<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DShield through fw samp batch script in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2335#M89</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response,i am seeking a solution for my issue. let me elaborate my exact requirement.&lt;/P&gt;&lt;P&gt;I have a list of malicious IP&amp;nbsp; downloaded&amp;nbsp;from Cisco and multiple source (more than 10k), my gateway doesn't have&amp;nbsp; accesses to internet. instead of&amp;nbsp;listing blocked IP in custom feed, do we have any provision to read from a text file available locally. if i am blocking 10K IP's will degrade firewall performance?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Nov 2017 04:53:19 GMT</pubDate>
    <dc:creator>Renjith_M_P</dc:creator>
    <dc:date>2017-11-15T04:53:19Z</dc:date>
    <item>
      <title>DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2326#M80</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Verdana, Arial, Tahoma, Calibri, Geneva, sans-serif; font-size: 13px; background-color: #fafafa;"&gt;Cross post from CPUG it was suggested I post this up here for a wider audience.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Verdana, Arial, Tahoma, Calibri, Geneva, sans-serif; font-size: 13px; background-color: #fafafa;"&gt;Hi all, I wanted to post this up in case anyone wanted to give it a go. It is a modification of the IP-blacklist.sh script from sk103154 but it takes advantage of the DShield block list without using the dynamic object. If you follow the sk for permissions and want to install in a lab environment let me know how it goes. Or if you see a glaring issue with my awk &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Verdana, Arial, Tahoma, Calibri, Geneva, sans-serif; font-size: 13px; background-color: #fafafa;"&gt;dshield-blocklist.sh:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;#!/bin/bash&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;url="&lt;A class="jive-link-external-small" href="http://feeds.dshield.org/block.txt" rel="nofollow"&gt;http://feeds.dshield.org/block.txt&lt;/A&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;function convert {&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;while read line; do&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;awk '/[^0-9]/ { printf "add -a d -l r -t 3600 -c dshield_blocklist quota service any source range:%s/%s pkt-rate 0\n",$1,$3 }'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;done&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo "add -t 2 quota flush true"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;curl_cli -s --cacert $CPDIR/conf/ca-bundle.crt --retry 10 --retry-delay 60 $url | dos2unix | convert | fw samp batch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;dshield.sh:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;#!/bin/bash&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;op="$1"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;is_fw_module=$($CPDIR/bin/cpprod_util FwIsFirewallModule)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;function remove_existing_sam_rules {&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;fw samp get | awk '/comment=dshield_blocklist/{sub("uid=","",$2);print "del "$2}' | fw samp batch 1&amp;gt;/dev/null 2&amp;gt;&amp;amp;1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;fw samp add -t 2 quota flush true 1&amp;gt;/dev/null 2&amp;gt;&amp;amp;1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;# Run only on GAIA gateways&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;if [[ "$is_fw_module" -eq 1 &amp;amp;&amp;amp; -f /etc/appliance_config.xml ]]; then&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo "$(date): Starting" &amp;gt;&amp;gt; $FWDIR/log/custom_dshield.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;case "$op" in&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;on)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;$CPDIR/bin/cpd_sched_config add dshield -c "$CPDIR/bin/dshield-blocklist.sh" -e 3600 -r -s &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo "dshield: Known malicious IP blocking mechanism is ON"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;;;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;off)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;$CPDIR/bin/cpd_sched_config delete dshield -r &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;remove_existing_sam_rules&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo "dshield: Known malicious IP blocking mechanism is OFF"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;;;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;stat)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;cpd_sched_config print | awk 'BEGIN{res="OFF"}/Task/{flag=0}/dshield/{flag=1}/Active: true/{if(flag)res="ON"}END{print "dshield: Known malicious IP blocking mechanism status is "res}'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;;;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;*)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo 'Usage:'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo ' dshield.sh &amp;lt;option&amp;gt;'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo 'Option:'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo ' on: blocks malicious IPs'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo ' off: stops malicious IPs blocking'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo ' stat: prints the status of malicious IP blocking'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;esac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;else&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;echo "dshield: This utility is supported on GAIA Security Gateway only"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: 'courier new', courier, monospace; font-size: 13px; background-color: #fafafa;"&gt;fi&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Verdana, Arial, Tahoma, Calibri, Geneva, sans-serif; font-size: 13px; background-color: #fafafa;"&gt;**USE AT YOUR OWN RISK!!**&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Verdana, Arial, Tahoma, Calibri, Geneva, sans-serif; font-size: 13px; background-color: #fafafa;"&gt;Also, check out &lt;A href="https://cpdbl.net/"&gt;https://cpdbl.net/&lt;/A&gt;&amp;nbsp;for a&amp;nbsp;better solution!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 May 2016 16:56:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2326#M80</guid>
      <dc:creator>Alex_Weldon</dc:creator>
      <dc:date>2016-05-04T16:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2327#M81</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The great thing about this script using the "fw samp" mechanism to block the blacklisted IP addresses is that it all takes place inside SecureXL and has zero impact on whether traffic can be accelerated/templated by SecureXL.&amp;nbsp; The original dshield.org implementation via IPS signature made almost all traffic crossing the firewall ineligible for acceleration by SecureXL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;My book "Max Power: Check Point Firewall Performance Optimization"&lt;/P&gt;&lt;P&gt;now available via &lt;A href="http://maxpowerfirewalls.com/" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2016 03:49:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2327#M81</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2016-05-05T03:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2328#M82</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;The "fw samp" Rate Limitation for DDOS Protection is indeed the recommended mechanism for scalable, high-performance blocking and rate limitation. There are several ongoing development efforts to wrap this mechanism with usable management interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have recently added an IP reputation facility in the Private ThreatCloud product, leveraging "fw samp". This functionality allows customers to manage hundreds of thousands of categorized IP address ranges, and to automate distribution of these feeds to all gateways that are configured to use the private cloud. The solution can support aggregation of multiple private and public intelligence feeds such as the SANS block list, TOR exit points, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see SK110394 - &lt;SPAN style="text-align: left; color: #333333; text-indent: 0px;"&gt;Check Point Private ThreatCloud&lt;/SPAN&gt; for more information on this product.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jun 2016 07:27:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2328#M82</guid>
      <dc:creator>Nir_Naaman</dc:creator>
      <dc:date>2016-06-16T07:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2329#M83</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very happy to hear that the fw samp function is being further enhanced to make it easier to use.&amp;nbsp; As I mentioned in my book this is one heck of an underrated feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;/P&gt;&lt;P&gt; now available via &lt;A href="http://maxpowerfirewalls.com/" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jun 2016 15:43:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2329#M83</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2016-06-17T15:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2330#M84</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any ETA on when this functionality will be released to those who do not have a need/will not be purchasing the private threat cloud?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jun 2016 16:32:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2330#M84</guid>
      <dc:creator>Alex_Weldon</dc:creator>
      <dc:date>2016-06-23T16:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2331#M85</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;You don’t need the Private ThreatCloud to do this, the Private ThreatCloud simply provides a management interface and solves some other issues. &lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;We have many customers using SK103154-derived solutions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;Then again, everybody needs a Private ThreatCloud. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Nir&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jun 2016 06:50:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2331#M85</guid>
      <dc:creator>Nir_Naaman</dc:creator>
      <dc:date>2016-06-24T06:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2332#M86</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for adding to this and the additional information. However, I've been asking for some five years now to have a native option in any of the numerous protecting pieces to block tor exit nods from outside -&amp;gt; in traffic. I know content filtering can handle Inside-out but I want to be able to simply block tor exit nodes from reaching anything behind the firewall. ie: &lt;A href="https://check.torproject.org/exit-addresses" title="https://check.torproject.org/exit-addresses"&gt;https://check.torproject.org/exit-addresses&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While using SK103154 we could build such, doesn't CP think this would make a very easy to update (ThreatCloud) feed for a standard option selection in native Checkpoint protection?&amp;nbsp; If there is such an option and I'm missing it - I would love to know that by the way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2016 12:03:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2332#M86</guid>
      <dc:creator>MartinZ</dc:creator>
      <dc:date>2016-08-11T12:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2333#M87</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/42344"&gt;https://community.checkpoint.com/people/alexa2f878495-07e0-48b1-99f4-0c0740ddee67&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;In my environment i am using Windows base Management (GAIA R77.30) , do i have any option to implement this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 05:01:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2333#M87</guid>
      <dc:creator>Renjith_M_P</dc:creator>
      <dc:date>2017-11-10T05:01:06Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2334#M88</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This script runs on the gateway not management.&lt;/P&gt;&lt;P&gt;That said you should really look at moving your management off Windows as R77.30 is the last version to support Windows.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 23:09:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2334#M88</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-11-10T23:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2335#M89</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response,i am seeking a solution for my issue. let me elaborate my exact requirement.&lt;/P&gt;&lt;P&gt;I have a list of malicious IP&amp;nbsp; downloaded&amp;nbsp;from Cisco and multiple source (more than 10k), my gateway doesn't have&amp;nbsp; accesses to internet. instead of&amp;nbsp;listing blocked IP in custom feed, do we have any provision to read from a text file available locally. if i am blocking 10K IP's will degrade firewall performance?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Nov 2017 04:53:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2335#M89</guid>
      <dc:creator>Renjith_M_P</dc:creator>
      <dc:date>2017-11-15T04:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: DShield through fw samp batch script</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2336#M90</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm curious, if your gateway doesn't have Internet access, why would you need to block on the order of 10k IP addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any case, yes, there are scripts you can execute that will block a list of IPs using a feed you can specify.&lt;/P&gt;&lt;P&gt;While the examples are from our ThreatCloud, you could probably make a version of that file that resides on something your gateway can access.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103154"&gt;How to block traffic coming from known malicious IP addresses&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can't do that, you can write a script that iterates through your local list using the "fw samp" command to add block IPs.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454"&gt;How to configure Rate Limiting rules for DoS Mitigation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Nov 2017 05:26:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/DShield-through-fw-samp-batch-script/m-p/2336#M90</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-11-15T05:26:39Z</dc:date>
    </item>
  </channel>
</rss>

