<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port Scan and SMB in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Port-Scan-and-SMB/m-p/18683#M636</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it is just like that - as the fw sam command does not work on SMBs and only SAM Events created by CP SAM GWs will work (no 3rd party events), this is all we have (and we even do know no details)...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Sep 2018 12:16:46 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2018-09-07T12:16:46Z</dc:date>
    <item>
      <title>Port Scan and SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Port-Scan-and-SMB/m-p/18681#M634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the GAiA gateways, &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110873&amp;amp;partition=Advanced&amp;amp;product=Security"&gt;&lt;EM&gt;sk110873 How to configure Security Gateway to detect and prevent port scan&lt;/EM&gt;&lt;/A&gt;&amp;nbsp;gives a detailed configuration guide for R7x and R80.x. But for SMB units, in IPS protections we only find the protection &lt;EM&gt;Masscan Port Scanner&lt;/EM&gt; - but no description how it works. I would assume that the IPS is able to collect statistics, but is that done with locally managed SMB devices ? And what about SMBs managed by R7x / R80.x, can you configure an automatic SAM rule to close the port scanning connections also on SMB gateways ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 12:18:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Port-Scan-and-SMB/m-p/18681#M634</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-08-14T12:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port Scan and SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Port-Scan-and-SMB/m-p/18682#M635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Günther, on locally managed SMB appliances, I believe that is all you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For centrally managed, they have the same protections, such as Host Port Scan, Zmap, Masscan, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They do&amp;nbsp;not support SAM rules, and using "Block source" automatic reactions in SmartEvent will have no effect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 13:29:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Port-Scan-and-SMB/m-p/18682#M635</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-08-14T13:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port Scan and SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Port-Scan-and-SMB/m-p/18683#M636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it is just like that - as the fw sam command does not work on SMBs and only SAM Events created by CP SAM GWs will work (no 3rd party events), this is all we have (and we even do know no details)...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Sep 2018 12:16:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Port-Scan-and-SMB/m-p/18683#M636</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-09-07T12:16:46Z</dc:date>
    </item>
  </channel>
</rss>

