<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 - IP blacklist in SecureXL in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56352#M11348</link>
    <description>&lt;P&gt;Good, this is what I thought you did,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;This is a legacy client which will be let go at some point. You already have some of its functionality ported to SmartConsole. Personally, I cannot expect anything new being added there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How about adding SAM rules and blacklists visibility as a SmartConsole Extension? All you need is some API magic&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jun 2019 10:21:06 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2019-06-21T10:21:06Z</dc:date>
    <item>
      <title>R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40625#M8586</link>
      <description>&lt;P&gt;Controls the IP blacklist in SecureXL. The blacklist blocks all &lt;SPAN style="color: #000000;"&gt;traffic&lt;/SPAN&gt; to and from the specified IP addresses.&lt;/P&gt;
&lt;P&gt;The blacklist drops occur in SecureXL, which is more efficient than an Access Control Policy to drop the packets.&lt;/P&gt;
&lt;P&gt;This can be very helpful e.g. with DoS attacks to block an IP on SecureXL level.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, the traffic from and to IP 1.2.3.4 should be blocked at SecureXL level.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On gateway set the IP 1.2.3.4 to Secure XL blacklist:&lt;/P&gt;
&lt;P&gt;# &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;fwaccel dos blacklist -a 1.2.3.4&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71106_pastedImage_6.png" border="0" /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On gateway displays all IP's on the SecureXL blacklist:&lt;/P&gt;
&lt;P&gt;# &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;fwaccel dos blacklist -s&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71107_pastedImage_7.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On gateway delete the IP 1.2.3.4 from Secure XL blacklist:&lt;/P&gt;
&lt;P&gt;#&amp;nbsp; &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;fwaccel dos blacklist -d 1.2.3.4&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71108_pastedImage_9.png" border="0" /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Very nice new function in R80.20!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Furthermore there are also the Penalty Box whitelist in SecureXL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The SecureXL Penalty Box is a mechanism that performs an early drop of packets that arrive from suspected sources. The purpose of this feature is to allow the Security Gateway to cope better under high traffic load, possibly caused by a DoS/DDoS attack. The SecureXL Penalty Box detects clients that sends packets, which the Access Control Policy drops, and clients that violate the IPS protections. If the SecureXL Penalty Box detect a specific client frequently, it puts that client in a penalty box. From that point, SecureXL drops all packets that arrive from the blocked source IP address. The Penalty Box whitelist in SecureXL lets you configure the source IP addresses, which the SecureXL Penalty Box never blocks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More under this link:&lt;/P&gt;
&lt;P&gt;&lt;A class="link-titled" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/162534" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_CLI_ReferenceGuide/162534" target="_blank" rel="noopener"&gt;Command Line Interface R80.20 Reference Guide&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;A class="" href="https://community.checkpoint.com/people/h.ank2614aef2-c5d1-3f73-bbbd-45c59b9e2728" target="_blank" rel="noopener" data-containerid="-1" data-containertype="-1" data-objectid="55229" data-objecttype="3"&gt;Heiko&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 20:19:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40625#M8586</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-03-20T20:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40626#M8587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to use this function with LOTS of care, as it is even less visible that SAM rules...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2018 14:51:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40626#M8587</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-10-01T14:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40627#M8588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bug or feature?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is also possible to enter networks. &lt;SPAN style="color: #000000;"&gt;In the handbook there is unfortunately only the IP Address in it and not the network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;It is also suggested that the network is be created. But it will unfortunately not be displayed afterwards&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/angry.png" /&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;IMG __jive_id="71110" class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71110_pastedImage_5.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="" data-containerid="-1" data-containertype="-1" data-objectid="55229" data-objecttype="3" href="https://community.checkpoint.com/people/h.ank2614aef2-c5d1-3f73-bbbd-45c59b9e2728"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2018 15:12:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40627#M8588</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-01T15:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40628#M8589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="" class="j-img-floatstart image-1 jive-image" height="152" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71098_tumblr_oa6z9xNeyf1tq4of6o1_500.gif" style="float: left;" width="271" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2018 17:00:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40628#M8589</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-10-01T17:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40629#M8590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How is this different to SAM?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2018 00:09:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40629#M8590</guid>
      <dc:creator>Iain_King</dc:creator>
      <dc:date>2018-10-02T00:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40630#M8591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The blacklist/whitelist is only IP level (either SecureXL drop this IP always or never subject this IP to the Penalty Box).&lt;/P&gt;&lt;P&gt;fw sam and fw samp allow configuring more granular rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2018 00:24:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40630#M8591</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-02T00:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40631#M8592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A _jive_internal="true" data-userid="2075" data-username="dwelccfe6e688-522c-305c-adaa-194bd7a7becc" href="https://community.checkpoint.com/people/dwelccfe6e688-522c-305c-adaa-194bd7a7becc"&gt;Dameon&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; here. Here is a link to sam penalty box sk that has been around for quite a while:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk74520&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk74520&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22"&gt;What is the SecureXL penalty box mechanism for offending IP addresses?&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the new command is very good for effectively blocking individual IP addresses. For example a DoS attack from a few IP addresses or similar opportunities.&lt;/P&gt;&lt;P&gt;And I also agree with &lt;SPAN class=""&gt;&lt;A _jive_internal="true" data-userid="2138" data-username="vlouk80ce7dc1-40a3-44d6-a227-b5782636a5cb" href="https://community.checkpoint.com/people/vlouk80ce7dc1-40a3-44d6-a227-b5782636a5cb"&gt;Valeri&lt;/A&gt;&lt;/SPAN&gt;, the function is to be used with care.&amp;nbsp;Many users will not know it yet and it is also not very transparent visible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2018 07:06:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40631#M8592</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-02T07:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40632#M8593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also find it interesting that it still works when I disable SecureXL in R80.20. I wouldn't have expected that at this point&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="330" src="https://community.checkpoint.com/legacyfs/online/checkpoint/71133_pastedImage_1.png" width="528" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2018 07:17:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40632#M8593</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-02T07:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40633#M8594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In real life, if you are facing DDoS attack (or broadcast storm), you are not able to log into system anyway (lagging, freezing, not able to execute any single command). Happened to me 2 times. The only solution was to find a root cause and cut that machine. So from logical point of view the better solution would be to move this feature into SmartConsole (some hidden place &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/grin.png" /&gt;) and push the command via SIC with triple confirmation alerts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2018 09:22:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40633#M8594</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-10-02T09:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40634#M8595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think that's gonna be a fundamental discussion. From my point of view, DDoS attacks should be blocked at the provider. You can discuss it for a long time.&lt;/P&gt;&lt;P&gt;If I can't get login to the system during an attack, of course I can't do much.&lt;/P&gt;&lt;P&gt;Everything should be configured on the firewall first. Then I don't have the problems later.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I like the option to block IP's on SecureXL level. It is simple and effective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the following function "&lt;STRONG&gt;Accelerated SYN Defender&lt;/STRONG&gt;" is the better choice for DoS attacks (&lt;STRONG&gt;SYN Flood attack&lt;/STRONG&gt;) on Check Point gateways with enabled SecureXL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A TCP SYN Flood attack occurs when a host, typically with a forged IP address, sends a flood of TCP [SYN] packets. Each of these TCP [SYN] packets is handled as a connection request, which causes the server to create a half-open (unestablished) TCP connection. This occurs because the server sends a TCP [SYN+ACK] packet, and waits for a response TCP packet that does not arrive. These half-open TCP connections eventually exceed the maximum available TCP connections that causes a denial of service condition. The Check Point Accelerated SYN Defender protects the Security Gateway by preventing excessive TCP connections from being created. The Accelerated SYN Defender uses TCP [SYN] Cookies (particular choices of initial TCP sequence numbers) when under a suspected TCP SYN Flood attack. Using TCP [SYN] Cookies can reduce the load on Security Gateway and on computers behind the Security Gateway. The Accelerated SYN Defender acts as proxy for TCP connections and adjusts TCP {SEQ} and TCP {ACK} values in TCP packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find more in the manual under:&lt;/P&gt;&lt;P&gt;"fwaccel synatk"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="" data-containerid="-1" data-containertype="-1" data-objectid="55229" data-objecttype="3" href="https://community.checkpoint.com/people/h.ank2614aef2-c5d1-3f73-bbbd-45c59b9e2728"&gt;Heiko&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2018 09:53:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40634#M8595</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-02T09:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40635#M8596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Guys,&lt;/P&gt;&lt;P&gt;I always use the following commands to drop ips, subnets, ports and a list of known IPs. See sk67861.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="4" cellspacing="2"&gt;&lt;TBODY&gt;&lt;TR style="text-align: center; font-weight: bold; background-color: lightgray;"&gt;&lt;TD width="320"&gt;Command&lt;/TD&gt;&lt;TD&gt;Description&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;sim dropcfg&lt;/CODE&gt;&lt;/TD&gt;&lt;TD&gt;Configures drop parameters (run '&lt;CODE&gt;sim dropcfg&lt;/CODE&gt;')&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;sim dropcfg -h&lt;/CODE&gt;&lt;/TD&gt;&lt;TD&gt;Prints the help message with available options for '&lt;CODE&gt;dropcfg&lt;/CODE&gt;' parameter&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;sim dropcfg -l&lt;/CODE&gt;&lt;/TD&gt;&lt;TD&gt;Prints current drop configuration&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;sim dropcfg -f &amp;lt;&lt;EM&gt;/path_to/file_name&lt;/EM&gt;&amp;gt;&lt;/CODE&gt;&lt;/TD&gt;&lt;TD&gt;Sets drop configuration file&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;sim dropcfg -e&lt;/CODE&gt;&lt;/TD&gt;&lt;TD&gt;Enforces drop configuration on the external interface only&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;sim dropcfg -y&lt;/CODE&gt;&lt;/TD&gt;&lt;TD&gt;Avoids confirmation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;CODE&gt;sim dropcfg -r&lt;/CODE&gt;&lt;/TD&gt;&lt;TD&gt;Resets drop rules&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2018 19:23:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40635#M8596</guid>
      <dc:creator>Support_Team_Pi</dc:creator>
      <dc:date>2018-10-04T19:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40636#M8597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) The &lt;STRONG&gt;sim dropcfg&lt;/STRONG&gt; command is not available in R80.20&lt;/P&gt;&lt;P&gt;2) Refer to the &lt;A href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_PerformanceTuning_AdminGuide/html_frameset.htm"&gt;R80.20 Performance Tuning Administration Guide&lt;/A&gt;&amp;nbsp;to see all relevant commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2018 12:40:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/40636#M8597</guid>
      <dc:creator>Sergei_Shir</dc:creator>
      <dc:date>2018-10-28T12:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/54144#M10815</link>
      <description>&lt;P&gt;just wanted to note that the blacklist with IPs added to the blacklist with&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fwaccel dos blacklist -a 1.2.3.4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;do not survive a reboot&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 18:58:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/54144#M10815</guid>
      <dc:creator>GHaider</dc:creator>
      <dc:date>2019-05-22T18:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/54375#M10859</link>
      <description>This is fantastic feature and thanks for sharing.&lt;BR /&gt;&lt;BR /&gt;BTW is there any limitation for number of IP addresses inr fwaccel dos blacklist chain?</description>
      <pubDate>Sun, 26 May 2019 17:46:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/54375#M10859</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2019-05-26T17:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56137#M11290</link>
      <description>&lt;P&gt;Heiko, blacklists continue to work after SecureXL is disabled in R80.20+ because of the same behavior in the SK below with drop templates, basically all packets associated with a new connection (no connections table match) are always sent to the firewall workers first for handing. &lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk150812&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" target="_blank" rel="nofollow noopener noreferrer"&gt;sk150812: High CPU when traffic is dropped by fw_workers&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 01:05:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56137#M11290</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-06-19T01:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56138#M11291</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;, speaking of SAM rules, they are visible in SmartView Monitor, as I am pretty sure you know, and I think it would be a grand idea of including the blacklist and whitelist entries in there as well, possibly in the form of the rules.&lt;/P&gt;
&lt;P&gt;Would logging the events associated with whitelisted and blacklisted IPs with, perhaps, heavily suppressed logs be possible?&lt;/P&gt;
&lt;P&gt;Are there OS syslog events associated with these actions?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 01:13:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56138#M11291</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-19T01:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56164#M11301</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt;&amp;nbsp;Are you referring to SmartViewMonitor legacy GUI client? If so, I would be very surprised if any inclusions are event possible with R80 family&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 10:04:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56164#M11301</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-06-19T10:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56217#M11323</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;, whyever not? This is still the UI for the Monitoring blade in R80.30.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2019 21:03:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56217#M11323</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-19T21:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56234#M11329</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once again, I am asking which specific UI you are referring to, one of SmartConsole tabs or to SmartViewMonitor. When you answer, I can explain &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 07:03:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56234#M11329</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-06-20T07:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 - IP blacklist in SecureXL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56281#M11341</link>
      <description>&lt;P&gt;I am talking about SAR portion of the SmartViewMonitor:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1612iCB51E11CDAA01924/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not see the SAR in the Device and License Information of the SmartConsole:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 976px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1613i139276089ADB5AEB/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 14:00:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-20-IP-blacklist-in-SecureXL/m-p/56281#M11341</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-06-20T14:00:12Z</dc:date>
    </item>
  </channel>
</rss>

