- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi
We are wanting to block IP and domains from our own threat feed and other sources automatically. I would have thought simply using antibot blade with various IOC feeds would do the job for IP / domain reputation protections. However it would appear that is not the case. At this stage we are not wanting to enable AV blade as well so wondering if there is another easy way to do these blocks and automatically update them every X min without AV blade?
I suppose we could do this somehow via API for the creation of the objects and add those to a normal firewall rule but would really rather avoid having to do manual policy push and work out a way to know if there were changes in the first place
Use fwaccel dos deny -l and other such options. If possible then create a linux script and run it with cron or cpd_sched_config
Thanks for the suggestion, did think about that but seems to only apply for IP not domains as well. If we have to end up doing this way, would the -N "<Name of deny list>" appear in traffic logs to identify the particular drops are from this feed and not other drops?
This is right, currently this is a limitation however what I did is I built a DNS specific solution based on DNS RPZ and then maintains a domain lists there. But for IP addresses I use fwaccel dos deny option
Either AV or Anti-Bot should suffice to use ioc_feed….provided the feed is in the correct format.
When you say it is not working, what is the precise behavior you expect versus what you observed?
Please provide screenshots/examples of what you configured as well as a sample of the feed(s) you’re using.
R81.20 has a feature called Network Feeds that doesn’t require AV or Anti-Bot.
It should be a little less picky in terms of the file format of the IOCs.
When doing a nslookup/dig/ping/http to IP or domain that is in the feed file there is only normal traffic log and nothing from anti bot blade. We expected that this would be detected/dropped when doing those tests to the sites in the feed files and would only need AB blade enabled since under Protections section these reputation indicators appear as AB blade. After dealing with TAC have been advised to use IP or Domain reputation based custom feeds you require both AB and AV blades not just AB which was not our understanding. The same test methods to sites from threatcloud are picked up just fine though and behaving how we'd expected but told custom IOC feeds require both blades.
The feed files are simply domain / IP listed one per line with no delimiters (each type in separate file) and configured in smartconsole > indicators with type specified appropriately. I see they have been fetched by the GW under $FWDIR/external_ioc/<feed name> As a test TAC asked to enable the AV blade and started getting the behavior we wanted so that rules out the feed file format
At this stage we are only wanting to do IP and Domain reputation based drops. At this stage we are preferring not to enable AV blade as well as not wanting additional load / scan files, only base on reputation if possible. That's why I'm asking if there's any alternative / easy ways to accomplish this for IP and domains, the fwaccel dos deny may well work via script somehow for IP but not domains.
Please PM me the SR in question, because I'm pretty sure it's not accurate that you need both AV and AB enabled for this.
However, AV/AB only block HTTP(S) and DNS by default, so it wouldn't necessarily block a ping either.
What version/JHF are you using?
A Network Feed is definitely the way to go here if you're on R81.20.
I was very surprised to be told that as well and did suspect ping wouldn't be picked up but thanks for confirming. I know it used to be for outbound traffic only but is now inbound as well, presume that would be for any port though?
We have been running the debugs on a cluster running R81.10 take 55 but also observe the same issue on one running take 66
Inbound as of R81, yes.
It's possible the HTTPS/DNS Only nature of this also changed.
Using the TOR exit node feed as an example (https://secureupdates.checkpoint.com/IP-list/TOR.txt) and with both AV/Bot enabled, I can see ICMP blocked and other non-HTTP ports blocked (NTP as an example) on outbound attempts
I'm on R81.10 Take 78 right now but swear it was same on Take 66 (100% sure on the NTP hits).
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Thu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY