- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi,
Trying to add an external IOC feed in R81
I get an error regarding the ssl certificate. Is there a way to import de CA cert?
Thanks!
Oh....i've had my fun with TAC on this one 🙂
Here is everything I have learned to date:
So....yeah.....still working with TAC now so we can avoid the CLI based deployments.
Somethings that would have made CLI based deployment 'manageable' IMO:
NOTE: References here are within the "$FWDIR/conf/ioc_feeder.conf"
Use an actual Custom Intelligence Feed site and it will work. Refer to sk132193 "What is the "Custom Intelligence Feeds" feature?"
Hi,
I already know that sk. We are using a internal site to add our ioc. It works if I follow the sk132193, but on the smart console (in R81) I get an error
@Youssef_Obeidal can you look at this - failure validating a certificate from an internal site.
Hello,
well use this:
"For HTTPS remote feeds, if the certificate update process failed, you can skip the certificate verification. Run: export EXT_IOC_NO_SSL_VALIDATION=1 on the Security Gateway."
choose https for transport:
ioc_feeds add --feed_name XXXYYYZZZ--transport https --resource "https://XXXYYYZZZ" --format [value:1,type:ip]
this should help!
Team
I will make a brief summary about this issue and the results of the case with the TAC.
Smart Console External IOC Feeds works properly if the GWs are in R81 and above. After long sessions with the TAC, labs, Escalation Team, that was the conclusion. Maybe somebody had luck with different versions, but we could not. We had 4 different environments with SMS in R81.10 and GWS R80.40
It is clear in documentation the SMS must be in R81 and higher (Smart Console Feature), but not the GWs
From SK this part is confuse
Installation
The feature is integrated in version R80.30 and above.
Note: To import external Custom Intelligence Feeds using SmartConsole in versions R81 and higher, refer to: Threat Prevention R81 Administration Guide > Configuring Advanced Threat Prevention Settings > Configuring Threat Indicators > Importing External Custom Intelligence Feeds > Importing External Custom Intelligence Feeds in SmartConsole.
In some way they must to include the Smart console feature ¨ works properly¨ in GWs with R81 and higher. Was suggested to the TAC to edit the sk132193 and add some captures, Logs queries for verifications as is posted in CHECKMATES threads.
We tested the CLI way and works perfect in the versions they mentioned, but not the Smart console External IOC feeds.
We also realized in all the environment we tested this file could not be found when you troubleshoot
$FWDIR/log/ext_ioc_push.elg
I think with all the tests we made, there is a lot of information from the case we had to edit the SK and help the community.
Cheers
During any of these testings with using an internal server with either a internal or self signed cert, are we saying that the only way to deploy these now is via the GW CLI; along with the cert exception listed in SK132193?
Followup question: When someone clicks on the "approve certificate" in this process, where is that exemption stored? Is that within our smartconsole app or on the management server itself?
I ask as I was able to get a proper certificate installed on our source but I continue to get these '401' errors about credentials; which i am 100% certain is not the issue.
I wonder if there is some cache here that I can clear out so to attempts against the new cert (i.e Act like I never attempted before).
Hi Scottc98,
Did you found a solution for the 401 (auth) error in SmartConsole? We have the same issue with an External IOC with authentication. We tried from complex to simple passwords but it does not seem to work. (The username is received correctly on the server side)
In a browser the authentication works, and even through the ioc_feeds CLI command, but that is hard(er) to manage, and we like to keep the CLI settings to an absolute minimum.
Thanks!
Oh....i've had my fun with TAC on this one 🙂
Here is everything I have learned to date:
So....yeah.....still working with TAC now so we can avoid the CLI based deployments.
Somethings that would have made CLI based deployment 'manageable' IMO:
NOTE: References here are within the "$FWDIR/conf/ioc_feeder.conf"
Thank you so much for the excellent write up!
I'm struggling with similar issues while attempting to deploy and external IOC feed, with authentication, via SmartConsole, in our environment (R81.10 on our management and our gateways). I have an SR open with TAC and am wondering if we get the same response about the SmartConsole feed with authentication not being supported until R81.20... 🤔
For what it's worth, I just got a response from TAC confirming that IOC feeds with authentication, via SmartConsole, are not supported prior to R81.20. Sounds like they confirmed what you described in your post. They did mention that we could use the CLI to set the authentication for the SmartConsole IOC:
ioc_feeds add --feed_name NAMEOFFEED --transport https --resource <URL OF FEED> --user_name USERNAME
The other alternative they suggested was to upgrade our management servers to R81.20, which also seems to follow what you posted about (I assume include the potential caveats with testing a non-R81.20 gateway, etc.).
@AntE That seems to align with what I was told. Deployment of an authenticated feed via 81.20 management seems to work the best verses the CLI method; especially for a large environment. As you can see with your 'ioc_feeds add' statement, you would then be prompted for the password right afterwards to enter. Now...imaging doing that on 50+ clusters (100+ gateways) 😞
After playing around in my lab more, I do wish they had the "obfuscated_password" option via CLI. When it came to deployment planning, you could at least control the deployment via CLI in batches. I haven't see where you can put in an 'exception' or 'install on' option for the IOC feeds. Its seems like once you configure it, it gets installed on any thread profile where you have indicators activated in your profile and have the appropriate blades enabled (i.e. Anti-virus/Anti-bot). While l like the ease of deployment out to prod with just a threat policy install, it would be nice to have more controls here on 'where' you deploy them
(Note to anyone: if there is some documentation I am missing on that non-cli ability, kindly point me in the right direction ;))
The ability to 'test' the feed is what I found to be off here between R81.20 Management and non-R81.20 gateways. I believe that is different from R81.10 'testing' before. The way I understood the 'test connection' on R81.10 management is that it just tested the credentials/connection from your smartconsole source. On R81.20, I think they reach out to the gateway you select and actually run a test feed setup to validate not only the credentials/connection to the server but also the content based on your filter feed settings. If my assumption is correct, I am thinking that Checkpoint has that R81.20 warning simply cause its the only version they can assure will work. My hope is that it will be allowed on previous versions via some JHF or if its allowed on R81.10 out of the box already, maybe fix that language in the warning ;))
Oh....and TAC did fix my feed filtering issues. Evidently, you have to use 'space' as the delimiter on the feed example I mentioned. REALLY wish that there was something noted in some SK or in the R81.20 Threat guides that breaks those options down 🤔 There is clearly differences in the smartconsole options between R81.10 & R81.20 and can't seem to find docs that support those change options for customers to reference .
Lastly, I did a quick review of the latest jumbo release for R81.10 (Take 110). Don't see the username fix included yet (i.e. lowercase only limitation) so i assume that is going to be in another release.
Ah! Thank you so much for the clarification! You have definitely helped save me a lot of work (and potentially a few headaches, lol)! 😄
You are correct regarding the IOC "Test Connectivity" button in the SmartConsole for R81.10 - it does seem to just test the provided credentials from the SmartConsole machine. I am glad to hear that the testing functionality seem much more robust in R81.20.
I would also second everything that you've mentioned in terms of additions/improvements to the IOC feed features and documentation. An "obfuscate password" would greatly help with large scale deployments, having more granular controls on where the IOC feeds are deployed would also be useful in larger environments, and more clarification/information in the documentation would be helpful for anyone looking to deploy IOC feeds in their environment.
Hello, @Tal_Paz-Fridman
Is it mandatory for the “Indicators” that one explicitly configures, the source server, to work with “csv”?
Or can they work with txt?
I have one SRV with IP 192.168.136.132 where I have two files, one for IPs and another for domains, but both are in TXT format.
Can I create an indicator for each of my files in their original format (TXT), or is it mandatory to convert them to CSV format?
This information is not clear to me.
ioc_feed files have to be a specific format, as I recall.
If you want to use a flat file format, use a Network Feed object instead, which can be used with the Access or Threat Prevention policy.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
15 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY