<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Did you know? Add Snort Protections with R80.10 API in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Did-you-know-Add-Snort-Protections-with-R80-10-API/m-p/13690#M974</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, sorry for slacking at the end &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's say you pay for subscription to some 3rd party domain &lt;A href="http://www.ExclusiveProtectionRules.com/feed.csv"&gt;www.ExclusiveProtectionRules.com/feed.csv&lt;/A&gt;&amp;nbsp;which contains list of .snort files each&amp;nbsp;with logics to detect IPS.&lt;/P&gt;&lt;P&gt;You can place on a remote host a&amp;nbsp;script in Python or bash or something, that polls that URL every now and then, and when it detects that new entries were added, downloads the new .snort files, places them on the Management Server&amp;nbsp;and remotely calls the Management API commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Apr 2018 06:08:28 GMT</pubDate>
    <dc:creator>Tomer_Sole</dc:creator>
    <dc:date>2018-04-10T06:08:28Z</dc:date>
    <item>
      <title>Did you know? Add Snort Protections with R80.10 API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Did-you-know-Add-Snort-Protections-with-R80-10-API/m-p/13688#M972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Place the &lt;A href="https://www.snort.org/rules_explanation"&gt;snort &lt;/A&gt;&lt;A href="https://paginas.fe.up.pt/~mgi98020/pgr/writing_snort_rules.htm"&gt;protections &lt;/A&gt;file on your Management server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Import it to your Security Management Server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a. Login with valid Check Point admin credentials, so that the change will be audited by the relevant admin account.&lt;/P&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;mgmt_cli login user "[username]" password "[password]"&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b.&amp;nbsp;Import the protections file&lt;/P&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;mgmt_cli add threat-protections package-path "/path/to/community.rules" package-format "snort"&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c. This command is asynchronous and returns a task ID. Track the progress of this task either with the "show task" command:&lt;/P&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;mgmt_cli show task task-id "2eec70e5-78a8-4bdb-9a76-cfb5601d0bcb"&lt;/PRE&gt;&lt;P&gt;(given&amp;nbsp;2eec70e5-78a8-4bdb-9a76-cfb5601d0bcb as the "task-id" value in the result of step b)&lt;/P&gt;&lt;P&gt;or with this utility&amp;nbsp;&lt;A href="https://community.checkpoint.com/thread/1268"&gt;Using a-synchronous commands (e.g. publish, install-policy and run-script)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;d. Publish your changes&amp;nbsp;&lt;/P&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;mgmt_cli publish &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e. The "publish" command is also&amp;nbsp;asynchronous, so you will need to track its progress similar to step c&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;f. Install Policy&amp;nbsp;&lt;/P&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;mgmt_cli install-policy policy-package "standard" access true threat-prevention true targets.1 "corporate-gateway"&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;g. The "install-policy" command is also&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;asynchronous, so you will need to track its progress similar to step c&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Now you can add your custom protections or connect between your feeds and the gateway automatically. Audit logs and SmartConsole UI reflect this change.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 16:37:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Did-you-know-Add-Snort-Protections-with-R80-10-API/m-p/13688#M972</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-04-09T16:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: Did you know? Add Snort Protections with R80.10 API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Did-you-know-Add-Snort-Protections-with-R80-10-API/m-p/13689#M973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tomer,&lt;/P&gt;&lt;P&gt;Can you elaborate on "&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;connect between your feeds and the gateway automatically"? Example perhaps.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2018 17:47:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Did-you-know-Add-Snort-Protections-with-R80-10-API/m-p/13689#M973</guid>
      <dc:creator>Eric_Ferland</dc:creator>
      <dc:date>2018-04-09T17:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Did you know? Add Snort Protections with R80.10 API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Did-you-know-Add-Snort-Protections-with-R80-10-API/m-p/13690#M974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, sorry for slacking at the end &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's say you pay for subscription to some 3rd party domain &lt;A href="http://www.ExclusiveProtectionRules.com/feed.csv"&gt;www.ExclusiveProtectionRules.com/feed.csv&lt;/A&gt;&amp;nbsp;which contains list of .snort files each&amp;nbsp;with logics to detect IPS.&lt;/P&gt;&lt;P&gt;You can place on a remote host a&amp;nbsp;script in Python or bash or something, that polls that URL every now and then, and when it detects that new entries were added, downloads the new .snort files, places them on the Management Server&amp;nbsp;and remotely calls the Management API commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 06:08:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Did-you-know-Add-Snort-Protections-with-R80-10-API/m-p/13690#M974</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-04-10T06:08:28Z</dc:date>
    </item>
  </channel>
</rss>

