<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic to port 500 is accepted by implied rule on 0 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86814#M17429</link>
    <description>&lt;P&gt;You can't directly block UDP/TCP port 500 in the main Network/Firewall policy because it is allowed in the implied rules which are always "first"; it has to be initially allowed then later denied by vpnd as an invalid peer.&amp;nbsp; The only way to change this is to modify the implied rules settings in the Global Properties, but this is a great way to cause all kinds of nasty problems with basic firewall functionality and is NOT recommended.&lt;/P&gt;
&lt;P&gt;I would suggest putting this attacking IP address in the SecureXL blacklist or in a SAM rule (&lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank" rel="noopener"&gt;sk112454: How to configure Rate Limiting rules for DoS Mitigation (R80.20 and newer))&lt;/A&gt;, which would kill the traffic before it is even able to reach the first implied rules.&amp;nbsp; Or you could simply block that entire country with Geo Policy since it is applied prior to the first implied rules.&amp;nbsp; Geo Updatable Objects are referenced after the first implied rules, so you'll need to use Geo Policy instead of Geo Updatable Objects for blocking the attacker in this specific case.&lt;/P&gt;</description>
    <pubDate>Sat, 30 May 2020 17:16:34 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2020-05-30T17:16:34Z</dc:date>
    <item>
      <title>Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86777#M17412</link>
      <description>&lt;P&gt;We have observed a traffic permit from Source IP 106.75.64.59 (Blacklisted 6/114) to destination IP 202.56.229.167 on destination ports 500.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Observation:&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;* High no. of events to same destination IP&lt;BR /&gt;* Anomaly: Excessive Firewall Permit from Multiple Source&lt;BR /&gt;* As per the log analysis, we found there is a Firewall Permit on bharti firewall. &lt;BR /&gt;We have analysed the external to external traffic from source 106.75.64.59 (Blacklisted 6/114) to a single destination port.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Do we need to block the source if the communication is not legitimate?&lt;BR /&gt;If the source IP is legitimate, please confirm whether we can whitelist the same in our rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 22:03:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86777#M17412</guid>
      <dc:creator>Prime</dc:creator>
      <dc:date>2020-05-29T22:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86795#M17420</link>
      <description>&lt;P&gt;To confirm is&lt;SPAN style="font-family: inherit; background-color: #ffffff;"&gt;&amp;nbsp;the destination currently used to terminate VPNs? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff;"&gt;(This may alter the suggestions provided)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 May 2020 09:47:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86795#M17420</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-05-30T09:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86799#M17421</link>
      <description>(202.56.229.167)this is our secondary firewall outside interface IP, we are not using for VPN</description>
      <pubDate>Sat, 30 May 2020 11:42:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86799#M17421</guid>
      <dc:creator>Prime</dc:creator>
      <dc:date>2020-05-30T11:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86800#M17422</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43914"&gt;@Prime&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are some implied rules that open certain ports on a gateway. &lt;BR /&gt;Depending on the settings in "Global Properties &amp;gt; Firewall" the ports can be different.&lt;BR /&gt;&lt;BR /&gt;You can find an overview of used ports here:&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-2740-r80x-ports-used-for-communication-by-various-check-point-modules" target="_blank" rel="noopener"&gt;R80.x - Ports Used for Communication by Various Check Point Modules&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 May 2020 12:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86800#M17422</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-05-30T12:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86804#M17423</link>
      <description>&lt;P&gt;All IKE UDP 500 traffic to and from the gateway interfaces themselves (this does not include IKE traffic trying to transit the gateway) will always be allowed by these implied rules:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ike_implied.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6298iD92E4CFC702AE321/image-size/large?v=v2&amp;amp;px=999" role="button" title="ike_implied.png" alt="ike_implied.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Once allowed the source IP address will be checked against a list of known VPN peers by vpnd, and if it doesn't match the IKE traffic is discarded.&amp;nbsp; While in most cases the two endpoints for a site-to-site VPN have fixed IP addresses, all IKE traffic to the gateway's interfaces must be initially accepted from any source IP address to cover the case of a Dynamically Assigned IP (DAIP) VPN peer.&lt;/P&gt;</description>
      <pubDate>Sat, 30 May 2020 12:59:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86804#M17423</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-30T12:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86812#M17427</link>
      <description />
      <pubDate>Sat, 30 May 2020 16:54:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86812#M17427</guid>
      <dc:creator>Prime</dc:creator>
      <dc:date>2020-05-30T16:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86813#M17428</link>
      <description>&lt;P&gt;&lt;SPAN&gt;is it the legitimate traffic and can we whitelist the same in our rule? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Should we block the source if the communication is not legitimate?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Attached the log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 May 2020 17:00:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86813#M17428</guid>
      <dc:creator>Prime</dc:creator>
      <dc:date>2020-05-30T17:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to port 500 is accepted by implied rule on 0</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86814#M17429</link>
      <description>&lt;P&gt;You can't directly block UDP/TCP port 500 in the main Network/Firewall policy because it is allowed in the implied rules which are always "first"; it has to be initially allowed then later denied by vpnd as an invalid peer.&amp;nbsp; The only way to change this is to modify the implied rules settings in the Global Properties, but this is a great way to cause all kinds of nasty problems with basic firewall functionality and is NOT recommended.&lt;/P&gt;
&lt;P&gt;I would suggest putting this attacking IP address in the SecureXL blacklist or in a SAM rule (&lt;A class="cp_link sc_ellipsis" style="max-width: 840px;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112454&amp;amp;partition=Advanced&amp;amp;product=SecureXL," target="_blank" rel="noopener"&gt;sk112454: How to configure Rate Limiting rules for DoS Mitigation (R80.20 and newer))&lt;/A&gt;, which would kill the traffic before it is even able to reach the first implied rules.&amp;nbsp; Or you could simply block that entire country with Geo Policy since it is applied prior to the first implied rules.&amp;nbsp; Geo Updatable Objects are referenced after the first implied rules, so you'll need to use Geo Policy instead of Geo Updatable Objects for blocking the attacker in this specific case.&lt;/P&gt;</description>
      <pubDate>Sat, 30 May 2020 17:16:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Traffic-to-port-500-is-accepted-by-implied-rule-on-0/m-p/86814#M17429</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-30T17:16:34Z</dc:date>
    </item>
  </channel>
</rss>

