<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: list of different IP addresses to be blocked in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24037#M98473</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should probably use fw samp instead, which is SecureXL friendly (SAM rules are not).&lt;/P&gt;&lt;P&gt;And to &lt;A href="https://community.checkpoint.com/migrated-users/54250"&gt;Dirk Casomo&lt;/A&gt;‌'s question, you would write a script that reads your file of IPs, executing the necessary commands.&lt;/P&gt;&lt;P&gt;Or use the scripts in the following SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115392" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115392"&gt;How to export Check Point logs to a Syslog server using CPLogToSyslog&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Jan 2018 16:13:16 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-01-19T16:13:16Z</dc:date>
    <item>
      <title>list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24022#M98458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;hi,&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;i have 2000 plus list of IP addresses, how can i block them all bi directional blocking in my checkpoint firewall without typing all those individually?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2018 08:54:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24022#M98458</guid>
      <dc:creator>Dirk_Casomo</dc:creator>
      <dc:date>2018-01-18T08:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24023#M98459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Method 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154"&gt;How to block traffic coming from known malicious IP addresses&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Method 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The &lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#intro_gui_cli" rel="nofollow"&gt;SmartConsole CLI&lt;/A&gt; can be directly accessed from within SmartConsole by clicking the &lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/images/api_icon.png"&gt;&lt;IMG src="https://sc1.checkpoint.com/documents/latest/APIs/images/api_icon.png" /&gt;&lt;/A&gt; icon on the bottom left corner.&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SmartConsole -&amp;gt; Management CLI:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/images/smartconsole.png"&gt;&lt;IMG src="https://sc1.checkpoint.com/documents/latest/APIs/images/smartconsole.png" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just add the required syntax to your IP addresses to create host objects and one host group for them. Copy &amp;amp; Paste this to your SmartConsole CLI in order to have a group containing all block IPs created. Then create a rule that blocks all access to this group. Done.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Method 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/message/downloads.checkpoint.com/dc/download.htm?ID=35013"&gt;fw samp&lt;/A&gt; is your friend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Method 4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk67861"&gt;sim dropcfg&lt;/A&gt; is your friend.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2018 11:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24023#M98459</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-01-18T11:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24024#M98460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great summary Danny!&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2018 12:57:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24024#M98460</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-01-18T12:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24025#M98461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;This is awesome.&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2018 14:47:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24025#M98461</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-01-18T14:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24026#M98462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would have been better had this question not been posted a few times in unrelated threads.&lt;/P&gt;&lt;P&gt;However I will also add to what&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;Danny Jung&lt;/A&gt;‌ has said that if you're not using R80+ management, you can create objects by CLI using dbedit:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30383" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30383"&gt;Using a dbedit script to create new network objects and network object groups&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would create the relevant network objects, add them to a group, and use that group in the rulebase with a "drop" rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2018 14:58:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24026#M98462</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-18T14:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24027#M98463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;but that one is around 2000 plus IP addresses, is there a way for me not to&lt;/P&gt;&lt;P&gt;manually key in all those IP addresses? may using notepad or csv file?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 01:39:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24027#M98463</guid>
      <dc:creator>Dirk_Casomo</dc:creator>
      <dc:date>2018-01-19T01:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24028#M98464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using the above methods, you can write a script to read from whatever file you have the IP addresses into.&lt;/P&gt;&lt;P&gt;You could also use some of the scripts that are already present on CheckMates to help you with this.&lt;/P&gt;&lt;P&gt;This is just one example:&amp;nbsp;&lt;A href="https://community.checkpoint.com/docs/DOC-1911"&gt;CLI API Example for exporting, importing, and deleting different objects using CSV files (v 00.25.01 and later)&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 02:33:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24028#M98464</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-19T02:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24029#M98465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lets say i already put all the 2000 plus ip addresses in a csv file, then i&lt;/P&gt;&lt;P&gt;type this command "cli_api_import_objects_from_csv.sh" i have a question,&lt;/P&gt;&lt;P&gt;where i must save my csv file in my local drive for the fw to ask me the&lt;/P&gt;&lt;P&gt;location of the file to be imported? and also smart console i just fire up&lt;/P&gt;&lt;P&gt;the CLI then type the command cli_api...?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please enlighten me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Fri, Jan 19, 2018 at 10:34 AM, Dameon Welch Abernathy &amp;lt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 03:04:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24029#M98465</guid>
      <dc:creator>Dirk_Casomo</dc:creator>
      <dc:date>2018-01-19T03:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24030#M98466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where the file should be saved for this particular script is described in the lengthy post with that script, please read it carefully.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's meant for bulk import/export of a lot of objects, so may not be the best tool for your job.&lt;/P&gt;&lt;P&gt;Another possible option:&amp;nbsp;&lt;A href="https://community.checkpoint.com/docs/DOC-2163" target="_blank"&gt;R80 PowerShell Module&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But a simpler option&amp;nbsp;is to just call the CLI directly and import the CSV.&lt;/P&gt;&lt;P&gt;This process isn't nearly as well documented as I thought it would be, but we're about to fix that &lt;IMG id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all, the CSV file should be in the correct format.&lt;/P&gt;&lt;P&gt;The first row refers to parameters you would pass the add host command as documented here:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-host~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/add-host~v1.1" rel="nofollow noopener noreferrer" target="_blank"&gt;Check Point - Management API reference for add host&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The minimum parameters needed are name and ip-address.&lt;/P&gt;&lt;P&gt;Since you want to put them in a group, might as well do that as they are created.&lt;/P&gt;&lt;P&gt;For this example, the objects will be added to a group called BlockGroup:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;name,ip-address,groups.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;host1,192.0.2.1,BlockGroup&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;host2,192.0.2.2,BlockGroup&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;host3,192.0.2.3,BlockGroup&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If the group doesn't already exist, you can use the following CLI command on the management server to&amp;nbsp;create it first:&amp;nbsp;&lt;STRONG&gt;&lt;SPAN class=""&gt;mgmt_cli -r true add group name BlockGroup&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;To then import the CSV file, use the following command on the management server, which reads the file from the current directory:&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;mgmt_cli -r true add host --batch import.csv&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Note: You will probably need to break up the CSV file into smaller chunks (no more than 500 items per file).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Otherwise you may experience issues as described here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/message/6809-re-creating-multiple-object-via-csv" target="_blank"&gt;https://community.checkpoint.com/message/6809-re-creating-multiple-object-via-csv&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:12:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24030#M98466</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-21T09:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24031#M98467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So every ip address will be host/object? therefore, 2000 host?&lt;/P&gt;&lt;P&gt;Is there any easiest way wherein we just put those list of IP addresses then automatically blocked. And if there is a false-positive, we can also easily removed that IP address in the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 07:38:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24031#M98467</guid>
      <dc:creator>Christopher_Ta1</dc:creator>
      <dc:date>2018-01-19T07:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24032#M98468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Christopher,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this method, there will indeed be 2000 host objects created and added to a group used in directionnal blocking rule. If you do not want to create objects, you may have a look at SAM rules (here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112061" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112061"&gt;How to create and view Suspicious Activity Monitoring (SAM) Rules&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;SAM rules does not need to create an object, you can add the IP addresses directly in the blocking rules, monitore them, and remove them.&lt;/P&gt;&lt;P&gt;However, SAM rules are CPU intensive. So you better use a traditionnal security policy rule and a group of hosts object. Sam rules should only be used in emergency conditions (as they do not need a policy installation to be added or removed), and IP block should be move to your security policy rule as fast as you confirm there is no false positive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps,&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 07:56:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24032#M98468</guid>
      <dc:creator>Bruno_LABOUR</dc:creator>
      <dc:date>2018-01-19T07:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24033#M98469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is there a way not to manually typing all those 2000 plus different IP&lt;/P&gt;&lt;P&gt;addresses to be part of the host object?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Fri, Jan 19, 2018 at 3:56 PM, Bruno LABOUR &amp;lt;donotreply@checkpoint.com&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 08:39:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24033#M98469</guid>
      <dc:creator>Dirk_Casomo</dc:creator>
      <dc:date>2018-01-19T08:39:37Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24034#M98470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Bruno&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 08:51:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24034#M98470</guid>
      <dc:creator>Christopher_Ta1</dc:creator>
      <dc:date>2018-01-19T08:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24035#M98471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent point about CPU implications Bruno. Very important for large and/or heavily loaded environments when every CPU % counts. Maybe &lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;https://community.checkpoint.com/people/dantr917b8439-9d5c-34f0-b86a-f0e1b0a14cbd&lt;/A&gt;‌ could update original article with CPU impact for each of the options. Just for clarity &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 09:39:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24035#M98471</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-01-19T09:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24036#M98472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I saw this alternative solution to list based block : &lt;A href="https://community.checkpoint.com/docs/DOC-2002" target="_blank"&gt;https://community.checkpoint.com/docs/DOC-2002&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may provide an additional resource for learning how to approach this problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:12:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24036#M98472</guid>
      <dc:creator>Eric_Beasley</dc:creator>
      <dc:date>2019-06-21T09:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24037#M98473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should probably use fw samp instead, which is SecureXL friendly (SAM rules are not).&lt;/P&gt;&lt;P&gt;And to &lt;A href="https://community.checkpoint.com/migrated-users/54250"&gt;Dirk Casomo&lt;/A&gt;‌'s question, you would write a script that reads your file of IPs, executing the necessary commands.&lt;/P&gt;&lt;P&gt;Or use the scripts in the following SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115392" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115392"&gt;How to export Check Point logs to a Syslog server using CPLogToSyslog&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 16:13:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24037#M98473</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-19T16:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24038#M98474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For SAM rules?&amp;nbsp;The KB shows there is a cli comand "&lt;EM style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;STRONG&gt;fw sam_policy&lt;/STRONG&gt;&lt;/EM&gt;" that you could use with a script to parse your inject everything. However, i would not recommand you to use SAM to block 2000 IP addresses when you can easily do it also with either mgmt_api or dbedit scripts depending on the version you are running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the given solution are script-capable or bulk by nature, so i do not catch you very well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 16:16:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24038#M98474</guid>
      <dc:creator>Bruno_LABOUR</dc:creator>
      <dc:date>2018-01-19T16:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24039#M98475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@&lt;A _jive_internal="true" data-userid="2075" data-username="dwelccfe6e688-522c-305c-adaa-194bd7a7becc" href="https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc" style="color: #e45785; background-color: #ffffff; border: 0px; font-weight: 200; text-decoration: none; font-size: 1.286rem;"&gt;Dameon Welch Abernathy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;example i type the command in the fw console ,&amp;nbsp;&lt;STRONG style="color: #666666; font-size: 10.5pt;"&gt;mgmt_cli -r true add host --batch import.csv&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN style="font-size: 10.5pt; color: #666666;"&gt;do i still need to put the path of the csv file which is on my desktop?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Jan 2018 15:38:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24039#M98475</guid>
      <dc:creator>Dirk_Casomo</dc:creator>
      <dc:date>2018-01-21T15:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24040#M98476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The command is executed on the management station, not the firewall.&lt;/P&gt;&lt;P&gt;The CSV file would need to be uploaded to the management station (with scp or similar).&lt;/P&gt;&lt;P&gt;If you do not run the command from the same directory that contains import.csv, you will have to enter the path to it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Jan 2018 16:17:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24040#M98476</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-21T16:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: list of different IP addresses to be blocked</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24041#M98477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if i have a standalone setup using 1 firewall, you mean my pc has installed&lt;/P&gt;&lt;P&gt;the smartdashboard on it, then the CSV is on the desktop save. is ok&lt;/P&gt;&lt;P&gt;already, then ill jus include the file path?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On Mon, Jan 22, 2018 at 12:18 AM, Dameon Welch Abernathy &amp;lt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jan 2018 01:29:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/list-of-different-IP-addresses-to-be-blocked/m-p/24041#M98477</guid>
      <dc:creator>Dirk_Casomo</dc:creator>
      <dc:date>2018-01-22T01:29:56Z</dc:date>
    </item>
  </channel>
</rss>

