<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic Block Lists for Check Point firewalls in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108337#M5504</link>
    <description>&lt;P&gt;The scripts at&amp;nbsp;&lt;A href="http://opendbl.net/opendbl-r80-0.52.tar" target="_blank"&gt;http://opendbl.net/opendbl-r80-0.52.tar&lt;/A&gt;&amp;nbsp;seem not to be finished for dshield, right?&lt;BR /&gt;Has anybody&amp;nbsp; configured dshield with dynamic objects?&lt;BR /&gt;It seems that opendbl.sh doesn't contain the option for dshield and then ip-opendbl-include.sh doesn't parse ip ranges.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Jan 2021 19:44:01 GMT</pubDate>
    <dc:creator>Luis_Miguel_Mig</dc:creator>
    <dc:date>2021-01-20T19:44:01Z</dc:date>
    <item>
      <title>Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/38871#M2359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have cooked together some further improvements on Check Points 'block TOR' scripts and built a small service around it. This is not an official Check Point function/product and is provided by me in my spare time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this moment the following blocklists are implemented:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;OpenBL&lt;/LI&gt;&lt;LI&gt;Emerging Threats: Known Compromised Hosts&lt;/LI&gt;&lt;LI&gt;TOR exit nodes&lt;/LI&gt;&lt;LI&gt;BruteforceBlocker&lt;/LI&gt;&lt;LI&gt;Blocklist.de All&lt;/LI&gt;&lt;LI&gt;Talos&lt;/LI&gt;&lt;LI&gt;Dshield&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The feeds are downloaded, sanity checked and then published on cpdbl.net for free. I am currently running all lists on two separate clusters without any noticeable performance hit. Of course ymmv so all feedback is appreciated. If you want to try it out go to: &lt;A href="https://cpdbl.net/" target="_blank"&gt;https://cpdbl.net&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Screenshot of the interface:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="cpdbl.png" class="image-1 jive-image" src="http://cpdbl.net/cpdbl.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Gateway details:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;These scripts utilize the rate limiting policy in SecureXL. Therefore blocking is done in fastpath and should not impact performance noticably.&lt;/P&gt;&lt;P&gt;Connections from IPs listed in the activated blocklists are only blocked INBOUND. Outgoing communications are currently allowed. I have roadmapped a toggle for this.&lt;/P&gt;&lt;P&gt;VSX is &lt;STRONG&gt;not&lt;/STRONG&gt; supported for now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Workflow:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;The server&lt;/SPAN&gt;(cpdbl.net) downloads all the lists nightly and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Validates that all entries are valid IPs.&lt;/LI&gt;&lt;LI&gt;Baselines the lists, makes sure a list does not suddenly grow enormously.&lt;/LI&gt;&lt;LI&gt;Publishes the lists for the clients to download.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;The client:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Downloads fresh lists every 12 hours&lt;/LI&gt;&lt;LI&gt;Times out entries in the block-table after 12 hours, hence if cpdbl.net is unavailable all entries will be removed at this time.&lt;/LI&gt;&lt;LI&gt;Validates that only entries containing numbers and "-" are read into the system. (to stop possible code injection)&lt;/LI&gt;&lt;LI&gt;Installs validated entries into blocking tables and waits for 12 hours before starting over again.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To monitor the blocked IP addresses:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;R77.30:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In SmartView Tracker, search for "SecureXL message: Quota violation".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;R80:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In SmartLog, search for "blade:Firewall Alert".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Feb 2017 15:41:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/38871#M2359</guid>
      <dc:creator>Daniel_Husand</dc:creator>
      <dc:date>2017-02-07T15:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/38872#M2360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Is there a way to use this with a proxy or does it need to have direct access from the gateway? Talking about R77.30&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A class="link-titled" href="https://cpdbl.net/" title="https://cpdbl.net/"&gt;CP Dynamic Block Lists&lt;/A&gt;&amp;nbsp;&amp;nbsp;is a killer, and I will be adding a customized internal url feed as well in addition to the existing ones on the script, and will modify the script to call that additional feed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2018 14:05:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/38872#M2360</guid>
      <dc:creator>Christian_Hurta</dc:creator>
      <dc:date>2018-09-20T14:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/38873#M2361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scripts need to be touched a bit to work on R80.20.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;/opt/CPshrd-R80/bin/&lt;/STRONG&gt; path in all files should be replaced with&amp;nbsp;&lt;STRONG&gt;/opt/CPshrd-R80.20/bin/&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2018 15:37:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/38873#M2361</guid>
      <dc:creator>Dilian_Chernev</dc:creator>
      <dc:date>2018-11-29T15:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/54617#M3530</link>
      <description>&lt;P&gt;This is now &lt;A href="https://opendbl.net" target="_blank" rel="noopener"&gt;opendbl.net&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 06:00:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/54617#M3530</guid>
      <dc:creator>Fire_Verse</dc:creator>
      <dc:date>2019-05-29T06:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/54625#M3531</link>
      <description>&lt;P&gt;Absolutely awesome work Daniel! We love it! As we love dynamic objects &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I "stole" your code (sorry!) and made VSX version that can be executed via crontab or manually if desired and all required protections listed in config file as follows&lt;/P&gt;
&lt;P&gt;[Expert@vsx1-ext:0]# cat blacklist.conf&lt;BR /&gt;blocklistde-all&lt;BR /&gt;bruteforce&lt;BR /&gt;etknown&lt;BR /&gt;malwaredomain&lt;BR /&gt;sslblock&lt;BR /&gt;talos&lt;BR /&gt;tor-exit&lt;BR /&gt;zeustracker&lt;/P&gt;
&lt;P&gt;It has hard coded directory set in&amp;nbsp;&lt;STRONG&gt;/home/admin/dynamic_objects&lt;/STRONG&gt; as all our dynamic objects are handled there but you can change it yourself of course. Not as pretty from UI point of view.&lt;/P&gt;
&lt;P&gt;You will need to supply VS number when running script, i.e &lt;STRONG&gt;./blacklist.sh 3&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;#!/bin/bash
# VSX version of the opendbl tool &lt;A href="https://opendbl.net/" target="_blank"&gt;https://opendbl.net/&lt;/A&gt;
# based on version R80-0.5

. /opt/CPshared/5.0/tmp/.CPprofile.sh
source /etc/profile.d/vsenv.sh
fwv=`fw ver | awk {'print $7'}`
opendblv="0.5"
vsid=$1


# Update log
cd /home/admin/dynamic_objects
echo "`date` *** Starting update ***" &amp;gt;&amp;gt; blacklist.log
echo "   VS-$vsid" &amp;gt;&amp;gt; blacklist.log

# Download all lists via VS0
vsenv 0
while read line; do

  url=`echo "&lt;A href="https://opendbl.net/lists/${line}.list" target="_blank"&gt;https://opendbl.net/lists/${line}.list&lt;/A&gt;"`
  curl_cli -s --cacert opendbl.crt --user-agent "$fwv $opendblv" --retry 10 --retry-delay 60 $url | dos2unix &amp;gt; ${line}.blacklist

done &amp;lt; blacklist.conf

# Implement all lists on desired VS
vsenv $vsid
while read line; do

  # Create arrays with max size of 2000 of IP pairs
  y=0; z=0; todo=()
  while read ip; do
    if ! [[ "$ip" =~ [^0-9.-] ]]; then
      todo[$y]+=" $ip $ip"
        if [ $z -eq 2000 ]; then
          z=0
          let y=$y+1
        else
          let z=$z+1
        fi
    fi
  done &amp;lt; ${line}.blacklist

  # Purge fully existing dynamic objects
  listname=`echo $line | awk -F- '{print $1}'`
  dynamic_objects -do dynob_blacklist_${listname}
  dynamic_objects -n dynob_blacklist_${listname}

  # Update with new IP lists from each array
  for i in "${todo[@]}" ; do

    dynamic_objects -o dynob_blacklist_${listname} -r $i -a
  done

  # Update log
  let x=y*2000+z
  echo -e "      $x \t - $listname IPs set" &amp;gt;&amp;gt; blacklist.log

done &amp;lt; blacklist.conf

echo "*** Update finished ***" &amp;gt;&amp;gt; blacklist.log
echo &amp;gt;&amp;gt; blacklist.log
rm -f *.blacklist
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2019 07:58:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/54625#M3531</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2019-05-29T07:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/58056#M3688</link>
      <description>&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;I don't have the skills to implement this safely but I would really want such dynamic IP blacklist on my cluster of R77.30 (with the management already upgraded to 80.X, the rest will follow ).&lt;/P&gt;&lt;P&gt;Can someone do it with me like a freelance or prof services? The alternative is my vendor but it's summer and everything is slower here in Switzerland.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks a lot,&lt;/P&gt;&lt;P&gt;mike&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 20:20:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/58056#M3688</guid>
      <dc:creator>mickrose555</dc:creator>
      <dc:date>2019-07-11T20:20:53Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/58751#M3726</link>
      <description>&lt;P&gt;Would anyone be able to comment if these Lists not already be monitored by Anti-Bot or Anti-Virus reputation feeds?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 20:33:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/58751#M3726</guid>
      <dc:creator>Kurtis_Johnson</dc:creator>
      <dc:date>2019-07-22T20:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/58792#M3727</link>
      <description>&lt;P&gt;Here is the Forti URL to check such malicious IP:&lt;/P&gt;&lt;P&gt;&lt;A href="https://fortiguard.com/learnmore#botnet" target="_blank"&gt;https://fortiguard.com/learnmore#botnet&lt;/A&gt;&lt;/P&gt;&lt;P&gt;These 2 malicious IPs are not in there but in some of the block lists, like:&lt;/P&gt;&lt;P&gt;&lt;A href="https://opendbl.net/lists/blocklistde-all.list" target="_blank"&gt;https://opendbl.net/lists/blocklistde-all.list&lt;/A&gt;&lt;/P&gt;&lt;P&gt;141.98.80.67&lt;/P&gt;&lt;P&gt;185.211.245.198&lt;/P&gt;&lt;P&gt;Someone can share other search engines maybe.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2019 08:56:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/58792#M3727</guid>
      <dc:creator>mickrose555</dc:creator>
      <dc:date>2019-07-23T08:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/74728#M4355</link>
      <description>&lt;P&gt;OK, so is this still the way to do things now that we have the ability to use external IOC feeds?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Open for discussion either way, just trying to think about improving things, and handling multiple feeds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; believe that I am going to either an IOC or a dynamic block list for stuff that I am seeing with my clients to share data among them anonymously.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ted Serreyn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Feb 2020 22:46:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/74728#M4355</guid>
      <dc:creator>Ted_Serreyn</dc:creator>
      <dc:date>2020-02-10T22:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108337#M5504</link>
      <description>&lt;P&gt;The scripts at&amp;nbsp;&lt;A href="http://opendbl.net/opendbl-r80-0.52.tar" target="_blank"&gt;http://opendbl.net/opendbl-r80-0.52.tar&lt;/A&gt;&amp;nbsp;seem not to be finished for dshield, right?&lt;BR /&gt;Has anybody&amp;nbsp; configured dshield with dynamic objects?&lt;BR /&gt;It seems that opendbl.sh doesn't contain the option for dshield and then ip-opendbl-include.sh doesn't parse ip ranges.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 19:44:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108337#M5504</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-01-20T19:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108373#M5509</link>
      <description>&lt;P&gt;It's because dshield list is published as a range instead of single IP and update script cannot handle a range&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;194.147.140.0-194.147.140.255
92.63.196.0-92.63.196.255
45.155.205.0-45.155.205.255
167.248.133.0-167.248.133.255
92.63.197.0-92.63.197.255
78.128.113.0-78.128.113.255
46.161.27.0-46.161.27.255
94.102.51.0-94.102.51.255
193.27.229.0-193.27.229.255
192.241.224.0-192.241.224.255
89.248.168.0-89.248.168.255
138.99.216.0-138.99.216.255
92.118.160.0-92.118.160.255
92.118.161.0-92.118.161.255
192.241.223.0-192.241.223.255
83.97.20.0-83.97.20.255
185.153.197.0-185.153.197.255
45.146.165.0-45.146.165.255
80.82.77.0-80.82.77.255
89.248.165.0-89.248.165.255
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this part needs re-writing to accept &lt;STRONG&gt;ipFirst-ipLast&lt;/STRONG&gt; format in the list. Might look later today. Meetings right now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;    while read ip; do
        if ! [[ "$ip" =~ [^0-9.-] ]];
        then
				todo[$y]+=" $ip $ip"
					if [ $z -eq 2000 ]
					then
						z=0
						let y=$y+1
					else
						let z=$z+1
					fi
        fi
     done
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 07:52:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108373#M5509</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-01-21T07:52:49Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108377#M5510</link>
      <description>&lt;P&gt;This one did the trick for me:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;  while read ip; do
    if ! [[ "$ip" =~ [^0-9.-] ]]; then
      if ! [[ "$ip" =~ "-" ]]; then
        # For single IP list
        todo[$y]+=" $ip $ip"
      else
        # For a range firstIP-lastIP format
        ip=`echo $ip | sed 's/-/ /'`
        todo[$y]+=" $ip"
      fi
      if [ $z -eq 2000 ]; then
        z=0
        let y=$y+1
      else
        let z=$z+1
      fi
    fi
    echo "${todo[@]}"
  done &lt;/LI-CODE&gt;
&lt;P&gt;So dynamic object contents look ok now:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;object name : dynob_blacklist_dshield
range 0 : 45.146.165.0           45.146.165.255
range 1 : 45.155.205.0           45.155.205.255
range 2 : 46.161.27.0            46.161.27.255
range 3 : 78.128.113.0           78.128.113.255
range 4 : 80.82.77.0             80.82.77.255
range 5 : 83.97.20.0             83.97.20.255
range 6 : 89.248.165.0           89.248.165.255
range 7 : 89.248.168.0           89.248.168.255
range 8 : 92.63.196.0            92.63.197.255
range 9 : 92.118.160.0           92.118.161.255
range 10 : 94.102.51.0            94.102.51.255
range 11 : 138.99.216.0           138.99.216.255
range 12 : 167.248.133.0          167.248.133.255
range 13 : 185.153.197.0          185.153.197.255
range 14 : 192.241.223.0          192.241.224.255
range 15 : 193.27.229.0           193.27.229.255
range 16 : 194.147.140.0          194.147.140.255

&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 08:29:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108377#M5510</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-01-21T08:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108388#M5513</link>
      <description>&lt;P&gt;I added a couple of sanity checks. You may also want to include your public ip addresses.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;fwv=`fw ver | awk {'print $7'}`&lt;BR /&gt;opendblv="0.52"&lt;BR /&gt;y=0&lt;BR /&gt;x=0&lt;BR /&gt;z=0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;function validateIP()&lt;BR /&gt;{&lt;BR /&gt;local ip=$1&lt;BR /&gt;local ip2=$1&lt;BR /&gt;local stat=0&lt;BR /&gt;local privip=1&lt;BR /&gt;local badip=1&lt;BR /&gt;if [[ $ip =~ ^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$ ]]; then&lt;BR /&gt;OIFS=$IFS&lt;BR /&gt;IFS='.'&lt;BR /&gt;ip=($ip)&lt;BR /&gt;IFS=$OIFS&lt;BR /&gt;[[ ${ip[0]} -le 255 &amp;amp;&amp;amp; ${ip[1]} -le 255 \&lt;BR /&gt;&amp;amp;&amp;amp; ${ip[2]} -le 255 &amp;amp;&amp;amp; ${ip[3]} -le 255 ]]&lt;BR /&gt;badip=$?&lt;BR /&gt;fi&lt;/P&gt;&lt;P&gt;if ! [[ "$ip2" =~ ^(192\.168|10\.[0-9]|172\.1[6789]\.|172\.2[0-9]\.|172\.3[01]\.) ]];&lt;BR /&gt;then&lt;BR /&gt;privip=0&lt;BR /&gt;fi&lt;/P&gt;&lt;P&gt;if [ $privip -eq 0 ] &amp;amp;&amp;amp; [ $badip -eq 0 ]; then&lt;BR /&gt;stat=1&lt;BR /&gt;fi&lt;BR /&gt;return $stat&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;function convert {&lt;BR /&gt;while read ip; do&lt;BR /&gt;if ! [[ "$ip" =~ [^0-9.-] ]];&lt;BR /&gt;then&lt;/P&gt;&lt;P&gt;if ! [[ "$ip" =~ "-" ]]; then&lt;BR /&gt;# For single IP list&lt;BR /&gt;validateIP $ip&lt;BR /&gt;vip=$?&lt;BR /&gt;line=" "$ip" "$ip&lt;BR /&gt;else&lt;BR /&gt;# For a range firstIP-lastIP format&lt;BR /&gt;ip1=`echo $ip|cut -d '-' -f 1`&lt;BR /&gt;ip2=`echo $ip|cut -d '-' -f 2`&lt;BR /&gt;validateIP $ip1&lt;BR /&gt;vip1=$?&lt;BR /&gt;validateIP $ip2&lt;BR /&gt;vip2=$?&lt;BR /&gt;vip=$((vip1*vip2))&lt;BR /&gt;line=" "$ip1" "$ip2&lt;BR /&gt;echo "ip $ip ip1 $ip1 ip2 $ip2 vip1 $vip1 vip2 $vip2 vip $vip line $line" &amp;gt; /var/log/secfeed.2.log&lt;BR /&gt;fi&lt;BR /&gt;if [ $vip -eq 1 ]; then&lt;BR /&gt;todo[$y]+="$line"&lt;BR /&gt;if [ $z -eq 2000 ]&lt;BR /&gt;then&lt;BR /&gt;z=0&lt;BR /&gt;let y=$y+1&lt;BR /&gt;else&lt;BR /&gt;let z=$z+1&lt;BR /&gt;fi&lt;BR /&gt;fi&lt;BR /&gt;fi&lt;BR /&gt;done&lt;/P&gt;&lt;P&gt;dynamic_objects -do openDBL_$type&lt;BR /&gt;dynamic_objects -n openDBL_$type&lt;/P&gt;&lt;P&gt;for i in "${todo[@]}" ;&lt;BR /&gt;do&lt;BR /&gt;dynamic_objects -o openDBL_$type -r $i -a&lt;BR /&gt;done&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;function update {&lt;BR /&gt;curl_cli -s --cacert $CPDIR/conf/opendbl.crt --user-agent "$fwv $opendblv" --retry 10 --retry-delay 60 $url | dos2unix | convert&lt;BR /&gt;echo "$(date): Security Feed $type update" &amp;gt; /var/log/secfeed.log&lt;BR /&gt;}&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 11:48:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108388#M5513</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-01-21T11:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108401#M5514</link>
      <description>&lt;P&gt;by the way, does anybody know if a dynamic object is persistent / survives a reboot?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 14:00:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108401#M5514</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-01-21T14:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108443#M5516</link>
      <description>&lt;P&gt;I know that I have rebooted standby cluster member and dynamic objects survived there &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I think clusterxl syncs them via tables but not 100% sure if you rebooted both cluster members&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 19:51:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108443#M5516</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-01-21T19:51:47Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108513#M5522</link>
      <description>&lt;P&gt;Thanks.&lt;BR /&gt;Interesting idea about the clusterxl. I guess they are not in sync lookin at this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@fw1:0]# ls -l /opt/CPsuite-R80.40/fw1/database/dynamic_objects.db&lt;BR /&gt;-rw-rw---- 1 admin root 1084018 Jan 22 11:43 /opt/CPsuite-R80.40/fw1/database/dynamic_objects.db&lt;/P&gt;&lt;P&gt;[Expert@fw2:0]# ls -l /opt/CPsuite-R80.40/fw1/database/dynamic_objects.db&lt;BR /&gt;-rw-rw---- 1 admin root 1102273 Jan 22 04:23 /opt/CPsuite-R80.40/fw1/database/dynamic_objects.db&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 12:45:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/108513#M5522</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2021-01-22T12:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/126301#M6143</link>
      <description>&lt;P&gt;It really useful and I succeed to setup&amp;nbsp;in non-production with self-defined dynamic blocklist, thanks!&lt;/P&gt;&lt;P&gt;However, I encounter other issue, could anyone can help?&lt;/P&gt;&lt;P&gt;How to ignore errors if incorrect IP address in the IP blocklist?&lt;/P&gt;&lt;P&gt;for example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;1.1.1.1&lt;/P&gt;&lt;P&gt;2.2.2.2&lt;/P&gt;&lt;P&gt;3.3.3&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;I found the dynamic_objects will clear all data if one incorrect IP address inside instead of ignore the incorrect IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Freco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 03:00:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/126301#M6143</guid>
      <dc:creator>Freco_Wong</dc:creator>
      <dc:date>2021-08-11T03:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/127036#M6146</link>
      <description>&lt;P&gt;Interesting - which of the public lists had incorrect IP included? Just curious.&amp;nbsp; I thought they would have made sure that IPs are correct before pushing out lists.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 08:48:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/127036#M6146</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2021-08-16T08:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Block Lists for Check Point firewalls</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/132530#M6365</link>
      <description>&lt;P&gt;It is possible if update by human, so I am asking how to minimize the impact instead of clear all data once problem triggered&lt;/P&gt;</description>
      <pubDate>Mon, 25 Oct 2021 07:34:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Dynamic-Block-Lists-for-Check-Point-firewalls/m-p/132530#M6365</guid>
      <dc:creator>Freco_Wong</dc:creator>
      <dc:date>2021-10-25T07:34:06Z</dc:date>
    </item>
  </channel>
</rss>

