- CheckMates
- :
- Products
- :
- General Topics
- :
- Re: How to do Bulk uploads of IOC IP's and URL's f...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to do Bulk uploads of IOC IP's and URL's files in Checkpoint firewall
Hi Everyone
How to upload bulk updates of IOC URL file in checkpoint firewall instead of manual update one by one url
In Palo-alto firewall EDL option for Bulk update 10,000 IP Address
In checkpoint gateway is there any option similar like EDL if avail, guide the process
Regards,
Chiranjeevi
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That works if the feed is published by some web server. If it's a file on a local machine and you don't have it on a web server the firewalls can access, the management API will still work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello mate,
Review that post about IOCs: https://community.checkpoint.com/t5/Security-Gateways/IOC-feeds/m-p/212021#M40210
BR.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Always funny to see my own post lol. Anyway, I think thats best method I found so far, but if anyone has better one, be free to share.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That works if the feed is published by some web server. If it's a file on a local machine and you don't have it on a web server the firewalls can access, the management API will still work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I would probably use the management API to make a series of Application/Site objects (Ideally around 200 domains per object) which you then stick in an Application/Site Group object or an Application/Site Category. You can use an existing category like "Critical Risk". This can only filter HTTP-like traffic, so if you need to filter SSH, it won't work. It requires either HTTPS Inspection or the "Categorize HTTPS sites" setting to be enabled. Depending on how the objects are made, they may match more traffic than intended (for example, blocking *.ar could block a file named 32x32.left.arrow.png). I did some match expression testing last year, which can help create specific matching expressions.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If R81.20, you can use Network Feeds, which can be used in both Access Control and Threat Prevention policies.
See: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuid...
For earlier releases, you're probably looking at using ioc_feeds.
However, if you are importing a lot of IoCs, you should really upgrade to R81.20 as the infrastructure for this has improved dramatically.
We've tested ~2 million IoCs and had no issues.
The limit in R81.10 and earlier is...much lower.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Im "throwing" another post of mine then lol
https://community.checkpoint.com/t5/Security-Gateways/Network-feed/m-p/212407#M40317
Andy
