<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Suspicious activity monitoring in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71537#M82364</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/39958"&gt;@Eric_Dale&lt;/a&gt;&amp;nbsp;exactly right.&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;enforcing early drops in SXL is rather risky, so it is limited for very specific functions, such as drop templates, where original drop decision is made by FW anyway.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;SAM blocking rules are still in fw/UP kernel modules&lt;/P&gt;</description>
    <pubDate>Fri, 03 Jan 2020 07:54:14 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2020-01-03T07:54:14Z</dc:date>
    <item>
      <title>Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71340#M82357</link>
      <description>&lt;P&gt;1. Where does the Suspicious Activity Monitoring Module comes in to picture in the packet flow diagram of Gaia R80.30?&lt;/P&gt;&lt;P&gt;2. How is the packet analysed &amp;amp; blocked based on the SAM Rules?&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. How will the gateways get updated to block the suspicious packet, once the SAM rules are specified in the Smart Console ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; Please explain.. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 09:29:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71340#M82357</guid>
      <dc:creator>Sangeeth_N</dc:creator>
      <dc:date>2019-12-30T09:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71347#M82358</link>
      <description>&lt;P&gt;Based on my experience the enforcement of SAM rules is very early in the F2F path, right around the antispoofing and Geo Policy checks and long before any policy layer lookups commence.&lt;/P&gt;
&lt;P&gt;SAM rules can specify the typical "5-tuple" matching criteria such as src IP, dst IP, src port (I think), dst port and IP protocol.&amp;nbsp; SAM rules long predate APCL, IA, and many other newer features so SAM rules cannot leverage identities or applications.&lt;/P&gt;
&lt;P&gt;The update on the gateway when a SAM rule is applied is immediate via service 18183 (FW1_sam).&amp;nbsp; The whole SAM rule thing (&lt;STRONG&gt;fw sam&lt;/STRONG&gt;) is a holdover from the Intrusion Detection System (IDS) days, where an IDS was not inline and could not actively block threats.&amp;nbsp; However through a process called "Intruder Shunning", the IDS could contact the firewall and tell it to block all traffic from an attacking IP address for a certain length of time.&amp;nbsp; The various user interfaces into adding Suspicious Activity Rules is just performing Intruder Shunning manually.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Dec 2019 14:31:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71347#M82358</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-12-30T14:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71378#M82359</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply..&lt;/P&gt;&lt;P&gt;Is there a diagram or any 'fw ctl chain' output representing the enforcement of SAM rules and anti-spoofing?&lt;/P&gt;&lt;P&gt;Because i am not able to find any anti-spoofing or SAM rules in the&amp;nbsp;&lt;SPAN&gt;R80.x Security Gateway Architecture (Logical Packet Flow) diagram mentioned in the below links :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Logical-Packet-Flow/td-p/41747" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Logical-Packet-Flow/td-p/41747&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/td-p/40244" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Security-Gateway-Packet-Flow-and-Acceleration-with-Diagrams/td-p/40244&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Dec 2019 05:50:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71378#M82359</guid>
      <dc:creator>Sangeeth_N</dc:creator>
      <dc:date>2019-12-31T05:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71381#M82360</link>
      <description>&lt;P&gt;It is in the slow path / FW Policy. SAM rules are enforced on top of everything else.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Dec 2019 08:15:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71381#M82360</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-12-31T08:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71413#M82361</link>
      <description>&lt;P&gt;Referring to R80.20 and newer, there are 3 closely related, but different mechanisms that are&amp;nbsp; often referred to as “SAM” or “fw samp”:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Suspicious Activity Monitor V1 (aka Suspicious Activity Monitoring Server):&amp;nbsp; this is configured in SmartConsole or via “fw sam” command line and is enforced by the firewall blade.&amp;nbsp; See sections 1 thru 6 of sk112061 for more details.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Suspicious Activity Monitor V2 (aka SAM Policy Editor):&amp;nbsp; this is configured via the command line (“fw sam_policy”) and is also enforced by the firewall blade.&amp;nbsp; See section 7 of sk112061.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;DOS/Rate limiting: this is configured via the “fw samp” command line.&amp;nbsp; This is enforced in SecureXL, which is more efficient since it is earlier in the packet flow.&amp;nbsp; See sk112454 for details.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, be aware of “fwaccel dos rate blacklist” which can block specific IP addresses more efficiently than any of the above mechanisms.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Dec 2019 17:16:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71413#M82361</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2019-12-31T17:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71434#M82362</link>
      <description>&lt;P&gt;&amp;gt; Suspicious Activity Monitor V2 (aka SAM Policy Editor): this is configured via the command line (“fw sam_policy”) and is also enforced by the firewall blade. See section 7 of sk112061.&lt;/P&gt;
&lt;P&gt;I do not believe this statement is correct, &lt;STRONG&gt;fw samp&lt;/STRONG&gt; and &lt;STRONG&gt;fw sam_policy&lt;/STRONG&gt; appear to be the same thing and enforced by SecureXL, not the firewall blade.&amp;nbsp; Please see the screenshot below which was taken on R80.30 Gaia 3.10 JHFA Take 111:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sam.png" style="width: 825px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3894i435D2E6E00F5D145/image-size/large?v=v2&amp;amp;px=999" role="button" title="sam.png" alt="sam.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jan 2020 15:03:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71434#M82362</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-01-01T15:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71474#M82363</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;fw samp and fw sam_policy are indeed interchangeable.&amp;nbsp; However, fw_samp is intended to be used for DOS/Rate limiting and fw sam_policy is intended to be used for SAMv2.&amp;nbsp; &amp;nbsp;Notice the different help text output for the "add" command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;[Expert@edale-b1:0]# fw samp add&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;add: subcommand is missing&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;NAME: fw samp add - add a new DOS/Rate Limiting policy rule&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;USAGE:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;fw samp add [-t &amp;lt;timeout&amp;gt;] {[-a &amp;lt;d|n|b&amp;gt;]} [-l &amp;lt;r |a&amp;gt;] [-n &amp;lt;name&amp;gt;] [-c &amp;lt;comment&amp;gt;] [-o &amp;lt;originator&amp;gt;] quota &amp;lt;quota limits&amp;gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;OPTIONS:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-t: expiration timeout (seconds)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-a: action: either d/rop, n/otify, or b/ypass&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-l: log: either r/egular or a/lert&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-n: name&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-c: comment&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;-o: originator&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;[Expert@edale-b1:0]# fw sam_policy add&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;add: subcommand is missing&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;NAME: fw sam_policy add - add a new SAM policy rule&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;USAGE:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;fw sam_policy add [-u] [-f &amp;lt;target&amp;gt;] [-t &amp;lt;timeout&amp;gt;] {[-a &amp;lt;d|r|n|b|q|i&amp;gt;]} [-l &amp;lt;r |a&amp;gt;] [-n &amp;lt;name&amp;gt;] [-c &amp;lt;comment&amp;gt;] [-o &amp;lt;originator&amp;gt;] ip &amp;lt;ip filter arguments&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The similarities in the command lines for SAM versus DOS/Rate limiting are unfortunate.&amp;nbsp; This will be addressed starting with R80.40&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding SecureXL versus FW enforcement:&lt;/P&gt;
&lt;P&gt;"fw samp ... &lt;STRONG&gt;quota&lt;/STRONG&gt;" rules are DOS/Rate limiting rules and are enforced in SecureXL&lt;/P&gt;
&lt;P&gt;"fw sam_policy ... &lt;STRONG&gt;ip&lt;/STRONG&gt;" rules are SamV2 rules and are enforced in FW&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 11:07:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71474#M82363</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2020-01-02T11:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71537#M82364</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/39958"&gt;@Eric_Dale&lt;/a&gt;&amp;nbsp;exactly right.&lt;BR /&gt;&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;enforcing early drops in SXL is rather risky, so it is limited for very specific functions, such as drop templates, where original drop decision is made by FW anyway.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;SAM blocking rules are still in fw/UP kernel modules&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 07:54:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71537#M82364</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-01-03T07:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71695#M82365</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/39958"&gt;@Eric_Dale&lt;/a&gt; please clarify what kernel and code version you ran commands &lt;STRONG&gt;fw samp add&lt;/STRONG&gt; and &lt;STRONG&gt;fw sam_policy add&amp;nbsp;&lt;/STRONG&gt;to get that usage output, on R80.30 Jumbo HFA Take 111 kernel versions 2.6.18 and 3.10 I am not seeing the same as what you posted.&amp;nbsp; I see what I posted earlier and the two commands are exactly the same thing as far as I can tell.&amp;nbsp; I get that "ip" is F2F path and "quota" is SXL path, but I don't understand where those usage statements you posted are coming from. &lt;/P&gt;
&lt;P&gt;I'm suspecting you ran those commands on R80.40?&amp;nbsp; Or perhaps a scalable platform?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2020 19:14:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71695#M82365</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-01-06T19:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: Suspicious activity monitoring</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71737#M82366</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I tested with R80.20 + JHF T118.&amp;nbsp; &amp;nbsp;It looks like that help text is in R80.20 and R80.40, but missed R80.30.&amp;nbsp; &amp;nbsp;I'll see that it gets into R80.30 jumbo.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2020 10:47:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Suspicious-activity-monitoring/m-p/71737#M82366</guid>
      <dc:creator>Eric_Dale</dc:creator>
      <dc:date>2020-01-07T10:47:06Z</dc:date>
    </item>
  </channel>
</rss>

