Hello,
We are observing malicious IPs hitting gateway public IPs on tcp/264.
TCP port 264 is FW1_topo - Check Point Security Gateway SecuRemote Topology Requests: Topology Download from Security Gateway (by FWD daemon) to SecuRemote (build 4100 and higher) and SecureClient.
According to sk17745 (Services allowed by "Accept Control Connections" option in "Global Properties"), it is is enabled from anywhere to all Security Management Servers and all Security Gateways.
https://support.checkpoint.com/results/sk/sk17745
We have an explicit drop rule blocking traffic from specific malicious IP intel data sources. However, as the traffic is classified as control connection traffic, the connection is being allowed by the implied rule.
Is there an inherent way by which we can explicitly (or implicitly) drop control connection traffic from a list of malicious source IPs?
Note that I want to automate this process. Though effective, SAM rules are a manual and not particularly scalable solution.
Regards,
Simon