<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering FEED in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110175#M4845</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;You are absolutely right!!!&lt;BR /&gt;This is why I wrote my own proxy, and it runs ontop of the Gaia embedded device... just not as CheckPoint made it.&lt;BR /&gt;The platform is nice, the webui is nice but I was thinking that CheckPoint is the best company in the world and specifically it's an Israelly company.&lt;BR /&gt;I assume that on an Israeli spaceship or plans or drones CheckPoint would be a star.(That is of course if you would or Dafna would agree)&lt;/P&gt;&lt;P&gt;I didn't wanted to write what I wrote^^^ but if the TAC(what is this acronym&amp;nbsp; exactly?) wasn't able to understand the situation and read it in 4 seconds then I was thinking about&lt;BR /&gt;starting to be a kinder garden teacher instead of being a tech expert.&lt;BR /&gt;It might even be better since the appliance has a lifespan of 3-5 years while teaching someone how to be smart can last until he will not need this world anymore.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Feb 2021 12:04:39 GMT</pubDate>
    <dc:creator>elicro</dc:creator>
    <dc:date>2021-02-08T12:04:39Z</dc:date>
    <item>
      <title>URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110120#M4838</link>
      <description>&lt;P&gt;Like Thread Feeds which can be downloaded using&amp;nbsp;ioc_feeds I was wondering if there is an option to download a URL Filtering feed.&lt;/P&gt;&lt;P&gt;I have implemented everything that is needed for a thread feed to work in my 1530 device.&lt;/P&gt;&lt;P&gt;The only missing things are:&lt;BR /&gt;downloding (curl)&lt;BR /&gt;and validating the content.&lt;/P&gt;&lt;P&gt;It's pretty simple and I was wondering why it was not implemented in this 1530 NGFW?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 07:20:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110120#M4838</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-08T07:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110146#M4840</link>
      <description>&lt;P&gt;Afaik, URL Filtering is done using CP ThreatCloud information only. In GAiA OS, you can use feeds for Anti-Virus and Anti-Bot as explained in sk132193. In Embedded GAiA OS not even this is possible - see OS in sk132193 !&lt;/P&gt;
&lt;P&gt;But why would you use feeds for URLF if you have an operating URLF service blade ?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 10:03:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110146#M4840</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-02-08T10:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110164#M4842</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;Thanks for the sk.&lt;BR /&gt;I understand a bit better but if I have a 512MB RAM EdgeRouter Lite (&lt;A href="https://www.dipole.co.il/product/ubiquiti-edgerouter-lite/" target="_blank"&gt;https://www.dipole.co.il/product/ubiquiti-edgerouter-lite/&lt;/A&gt;) that can do that I do not see any reason in the world the any embedded GAIA cannot do that.&lt;BR /&gt;The decision to "lock" this feature from the device is not technical but Business/Enterpirse based.&lt;BR /&gt;ie: "If I can sell a device that costs a specific sum and get from the client a specific one, why should I provide him with a fully featured product in less money??"&lt;/P&gt;&lt;P&gt;That How I see it since I have a product that does everything I need and want...&lt;BR /&gt;I still need a real example and not docs, the docs are full of .. other things which I don't want to mentioned.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 11:17:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110164#M4842</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-08T11:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110172#M4844</link>
      <description>&lt;P&gt;Even GAiA does not do it, so GAiA Embedded also can not do it. You have to choose yourself the product that fits you and your purposes best....&lt;/P&gt;
&lt;P&gt;But EdgeRouter Lite has not much of a firewall nor ABot, AV, IPS - not to mention Theat Emulation or Zero Day MW Protection.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 12:03:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110172#M4844</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-02-08T12:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110175#M4845</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;You are absolutely right!!!&lt;BR /&gt;This is why I wrote my own proxy, and it runs ontop of the Gaia embedded device... just not as CheckPoint made it.&lt;BR /&gt;The platform is nice, the webui is nice but I was thinking that CheckPoint is the best company in the world and specifically it's an Israelly company.&lt;BR /&gt;I assume that on an Israeli spaceship or plans or drones CheckPoint would be a star.(That is of course if you would or Dafna would agree)&lt;/P&gt;&lt;P&gt;I didn't wanted to write what I wrote^^^ but if the TAC(what is this acronym&amp;nbsp; exactly?) wasn't able to understand the situation and read it in 4 seconds then I was thinking about&lt;BR /&gt;starting to be a kinder garden teacher instead of being a tech expert.&lt;BR /&gt;It might even be better since the appliance has a lifespan of 3-5 years while teaching someone how to be smart can last until he will not need this world anymore.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 12:04:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110175#M4845</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-08T12:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110217#M4850</link>
      <description>&lt;P&gt;TAC = Technical Assistance Center.&lt;/P&gt;
&lt;P&gt;On the non-SMB appliances, in R81, we have a feature called Generic Data Center objects.&lt;BR /&gt;It doesn’t do URLs but it’s the same basic idea you’re talking about.&lt;BR /&gt;To do something similar for URLs would be an RFE.&lt;/P&gt;
&lt;P&gt;With a centrally managed SMB, you could add URLs in bulk to a Custom Application/Site object via the API.&lt;BR /&gt;Locally managed SMB appliances don’t have a REST API.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 19:30:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110217#M4850</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-02-08T19:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110224#M4853</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;What is RFE?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Currently with the latest R20.20.X GA it seems that the logs shows when a reload happens to a specific degree.&lt;BR /&gt;It's pretty simple to add a daemon that will add bulk Custom Application/Site object via an API. I can write one and publish it.&lt;BR /&gt;I wrote a DB named SquidBlocker which was meant replace to some degree SquidGuard, However only hospitals can get some benefit from this Damon.&lt;BR /&gt;What I still don't understand yet is how could a thread prevention system can apply rules and only 10 minutes later being used.&lt;BR /&gt;I maintain couple FW's and the delay I have seen in production is critical... it's not realistic in this era and the soon IPv6 era to apply rules in such a speed.&lt;/P&gt;&lt;P&gt;It's hard for me to see that such a REST API was not embedded into the system.&lt;BR /&gt;It requires:&lt;/P&gt;&lt;P&gt;- username+password / token / other solution&lt;/P&gt;&lt;P&gt;- couple very specific endpoints&lt;/P&gt;&lt;P&gt;Currently it's possible via clish so why no? From what I understood there is not money in this... did I understood right?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 19:52:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110224#M4853</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-08T19:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110229#M4855</link>
      <description>&lt;P&gt;The REST API is part of our on-premise central management (a Smart-1 Appliance or a VM), which can manage policy on SMB appliances.&lt;BR /&gt;This will also address your "when will the policy be active" question since SmartConsole shows you when the policy installation (an explicit action) has completed.&lt;/P&gt;
&lt;P&gt;I am not aware if there is a plan to include management API support on locally managed SMB appliances.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 20:41:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110229#M4855</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-02-08T20:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110284#M4864</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;and what about cli?&lt;BR /&gt;This:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;[Expert@Gateway-ID-7F9B74D9]# cpstat fw

Policy name: local
Install time: Tue Feb 9 11:26:18 2021&lt;/LI-CODE&gt;&lt;P&gt;is this an indication that the rules need to apply?&lt;/P&gt;&lt;P&gt;Also what is the cause of the ttl for the rules to be applied?&lt;/P&gt;&lt;P&gt;When the fw_configload finish like this&lt;/P&gt;&lt;LI-CODE lang="c"&gt;# /opt/fw1/bin/fw_configload
Preparing Manifest (Modern Policy) files... Done.
FW:
Compiled OK.
Preparing Unified Policy... Done.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it mean that the rules should work?&lt;BR /&gt;I am not sure I understood exactly what these commands do.&lt;/P&gt;&lt;P&gt;In iptables/nftables and/or a simple proxy I can understand, but with your FW it's like you have created a whole new OS and Kernel which works..&lt;BR /&gt;The main issue now is that it took 10 minutes to apply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will continue on email.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 09:31:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110284#M4864</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-09T09:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110375#M4876</link>
      <description>&lt;P&gt;Security enforcement is done in our own kernel modules that are very different from iptables and the like.&lt;BR /&gt;The policy (Access and Threat Prevention) is actually compiled from the configuration and loaded into our kernel modules.&lt;BR /&gt;For our non-SMB gateways, and when SMB gateways are managed by external management, there are explicit actions that take place:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Make policy configuration changes (either SmartConsole or API)&lt;/LI&gt;
&lt;LI&gt;Publishing&amp;nbsp;the configuration changes (required because of multiple administrator support)&lt;/LI&gt;
&lt;LI&gt;Install policy to relevant gateways, which actually compiles the configuration into the code that is run in the various kernel modules&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;On a self-managed SMB appliance, which use a similar code base, but different implementation, there is no concept of concurrent administrators, so no publish action is required.&lt;BR /&gt;However, the rest of the architecture is more or less the same.&lt;BR /&gt;Change to Access, Threat Prevention, VPN, or other policy requires compilation and installation before it is active.&lt;BR /&gt;While there's no actual "Install Policy" action you take in the WebUI or CLI, I can assure you it is happening.&lt;/P&gt;
&lt;P&gt;It would be highly inefficient to recompile and reinstall the policy after each change in the WebUI or via the CLI.&lt;BR /&gt;I assume, and your experience seems to suggest, that we check every so often for configuration changes and only if there are changes, compile and install the policy.&lt;/P&gt;
&lt;P&gt;Given that your current issue seems to be "I have to wait 10 minutes before the policy is active" I assume you want a way to force this.&lt;BR /&gt;I believe you're on the right track.&lt;/P&gt;
&lt;P&gt;fw_configload appears to compile the basic access policy.&lt;BR /&gt;There are a couple of public references to it, one of which is:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164793&amp;amp;partition=Advanced&amp;amp;product=Small" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164793&amp;amp;partition=Advanced&amp;amp;product=Small&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;Given that you execute it when you modify certain .def files, which are not in the UI but affect the security configuration, it's a pretty safe bet that's what the command does.&lt;/P&gt;
&lt;P&gt;As there are other commands under&amp;nbsp;$FWDIR/bin for other parts of the config (App Control, URL Filtering, QoS, NAT, etc), fw_configload may not be enough on its own to effect the necessary changes.&lt;BR /&gt;Given these commands aren't documented, I'm not precisely sure if/when they need to be executed.&amp;nbsp;&lt;BR /&gt;Given your use case, it could be one or more of:&amp;nbsp;appi_configload, appi_cmi_configload, urlf_configload&lt;BR /&gt;There may be others I do not know about.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cpstat fw simply tells you when the access policy was last loaded to the kernel module and some additional details (similar to the fw stat command I mentioned earlier).&lt;/P&gt;
&lt;P&gt;All of that said, leveraging external management is probably the way to go here if you are managing more than a couple of these appliances.&lt;BR /&gt;This could be one or more of (depending on your precise requirements):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Smart-1 Appliance (either physical or virtual)&lt;/LI&gt;
&lt;LI&gt;Smart-1 Cloud&lt;/LI&gt;
&lt;LI&gt;SMP (Also Cloud-Based, included in the purchase price of a 1500 series)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This would provide other benefits (ensuring the same policy is configured on every gateway, centralized logging/reporting, API support, etc).&lt;BR /&gt;It would also provide a much more deterministic policy installation process.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 01:52:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110375#M4876</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-02-10T01:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110539#M4883</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;I have seen some of these binaries and I have seen the sources of some of these being used.&lt;BR /&gt;I didn't had enough time to research each and every one of them.&lt;BR /&gt;I assumed that I would receive some introduction to the device before I am buying it, maybe a demo of what's included in the price.&lt;/P&gt;&lt;P&gt;The fact that I need to learn the device by myself (while compared to others is pretty good..) is something I would like to avoid.&lt;BR /&gt;I have sent an email but didn't got any response to it.&lt;BR /&gt;A basic "this mail was read and we will contact you in 3 days" makes the difference between being a part of the process to being a "guest" in the process.&lt;/P&gt;&lt;P&gt;This SMP interesting but I don't know if it was included in the price I paid...&lt;BR /&gt;From what I remember there was a price for it when I spoke to someone in your company.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 11:43:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110539#M4883</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-11T11:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110589#M4884</link>
      <description>&lt;P&gt;SMP is included as part of the most recent SMB appliances 1500/1600/1800.&lt;BR /&gt;See here for requesting your portal:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk122259" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk122259&lt;/A&gt;&lt;BR /&gt;See also here for relevant API commands:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/latest/SmpAPIs/#introduction~v1%20" target="_blank"&gt;https://sc1.checkpoint.com/documents/latest/SmpAPIs/#introduction~v1%20&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And, yes, it can also be purchased separately for older SMB appliances.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 17:36:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110589#M4884</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-02-11T17:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110813#M4890</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;I will check the SMP in 3 days and will see how it is compared to what I have now.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 13:47:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/110813#M4890</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-02-15T13:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/112763#M4970</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An external threat feed is as simple as:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;#!/usr/bin/env bash

wget http://f-gogs.ngtech.home/NgTech-Home/tls-bypass-lists/raw/master/010-GeneralTLSInspectionBypass -O /tmp/010-GeneralTLSInspectionBypass

CURRENT_CONTENT=$(clish -c "show application application-name \"GeneralTLSInspectionBypass\""|egrep -v "^(description:|$|application-urls:|Categories:|application-id:|application-name:)" |awk '{print $1}')

function add_regex() {
        echo "$2"|grep -x -F "$1" &amp;gt;/dev/null
        RES="$?"

        if [ "${RES}" -eq "1" ];then
                if [ -f "/storage/regex-ready-appliance" ];then
                        echo "This appliance is ready to be used with regex"

                        echo -n "Adding regex: "
                        echo $1

# Some fixes are required for clish to be able to add EOL
#                       clish -c "set application application-name GeneralTLSInspectionBypass regex-url true add url $1"
                else
                        echo "This appliance is not ready to be used with Regex in cli"
                fi
        fi
}


while read line; do
        echo -n "Working on regex: "
        echo ${line}
        add_regex "${line}" "${CURRENT_CONTENT}"
done &amp;lt;/tmp/010-GeneralTLSInspectionBypass&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The above example is missing the option to remove using some differential comparison and couple other things like rules naming but it's as simple as this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;And better response later then in a sec sometimes: The EdgeRouter Lite is a basic nDPI FW but has some limitation in the AV indeed.&lt;BR /&gt;About the IPS and ABOT I am not yet convinced it doesn't have the software capablities.&lt;BR /&gt;The way I see it is only missing the right proxy software.&lt;BR /&gt;I do have the software to do that but yet to publish it....&lt;BR /&gt;Zero Day MW Protection on my device, well I am not sure it's out of the proxy specification with some API.&lt;BR /&gt;I have yet to write every software CP wrote but with enough resources it's doable.&lt;BR /&gt;The funny thing is that Palo Alto wanted me to patch their systems and I refused and the reason is that one person cannot hold the entire system on himself.&lt;BR /&gt;I assume that above 100 Servers on-top of one person is normal in my industry but not alone in most cases.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Mar 2021 21:34:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/112763#M4970</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-03-08T21:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering FEED</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/112999#M4973</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;OK lets leave API aside and use CLISH:&lt;/P&gt;&lt;P&gt;The next is a script with comparison to the current ruleset of the customized app-name&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;#!/usr/bin/env bash

DEBUG="1"
DRY_RUN="0"

APP_NAME="$1"

URL="http://f-gogs.ngtech.home/NgTech-Home/tls-bypass-lists/raw/master/010-GeneralTLSInspectionBypass"

if [ -z "${APP_NAME}" ];then
        echo "Missing App Name"
        exit 1
fi

if [ "$2" == "check" ];then
        DRY_RUN="1"
        echo "Running in dry run mode" &amp;gt;&amp;amp;2
fi

if [ ! -z "$3" ];then
        URL="$3"
fi

TMP_DOWNLOAD_FILE=$(mktemp)

wget "${URL}" -O ${TMP_DOWNLOAD_FILE}
RES=$?

if [ "${RES}" -gt "0" ];then
        echo "Error Downloading file from URL: \"${URL}\""
        rm -v "${TMP_DOWNLOAD_FILE}"
        exit ${RES}
fi

TMP_CLISH_UPDATE_FILE=$( mktemp )

TMP_CURRENT_CONFIG_FILE=$( mktemp )

TMP_CLISH_TRANSACTION_FILE=$( mktemp )

clish -c "show configuration"|egrep "^set application application-name \"${APP_NAME}\"" &amp;gt; ${TMP_CURRENT_CONFIG_FILE}

while read line; do
        if [ "${DEBUG}" -gt "0" ];then
                echo -n "DEBUG LEVEL 1: Working on regex: " &amp;gt;&amp;amp;2
                echo ${line} &amp;gt;&amp;amp;2
        fi
        echo "set application application-name \"${APP_NAME}\" regex-url true add url \"$line\"" &amp;gt;&amp;gt; ${TMP_CLISH_UPDATE_FILE}
done &amp;lt; ${TMP_DOWNLOAD_FILE}

DIFF=$(diff "${TMP_CURRENT_CONFIG_FILE}" "${TMP_CLISH_UPDATE_FILE}" )

DELETE_OBJECTS=$(echo "${DIFF}" |egrep "^-set " |awk '{print $7}')

for object in ${DELETE_OBJECTS}; do
        echo "set application application-name \"${APP_NAME}\" remove url ${object}" &amp;gt;&amp;gt; ${TMP_CLISH_TRANSACTION_FILE}
done

echo "${DIFF}" |egrep "^\+set " |sed -e "s@^\+set @set @g" &amp;gt;&amp;gt;  ${TMP_CLISH_TRANSACTION_FILE}

cat "${TMP_CLISH_TRANSACTION_FILE}"

if [ "${DRY_RUN}" -eq "0" ];then
        clish -f "${TMP_CLISH_TRANSACTION_FILE}"
fi

echo "Finished Transaction"
echo "Cleaning up files ..."

rm -v "${TMP_DOWNLOAD_FILE}"
rm -v "${TMP_CLISH_UPDATE_FILE}"
rm -v "${TMP_CURRENT_CONFIG_FILE}"
rm -v "${TMP_CLISH_TRANSACTION_FILE}"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example of usage:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;/storage/scripts/update-cron.sh "GeneralTLSInspectionBypass" check "http://f-gogs.ngtech.home/NgTech-Home/tls-bypass-lists/raw/master/010-GeneralTLSInspectionBypass"&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tell me if this seems reasonable enough for a case.. And I am expecting an answer...&amp;nbsp;&lt;/P&gt;&lt;P&gt;GITHUB LINK: &lt;A href="https://github.com/elico/cp-tls-inspection-application-update-cron/blob/master/cron-example-with-diff.sh" target="_self"&gt;cron-example-with-diff.sh&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Mar 2021 19:32:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/URL-Filtering-FEED/m-p/112999#M4973</guid>
      <dc:creator>elicro</dc:creator>
      <dc:date>2021-03-11T19:32:48Z</dc:date>
    </item>
  </channel>
</rss>

