<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Anti-Bot looking at inbound traffic on external interface? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134299#M24106</link>
    <description>&lt;P&gt;I am under the impression that the Anti-Bot blade looks at traffic leaving internal networks in an attempt to find internal hosts that have already been compromised and the internal network is defined by the settings for interfaces in the topology, "Leads to: Internet (External) , internal, etc.&lt;BR /&gt;I recently enabled ABOT and am surprised to see log cards for udp/53 DNS query for a C&amp;amp;C site requests being detected by ABOT coming in on a external interface as shown in the screen shot.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log card 11-17.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14290i751F5FAE5E265F06/image-size/medium?v=v2&amp;amp;px=400" role="button" title="log card 11-17.png" alt="log card 11-17.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;The interface bond1.1027 is indeed set to "External"&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bond interface.png" style="width: 489px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14291i8D56ADB2007597E2/image-dimensions/489x275?v=v2" width="489" height="275" role="button" title="bond interface.png" alt="bond interface.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;The only thing I can think of to explain this is that my public IP in the log card is used as a static NAT in a host object for a host that lives off of a "Internal" interface.&lt;/P&gt;&lt;P&gt;Is that why Anti-Bot picked this up?&lt;/P&gt;&lt;P&gt;The internal host that 4.3.x.x NAT's to does indeed accept and service DNS requests from the internet.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Nov 2021 17:36:10 GMT</pubDate>
    <dc:creator>Mike_Jensen</dc:creator>
    <dc:date>2021-11-17T17:36:10Z</dc:date>
    <item>
      <title>Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134299#M24106</link>
      <description>&lt;P&gt;I am under the impression that the Anti-Bot blade looks at traffic leaving internal networks in an attempt to find internal hosts that have already been compromised and the internal network is defined by the settings for interfaces in the topology, "Leads to: Internet (External) , internal, etc.&lt;BR /&gt;I recently enabled ABOT and am surprised to see log cards for udp/53 DNS query for a C&amp;amp;C site requests being detected by ABOT coming in on a external interface as shown in the screen shot.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log card 11-17.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14290i751F5FAE5E265F06/image-size/medium?v=v2&amp;amp;px=400" role="button" title="log card 11-17.png" alt="log card 11-17.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;The interface bond1.1027 is indeed set to "External"&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bond interface.png" style="width: 489px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14291i8D56ADB2007597E2/image-dimensions/489x275?v=v2" width="489" height="275" role="button" title="bond interface.png" alt="bond interface.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;The only thing I can think of to explain this is that my public IP in the log card is used as a static NAT in a host object for a host that lives off of a "Internal" interface.&lt;/P&gt;&lt;P&gt;Is that why Anti-Bot picked this up?&lt;/P&gt;&lt;P&gt;The internal host that 4.3.x.x NAT's to does indeed accept and service DNS requests from the internet.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 17:36:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134299#M24106</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-11-17T17:36:10Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134305#M24107</link>
      <description>&lt;P&gt;In R81 and above, I believe it also looks at stuff coming in from external as well.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 21:56:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134305#M24107</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-17T21:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134307#M24108</link>
      <description>&lt;P&gt;I should have specified.... I am running 80.30&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 21:59:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134307#M24108</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-11-17T21:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134403#M24111</link>
      <description>&lt;P&gt;I'm pretty sure the up arrow next to the bond interface in the log card indicates the packet was detected by AB leaving that interface outbound, not coming into it.&amp;nbsp; So if that interface is declared External that would indeed be considered outbound traffic and fall under the purview of Anti-Bot.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 14:41:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134403#M24111</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-18T14:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134410#M24112</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;I see what you mean about the up arrow and that makes sense.&amp;nbsp; What still doesn't make sense to me is my hosts IP is the 4.30.x.x.&amp;nbsp; If this is outbound traffic shouldn't the 4.30.x.x IP show as the source?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 14:56:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134410#M24112</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-11-18T14:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134509#M24115</link>
      <description>&lt;P&gt;I had a similar scenario this morning this time for a&amp;nbsp;Backdoor.Win32.Ghost.E ABOT protection.&amp;nbsp; Per the log card the source is external and the destination is my organizations public IP 4.30.x.x which of course is on a external interface.&lt;/P&gt;&lt;P&gt;Basically from the source and destination in the log card this looks like external traffic coming into my organization.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log card 11-19-2021.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14321i5041E429D6CD9C5A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="log card 11-19-2021.png" alt="log card 11-19-2021.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; This time I was able to download a pcap from the Forensic Details:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pcap 11-19-2021.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14322iA885BA81DD3CD148/image-size/medium?v=v2&amp;amp;px=400" role="button" title="pcap 11-19-2021.png" alt="pcap 11-19-2021.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;It appears there was a NAT translation as the 172.19.x.x IP is a host object of mine that has a static NAT in it for the 4.30.x.x IP.&lt;/P&gt;&lt;P&gt;Is the "offending packet" the first one listed in the PCAP that caused the ABOT log?&amp;nbsp; If it is this shows the traffic did indeed originate from the public internet and came into a external interface.&lt;/P&gt;&lt;P&gt;With that being said the PCAP does show my 172.19.x.x IP replying to the alleged malicious host so is packet # 2 the offending packet?&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 14:30:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134509#M24115</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-11-19T14:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134582#M24116</link>
      <description>&lt;P&gt;I think this strangeness you are seeing may be caused by how different applications behave.&amp;nbsp; Some are "client talks first" and some are "server talks first".&amp;nbsp; An example of "server talks first" is FTP, once the TCP 3-way handshake is complete the server presents a 220 banner first then the client replies with USER.&amp;nbsp; An example of "client talks first" is HTTP, where after the TCP 3-way handshake is complete the client issues an HTTP verb to the server and the server responds.&amp;nbsp; Perhaps this detection happened in a "server talks first" scenario where your client initiated the connection, but there wasn't any data to make the detection until the server talked back first inbound.&lt;/P&gt;
&lt;P&gt;A little-known fact covered in my 2021 IPS/AV/ABOT Video Series is that if the TP action is Detect and "Packet Capture" is set (as in your case), you can get up to 100KB of packets in the capture if the connection continues, whereas you will normally only get one offending packet if the action is Prevent.&amp;nbsp; This behavior when Detect is set gives additional context, but can make figuring out the offending packet a bit tougher.&amp;nbsp; See here for more reading:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk148492&amp;amp;partition=Advanced&amp;amp;product=IPS," target="_blank"&gt;sk148492: Packet capture for IPS logs with "Prevent" or "Detect" actions does not show the desired number of packets&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Given what I've stated above, does what you are seeing in the packet capture make more sense now?&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 18:40:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134582#M24116</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-20T18:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134668#M24123</link>
      <description>&lt;P&gt;Hi Tim,&lt;/P&gt;&lt;P&gt;Yes, that makes sense with the FTP server talk first example.&amp;nbsp; What about DNS queries?&amp;nbsp; From what I understand that is a "client talk first", right?&lt;/P&gt;&lt;P&gt;I replicated this scenario in my lab and ABOT performs the same way.&amp;nbsp; If I make a DNS query to a known malicious site to a DNS server that sits behind my lab gateways Check Point's ABOT "prevents" it.&amp;nbsp; In my lab I changed ABOT from detect to prevent and I do see the difference in fewer packets captured.&amp;nbsp; In this DNS query example I now only see 1 packet which must be the offending packet.&amp;nbsp; The pcap shows the offending packet with a source IP of the host "outside/external" to my gateways.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 15:46:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134668#M24123</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-11-22T15:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134678#M24124</link>
      <description>&lt;P&gt;DNS is indeed a client talks first protocol and detection can happen on the very first packet because there is no handshaking with UDP, and it sounds like you are seeing what you should in regards to how many packets are captured with Detect vs. Prevent.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 17:02:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134678#M24124</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-22T17:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134748#M24137</link>
      <description>&lt;P&gt;Why would a inbound DNS request on a external interface be looked at by Anti Bot?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 16:10:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/134748#M24137</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-11-23T16:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136012#M24316</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;Does AB &lt;STRONG&gt;ever&lt;/STRONG&gt; inspect inbound DNS traffic? I think I see what Mike is talking about as the source/destination IP addresses make it seem like this is external --&amp;gt; internal traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 14:31:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136012#M24316</guid>
      <dc:creator>jthomp26</dc:creator>
      <dc:date>2021-12-10T14:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136013#M24317</link>
      <description>&lt;P&gt;If an internal client makes a DNS lookup request for a site name and the outbound DNS request does not run afoul of Domain Reputation, the IP provided in the inbound DNS response would then need to be checked by Anti-bot for IP reputation.&amp;nbsp; Or perhaps Anti-bot waits until the actual outbound connection request to the resolved IP, and then applies the IP Reputation check at that point?&amp;nbsp; This latter scenario is heavily implied in the "Reputation Layer" section of the ATRG for AV/ABOT, but I'm not 100% sure about this and we'll probably need someone in R&amp;amp;D to comment.&amp;nbsp; Tagging &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 14:48:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136013#M24317</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-12-10T14:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136226#M24373</link>
      <description>&lt;P&gt;It would make sense that'd we catch the DNS reply before we make the actual IP connection.&lt;BR /&gt;Maybe&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8166"&gt;@TP_Master&lt;/a&gt;&amp;nbsp;or someone on the team knows for sure.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 06:10:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136226#M24373</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-14T06:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136289#M24389</link>
      <description>&lt;P&gt;Hi Damon, it's not the reply Check Point is catching.&amp;nbsp; My system actually never sends a reply.&amp;nbsp; It is the initial DNS query inbound that Check Point is catching.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 14:22:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136289#M24389</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-12-14T14:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136379#M24398</link>
      <description>&lt;P&gt;Then...you have your answer &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 06:16:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/136379#M24398</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-15T06:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/137009#M24463</link>
      <description>&lt;P&gt;I eventually opened a TAC case for this to investigate the ABOT traffic flow.&amp;nbsp; In summary per TAC ABOT doesn't care about what interfaces are set as internal or external and all that matters is the Threat Prevention Rule Base.&amp;nbsp; If I want to have ABOT look at traffic leaving my internal networks only I would have to configure the Threat Prevention Rule Base accordingly.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 16:19:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/137009#M24463</guid>
      <dc:creator>Mike_Jensen</dc:creator>
      <dc:date>2021-12-22T16:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Anti-Bot looking at inbound traffic on external interface?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/137010#M24464</link>
      <description>&lt;P&gt;Interesting, thanks for the follow-up.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 16:48:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Anti-Bot-looking-at-inbound-traffic-on-external-interface/m-p/137010#M24464</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-12-22T16:48:39Z</dc:date>
    </item>
  </channel>
</rss>

