<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Drop Templates on SMB in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12337#M284</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From my 730:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;[Expert@seven-eleven]# sim dropcfg&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Usage: sim dropcfg &amp;lt;options&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Options:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -l - show current configuration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -f &amp;lt;file&amp;gt; - set configuration file&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -r - reset drop rules&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -y - avoid confirmation&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -h - this help message&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -e - enforce on the external interface only&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Configuration file:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; The file should contain drop rules. One rule per line.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; Each rule line must contain one or more of the following parameters:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; src &amp;lt;source ip&amp;gt;/&amp;lt;subnet&amp;gt; - Source subnet/ip. Subnet is optional.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; dst &amp;lt;destination ip&amp;gt;/&amp;lt;subnet&amp;gt; - Dest subnet/ip. Subnet is optional.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; dport &amp;lt;destination port&amp;gt; - Dest port.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; proto &amp;lt;ip protocol&amp;gt; - IP Protocol (eg. TCP=6,UDP=17,ICMP=1).&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Examples:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; src 1.1.1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; dport 80 proto 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; src 1.1.1.0/24 dst 2.2.0.0/16 dport 53 proto 17&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Notes:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * If subnet is not specified, a single ip is assumed&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * Use '*' to specify 'any'. It's the same as not specifying the param&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * You can add comment lines by using '#' at the beginning of the line&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * Empty lines are ignored&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;[Expert@seven-eleven]# sim dropcfg -l&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Drop DB is not configured&lt;/SPAN&gt;&lt;/H6&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Dec 2018 09:16:46 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2018-12-04T09:16:46Z</dc:date>
    <item>
      <title>Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12334#M281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, why are SecureXL drop templates not available on SMB? Tech explanation&amp;nbsp;preferred. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 05:03:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12334#M281</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-04T05:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12335#M282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I suspect it's due to the more limited resources (RAM in particular) on the SMB appliances.&lt;/P&gt;&lt;P&gt;That said sim dropcfg should be available, which is not quite the same thing, but gives you a way to drop specific traffic more efficiently.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 07:00:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12335#M282</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-12-04T07:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12336#M283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Dameon. If I get it right this command kind of injects drop templates into SecureXL tables so end result is more or less the same.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 08:16:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12336#M283</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-04T08:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12337#M284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From my 730:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;[Expert@seven-eleven]# sim dropcfg&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Usage: sim dropcfg &amp;lt;options&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Options:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -l - show current configuration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -f &amp;lt;file&amp;gt; - set configuration file&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -r - reset drop rules&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -y - avoid confirmation&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -h - this help message&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; -e - enforce on the external interface only&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Configuration file:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; The file should contain drop rules. One rule per line.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; Each rule line must contain one or more of the following parameters:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; src &amp;lt;source ip&amp;gt;/&amp;lt;subnet&amp;gt; - Source subnet/ip. Subnet is optional.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; dst &amp;lt;destination ip&amp;gt;/&amp;lt;subnet&amp;gt; - Dest subnet/ip. Subnet is optional.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; dport &amp;lt;destination port&amp;gt; - Dest port.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; proto &amp;lt;ip protocol&amp;gt; - IP Protocol (eg. TCP=6,UDP=17,ICMP=1).&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Examples:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; src 1.1.1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; dport 80 proto 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; src 1.1.1.0/24 dst 2.2.0.0/16 dport 53 proto 17&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Notes:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * If subnet is not specified, a single ip is assumed&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * Use '*' to specify 'any'. It's the same as not specifying the param&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * You can add comment lines by using '#' at the beginning of the line&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt; * Empty lines are ignored&lt;/SPAN&gt;&lt;/H6&gt;&lt;H6&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;[Expert@seven-eleven]# sim dropcfg -l&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'andale mono', monospace; font-size: 11px;"&gt;Drop DB is not configured&lt;/SPAN&gt;&lt;/H6&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 09:16:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12337#M284</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-12-04T09:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12338#M285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And&amp;nbsp;&lt;STRONG style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold; font-size: 18.6667px;"&gt;SecureXL penalty box mechanism:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;[Expert@seven-eleven]# sim erdos&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;Usage: sim erdos &amp;lt;options&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt; -h&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - this help message&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-x &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - enforce only on external interfaces&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-v &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - enforce on VPN traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-m &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - monitor only&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;Penalty box:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-e &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - enable/disable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-t &amp;lt;seconds&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - time a host is penalized&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-d &amp;lt;violations&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- rate of allowed violations per address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-l &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - log when a host is put in the penalty box&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-k &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - log dropped packets&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;Misc:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt; -z&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - zap the statistics&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-f &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - enable/disable drop all fragments&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 12px; font-family: 'andale mono', monospace;"&gt;-o &amp;lt;0/1&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - enable/disable drop all IP options&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 09:20:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12338#M285</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-12-04T09:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12339#M286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx for the info&amp;nbsp;Günther. I have found two related SKs:&amp;nbsp;sk67861 and&amp;nbsp;sk74520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Later one was especially nice. I tried to run this command that is mentioned in it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;CODE&gt;cat /proc/ppk/erdos&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And guess what... Appliance instantly rebooted &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There was this entry in /var/log/messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2018 Dec&amp;nbsp; 4 11:41:06 RD6281 user.notice root: [!] Panic detected at , log archived to logs folder&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What a surprise, haven't seen that before in similar cases. So I checked /logs folder and there was&amp;nbsp;panic-1543916466.zip there. Inside there are two files&amp;nbsp;dmesg-ramoops-0 and&amp;nbsp;dmesg-ramoops-1 all with the same relevant entries:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;1&amp;gt;Unable to handle kernel paging request at virtual address 20202024&lt;BR /&gt;&amp;lt;1&amp;gt;pgd = ec3bd580&lt;BR /&gt;&amp;lt;1&amp;gt;[20202024] *pgd=53dc9003, *pmd=00000000&lt;BR /&gt;&amp;lt;0&amp;gt;Internal error: Oops: 206 [#1] SMP ARM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SMB is sometimes such fun to explore....&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 11:43:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12339#M286</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-04T11:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12340#M287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wonder why would drop templates require more memory. I mean what is significantly different compared to processing accept templates...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 11:55:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12340#M287</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-04T11:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12341#M288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SecureXL Penalty Box mechanism isn't supported on SMB--listed here:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105380" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105380"&gt;Check Point R77.20.xx for 600 / 700 / 1100 / 1200R / 1400 / 910 Appliance Features and Known Limitations&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 14:33:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12341#M288</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-12-04T14:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12342#M289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We should accept&amp;nbsp;that is not supported, as i wrote here:&amp;nbsp;&lt;/P&gt;&lt;TABLE cellpadding="0" cellspacing="0" style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;&lt;TBODY class="" style="border: 0px; font-weight: inherit; font-size: 14px;"&gt;&lt;TR class="" data-object-id="2616" data-object-type="102" style="border: 0px; font-weight: inherit; font-size: 14px;"&gt;&lt;TD class="" style="background-color: #f8fbfe; border-width: 0px 0px 1px; border-style: initial initial solid initial; border-color: initial initial #f0f0f0 initial; padding: 12px 5px;"&gt;&lt;DIV style="border: 0px; font-weight: inherit; margin: 0px 0px 0px;"&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2616-securexl-corexl-on-smb-devices" style="color: #e45785; border: 0px; font-weight: inherit;"&gt;SecureXL &amp;amp; CoreXL on SMB devices&lt;/A&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;I would also not mess around with NAT Templates... Had autonomous reboots&amp;nbsp;after enabling the kernel parameter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 15:48:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12342#M289</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-12-04T15:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12343#M290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Frankly speaking, there is no need to support such features on SMB because as we all know it can stand any [D]DoS thrown at it. &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/wink.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But... Why do I have the feeling someone tried to implement it after all, did not succeed and just left it there?! Or just tried to see what will run stock from Gaia and what not... Hmm, reminds me of cpview utility that suddenly disappeared as unsupported in early builds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, I think for a device that is apparently assigned the task to defend&amp;nbsp;you in all possible ways, support for drop connections is very very important. After all, how much of the external traffic coming in is 'red'?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Dec 2018 17:29:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12343#M290</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-04T17:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12344#M291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a small business appliance with a (in comparison) low price&amp;nbsp;tag that gives you a fair level of security&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. To replace SPLAT Embedded from the Safe@Office, CP has buildt GAiA Embedded and WebGUI, trying to have a subset of GAiA / CP SW functionality available on SMB devices. During firmware history, you were able to encounter leftovers from crond (now implemented), bootmenue diagnostics, cpview, a.o.&amp;nbsp;showing decisions in the development process.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2018 10:30:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12344#M291</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-12-05T10:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Drop Templates on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12345#M292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am currently testing my own GeoIP protection based on sim dropcfg. So far, it works nice. No noticeable increase in memory or CPU consumption. I am blocking two regions that I won't mention here; only that the database has 7950 IPs at the moment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2018 13:28:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Drop-Templates-on-SMB/m-p/12345#M292</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-07T13:28:19Z</dc:date>
    </item>
  </channel>
</rss>

