- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
hey,
anyone had a scenario in which he loaded an indicator file to block IP addresses and than keep seeing traffic from them accepted on implied rule?
i was wondering isn't indicator file should be "stronger" the implied rules ?
Just to understand, are you referring to Thread Indicator file or something else?
Hello @_Val_,
I'm replying to this (old) thread because I'd like to understand more about this topic: I have the same question of @Dor_Marcovitch.
Check Point version: R81.20
I have an External Indicator (global) defined in Threat Prevention blade, pointing to a text file hosted by an internal website (e.g. https://MySite.com/IoC.txt ). That file is listing public IP addresses that must be blocked (30 in total). The Test Feed is working fine (all IP addresses are discovered successfully).
In order to test the new IoC, I put the public IP address of my home computer in that list:
Main goal is to block any IP address on the IoC list, always.
I also tried with Network Feed object put as Source in an Access Rule (destination Any), but, again, traffic from my home computer versus the public IP address of the Check Point gateway is not blocked due to Implied Rule 0 (like point 1); however, traffic versus internal website is blocked by the Access Rule matching Network Feed (that is good).
What about all points above ?
Thank you.
For the first issue, see: https://support.checkpoint.com/results/sk/sk105740
For the second issue, what blades are active?
Network Feeds only require Firewall to be active, so it might be a better fit.
Hello @PhoneBoy,
thank you for your reply.
About the first: The SK you mentioned seems to address the issue with the Implied Rule issue quite well happening for both Threat Indicators and Network Feeds (I will look into the matter further).
Network Feeds do their job blocking traffic versus NAT-ted websites (blocked by specific Access Rule).
Regarding the second:
What is not clear now is why, using (custom) Threat Indicators, traffic coming from blocked IP versus NAT-ted websites is allowed.
Thank you very much.
Keep in mind that the IP address configured in your feed needs to be the Original, pre-NAT address to block properly. Just like in all Access Control and Threat Prevention policy layers, you need to match against the original IP addresses in the packet prior to any NAT operations. Trying to match and block a post-NAT IP address will not work.
Pre-R81, we didn't block incoming traffic from the Custom Threat Indicator feeds, only the outbound traffic.
If that's still happening in R81+, it warrants a TAC case.
hey,
anyone had a scenario in which he loaded an indicator file to block IP addresses and than keep seeing traffic from them accepted on implied rule?
i was wondering isn't indicator file should be "stronger" the implied rules ?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 20 | |
| 20 | |
| 16 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY