<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking malicious IP addresses (sk103154) in VSX in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79759#M9212</link>
    <description>&lt;P&gt;Thank you &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt; . I will try with MGMT API.&lt;/P&gt;</description>
    <pubDate>Thu, 26 Mar 2020 07:43:39 GMT</pubDate>
    <dc:creator>redcrow</dc:creator>
    <dc:date>2020-03-26T07:43:39Z</dc:date>
    <item>
      <title>Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78768#M9201</link>
      <description>&lt;P&gt;&lt;STRONG&gt;UPDATE 04/08/2020&lt;/STRONG&gt;: Please visit this page to download the latest version of the script: &lt;A href="https://www.francescoficarola.com/check-point-automated-ip-blacklist/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.francescoficarola.com/check-point-automated-ip-blacklist/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;my configuration is the following:&lt;/P&gt;&lt;P&gt;- A cluster of three security gateways (R80.20)&lt;/P&gt;&lt;P&gt;- Three Virtual Systems (configured on the three security gateways as follow: active/standby/backup)&lt;/P&gt;&lt;P&gt;I already activated the IOC Feed functionality on one of my VS to block outgoing traffic through Anti-Bot &amp;amp; Anti-Virus blades (sk132193), but I'd like to block incoming malicious traffic as well. I read the sk103154 documentation, which says the script must be ran on the management server.&lt;/P&gt;&lt;P&gt;I followed all steps, but when I run the script, it returns the following error:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;[Expert@xntfw-pmgt1:0]# ./ip_block_activate.sh -a on -g gw_list -f feed_urls -s /home/admin/blacklist/ip_block.sh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Error: could not retrieve FWDIR from 10.100.97.101&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Error: could not retrieve FWDIR from 10.100.97.101&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;(10.100.97.101 is the VS' IP)&lt;/P&gt;&lt;P&gt;Indeed, if I run the command responsible of that error into the script, I don't receive any output:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;[Expert@xntfw-pmgt1:0]# cprid_util -server 10.100.97.101 getenv -attr "FWDIR"&lt;BR /&gt;&lt;BR /&gt;[Expert@xntfw-pmgt1:0]#&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;but, if I run the same command with the management IP of the Security Gateway, then it gives me the following output:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;[Expert@xntfw-pmgt1:0]# cprid_util -server 192.168.77.192 getenv -attr "FWDIR"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;/opt/CPsuite-R80.20/fw1&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;So... is this functionality available for VSX environments?&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Francesco&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 08:28:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78768#M9201</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-08-05T08:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78812#M9202</link>
      <description>&lt;P&gt;I can see you are running this in VS0 content. That is the first mistake. Also, use the absolute path for VS FWDIR folder&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 15:24:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78812#M9202</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-19T15:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78817#M9203</link>
      <description>&lt;P&gt;I'm running in VS0 because that is the management server.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="screen.png" style="width: 292px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4883iAC1FD0C3C50E0CB2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="screen.png" alt="screen.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 15:37:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78817#M9203</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-03-19T15:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78825#M9204</link>
      <description>&lt;P&gt;Got it, you are correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MDS or SMS? If former, you have to specify mdsenv first.&lt;BR /&gt;&lt;BR /&gt;Also, the SK does not mention VSX among supported targets. I have reached to the case owner for some clarification.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 15:58:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78825#M9204</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-19T15:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78826#M9205</link>
      <description>&lt;P&gt;SMS.&lt;/P&gt;&lt;P&gt;Ok, thanks. I'll wait for any news.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 16:01:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/78826#M9205</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-03-19T16:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79236#M9206</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;have you received any news?&lt;/P&gt;&lt;P&gt;Thank you very much,&lt;BR /&gt;Francesco&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 18:15:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79236#M9206</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-03-22T18:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79307#M9207</link>
      <description>&lt;P&gt;Not just yet, still waiting for the reply. Thanks for your patience.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 07:58:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79307#M9207</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-23T07:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79464#M9208</link>
      <description>&lt;P&gt;After reviewing the script, it is based on the physical GW context. Per VS modification is possible, but I do not find it too practical.&lt;BR /&gt;&lt;BR /&gt;Please consider using regular SAM rules instead&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 07:45:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79464#M9208</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-24T07:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79560#M9209</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;: thank you. Yes, I could use SAM rules, but things are a bit different in that case. I mean, it is supposed to work on monitoring, not on feeds.&lt;/P&gt;&lt;P&gt;May you please share the VS modification for the sk103154?&lt;/P&gt;&lt;P&gt;Thanks again for your support!&lt;BR /&gt;Francesco&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 15:02:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79560#M9209</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-03-24T15:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79564#M9210</link>
      <description>&lt;P&gt;The script relies on SAM rules, that is the first fact. It creates SAM rules from the feed every 20 minutes and deletes the old ones. Everything is done assuming it is a physical FW, not VSX, running on Gaia. VSX mode is not verified, so it tries to run and fails for you.&lt;BR /&gt;&lt;BR /&gt;You need a completely different method for VSX. The tool should be completely re-written.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;So coming to your original question, &lt;U&gt;this tool is not supported for VSX.&lt;/U&gt; If you need something automated, take the feed and set up block rules through MGMT API, or, as already suggested, use SAM rules.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 15:26:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79564#M9210</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-24T15:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79569#M9211</link>
      <description>&lt;P&gt;One more suggestion. You can create a dynamic object and then fill it with output of&amp;nbsp;&lt;A href="https://secureupdates.checkpoint.com/IP-list/TOR.txt" target="_blank"&gt;https://secureupdates.checkpoint.com/IP-list/TOR.txt&lt;/A&gt;&amp;nbsp;feed via GW side script. Then, use that object in a drop rule on top of the policy.&amp;nbsp;Also, that should be done on VS context.&lt;BR /&gt;&lt;BR /&gt;You can take bits and pieces from Office365 script here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Basic-script-for-importing-IP-Address-objects-from-feed-here/td-p/40830" target="_blank"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Basic-script-for-importing-IP-Address-objects-from-feed-here/td-p/40830&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I still think leveraging MGMT API is easier. Set an empty group, repopulate it with TOR from time to time, publish, push policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 15:53:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79569#M9211</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-24T15:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79759#M9212</link>
      <description>&lt;P&gt;Thank you &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt; . I will try with MGMT API.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 07:43:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79759#M9212</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-03-26T07:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79760#M9213</link>
      <description>&lt;P&gt;The SK now says:&amp;nbsp;&lt;SPAN&gt;Not supported on VSX Gateway and on Scalable Platforms.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As it should. Just FYI&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 07:56:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/79760#M9213</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-26T07:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/81904#M9214</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm just trying to "adapt" the script you linked to my use-case. I've made some changes and everything works well, but I have some problems with blacklists containing a high number of IPs because the API session expires.&lt;/P&gt;&lt;P&gt;For instance, the issue occurs if I try to import the &lt;STRONG&gt;FireHOL Level 3&lt;/STRONG&gt; list (containing more than &lt;STRONG&gt;17K IPs&lt;/STRONG&gt;). Please see the script attached.&lt;/P&gt;&lt;P&gt;I've also added a &lt;STRONG&gt;session-timeout&lt;/STRONG&gt; of 1 hour to the login call (line 62):&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;mgmt_cli login user $v_cpuser password $v_cpuserpw &lt;STRONG&gt;session-timeout 3600&lt;/STRONG&gt; --format json &amp;gt; id.txt&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;In doing so, the script could import more IPs, but not enough to complete the whole list. Indeed, after around 3K-4K IPs, the session always expires:&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;code: "generic_err_wrong_session_id"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;message: "Wrong session id [oLZge4cBkVQqZSYdLHX0awi3p9PsXnW-VmINXBjMcoc]. Session may be expired. Please check session id and resend the request."&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;In order to avoid the expiration, I've also added a &lt;STRONG&gt;keepalive&lt;/STRONG&gt; before each addition of&amp;nbsp; network object (line 116):&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;... { print "&lt;STRONG&gt;mgmt_cli keepalive -s id.txt&lt;/STRONG&gt; &amp;gt; /dev/null 2&amp;gt;&amp;amp;1; ...&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, nothing changed.&lt;/P&gt;&lt;P&gt;Furthermore, in order to save changes "step-by-step", I've added a publish action every 500 additions of network object (line 118-119):&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;awk '{print;} NR % 500 == 0 { print "mgmt_cli publish -s id.txt"; }' $v_diff_add_sh &amp;gt; $v_diff_add_sh_awk&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;mv $v_diff_add_sh_awk $v_diff_add_sh&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Do you have any suggestions to keep "alive" the session? I can't understand why it expires if there's the keepalive before every network object addition.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Francesco&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 06:21:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/81904#M9214</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-04-15T06:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/81938#M9216</link>
      <description>&lt;P&gt;Look here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Web-API-timeout/td-p/52741" target="_blank"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Web-API-timeout/td-p/52741&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In short, it is not API timeout, it is POST Apache timeout (see the answer in the thread). I would recommend breaking down the list to smaller portion, posting them separately within the same script.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 09:59:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/81938#M9216</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-04-15T09:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/82131#M9217</link>
      <description>&lt;P&gt;&lt;STRONG&gt;UPDATE 04/08/2020&lt;/STRONG&gt;: Please visit this page to download the latest version of the script: &lt;A href="https://www.francescoficarola.com/check-point-automated-ip-blacklist/" target="_blank"&gt;https://www.francescoficarola.com/check-point-automated-ip-blacklist/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;Thank you for the information. Anyway, I changed my approach because &lt;STRONG&gt;mgmt_cli&lt;/STRONG&gt; requires too much time to complete a blacklist of more than 20K objects. Furthermore, it adds real objects in the database and that should be avoided. So, I followed your suggestion and I studied dynamic objects; then I wrote another script (based on opendbl.net script).&lt;/P&gt;&lt;P&gt;I love sharing information, so I've attached all the code.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;USAGE&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create the following paths on your Security Gateway:&lt;UL class="lia-list-style-type-square"&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;mkdir -p /scripts/blacklist/feeds&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;mkdir -p /scripts/blacklist/logs&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Upload the scripts in &lt;FONT face="courier new,courier"&gt;/scripts/blacklist&lt;/FONT&gt; of your Security Gateway&lt;/LI&gt;&lt;LI&gt;Change the value of the variable &lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;VSID&lt;/FONT&gt; &lt;/STRONG&gt;in each file (in a future version I'll change the scripts with a file inclusion having all common variables). For instance, my Virtual System ID where I'm using dynamic objects is 4.&lt;/LI&gt;&lt;LI&gt;Run the file blacklist.sh as follow:&lt;UL class="lia-list-style-type-square"&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;./blacklist.sh sapienza on&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;./blacklist.sh dshield on&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Check if task have been scheduled:&lt;UL class="lia-list-style-type-square"&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;./blacklist.sh sapienza stat&lt;BR /&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;./blacklist.sh dshield stat&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;cpd_sched_config print&lt;BR /&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Check if the dynamic objects file has been filled&lt;UL class="lia-list-style-type-square"&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;vsenv &amp;lt;id&amp;gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;dynamic_objects -l | grep name&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;dynamic_objects -l | less&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Create the same dynamic objects on your Smart Console (press F9 to open the CLI and execute the following commands)&lt;UL class="lia-list-style-type-square"&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;add dynamic-object name "BLDO_sapienza" comments "A set of top blacklists on the Internet" color "red"&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;add dynamic-object name "BLDO_dshield" comments "DShield blacklist" color "red"&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Create your rule using the dynamic objects, for instance:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="picture071-6.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5642i89132FE6A4239294/image-size/large?v=v2&amp;amp;px=999" role="button" title="picture071-6.png" alt="picture071-6.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;LI&gt;Publish and Install Policy&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;That's all... have fun!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 17:01:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/82131#M9217</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-08-04T17:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/87345#M9218</link>
      <description>&lt;P&gt;Ola Francesco, I'd like to download the scripts, but links are not working.&lt;BR /&gt;How do I download them from Checkmates?&lt;BR /&gt;Thanks in advance&lt;BR /&gt;Gerard&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 18:12:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/87345#M9218</guid>
      <dc:creator>Gerard_van_Lee1</dc:creator>
      <dc:date>2020-06-04T18:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/87566#M9219</link>
      <description>&lt;P&gt;Hey &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/19569"&gt;@Gerard_van_Lee1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will publish scripts on my web site asap to be downloaded. I let you know.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jun 2020 07:00:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/87566#M9219</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-06-08T07:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/93322#M9220</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/19569"&gt;@Gerard_van_Lee1&lt;/a&gt;Sorry for the tremendous delay, but I was very busy in past weeks. I eventually published the script and wrote the instruction on my website, please visit: &lt;A href="https://www.francescoficarola.com/check-point-automated-ip-blacklist/" target="_blank"&gt;https://www.francescoficarola.com/check-point-automated-ip-blacklist/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Hope this can help!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 17:03:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/93322#M9220</guid>
      <dc:creator>redcrow</dc:creator>
      <dc:date>2020-08-04T17:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking malicious IP addresses (sk103154) in VSX</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/109892#M15021</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firts of all, thanks for sharing, it's nice !!&lt;/P&gt;&lt;P&gt;I write this message because we had today a big production impact with one of the list provide by FireHOLE.&lt;/P&gt;&lt;P&gt;Yesterday, we setup this script for the first time and everything was fine. We had only set the&amp;nbsp;&lt;A href="https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level3.netset" target="_blank"&gt;https://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level3.netset&lt;/A&gt;&amp;nbsp;list in the source.&lt;/P&gt;&lt;P&gt;This morning, i read on the FireHole website that the Level 1 is recommended, so i just change the level3 to level1 in the script. Few seconds later, we lost the communication with the cluster and it was completely run out of communication.&lt;/P&gt;&lt;P&gt;After investigation, the main difference between the levels 1 and 3 is the presence of 0.0.0.0/8 in the level 1's.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't understand why it block anything because it's suppose to be for broadcast messages only.&lt;/P&gt;&lt;P&gt;After unloadlocal + diable the rule in management and push policy again, cluster is now alive and running fine, but my SI Management is not fine with this incident.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2021 09:46:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-malicious-IP-addresses-sk103154-in-VSX/m-p/109892#M15021</guid>
      <dc:creator>SylvainB</dc:creator>
      <dc:date>2021-02-05T09:46:39Z</dc:date>
    </item>
  </channel>
</rss>

