avoid "Host Port" scan?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/157076#M58614</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone been able to block port scan in VSX?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2022 17:03:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-can-I-avoid-quot-Host-Port-quot-scan/m-p/157076#M58614</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2022-09-12T17:03:30Z</dc:date>
    </item>
  </channel>
</rss>

