Hello @_Val_,
I'm replying to this (old) thread because I'd like to understand more about this topic: I have the same question of @Dor_Marcovitch.
Check Point version: R81.20
I have an External Indicator (global) defined in Threat Prevention blade, pointing to a text file hosted by an internal website (e.g. https://MySite.com/IoC.txt ). That file is listing public IP addresses that must be blocked (30 in total). The Test Feed is working fine (all IP addresses are discovered successfully).
In order to test the new IoC, I put the public IP address of my home computer in that list:
- I expected that when attempting to reach the public IP address of the Check Point gateway from my home PC via a browser (https://<CheckPointPublicIP>), I would be blocked by Check Point. Instead, according to the SmartConsole logs, the traffic is marked as Accept by Implied Rule 0.
I assume, then, that the implied rules take precedence over everything else (?). If that's the case, how can I prevent/solve this? - I expected that when attempting to reach a public IP address of an internal website published via Check Point (NAT) from my home PC, I would be blocked by Check Point. However, according to the SmartConsole logs, the traffic is marked as Accepted by the corresponding Access Rule (allowing traffic from outside to the website).
I have a feeling that the Indicator might not be working, or the traffic isn't being blocked because there is no actual malicious activity (I'm simply accessing a website through a browser). What can you tell me about this?
Main goal is to block any IP address on the IoC list, always.
I also tried with Network Feed object put as Source in an Access Rule (destination Any), but, again, traffic from my home computer versus the public IP address of the Check Point gateway is not blocked due to Implied Rule 0 (like point 1); however, traffic versus internal website is blocked by the Access Rule matching Network Feed (that is good).
What about all points above ?
Thank you.