- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
BLOCK BAD REPUTATION IPS IN A DYNAMIC WAY
Hello experts,
Kindly guide me if its possible to have like a rule, blade or external connector or any recommended configuration in order to have protection on the Gateway perimeter to block malicious reported IP address range like botnets, hackers etc? This is with the purpose to reduce having to create objects and manually applied to specific existing block rule on the network access layer.
Thanks!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Well, you would be managing it from actual management server, NOT locally, so object in dashboard would need to have proper topology, rules etc. Honestly, I would not take any such steps yet, maybe open TAC case and ask to get an official answer to your question about best way to block malicious IPs on locally managed SMB appliance.
Thats at least what I would do : - )
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I agree. I already submitted a ticket. Thank you so much for the support guys!
Your expertise helped me alot!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As my friend always says, we are IT brothers from different mothers helping one another ; - )
Andy

- « Previous
-
- 1
- 2
- Next »