IP Block Feature
Description
The IP Block feature provides the ability to block malicious traffic to and from certain IP addresses.
The IP Block feature requires the list of malicious IP addresses as a feed (URL).
The IP Block feature runs periodically, fetches the IP list again and updates the IP addresses in the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. based on the list in the feed.
The blocking mechanism is enforced by an Access Control rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. with a Dynamic Object
Special object type, whose IP address is not known in advance. The Security Gateway resolves the IP address of this object in real time..
Check Point's Security Intelligence maintains and periodically updates a list of IP addresses known as TOR Exit Nodes:
https://secureupdates.checkpoint.com/IP-list/TOR.txt
|
Best Practice - We recommend to consider the "Custom Intelligence Feeds" from sk132193. |
|
Notes:
|
CLI

|
|
|
|
|
|
|
|
|
|

Parameter |
Description |
---|---|
|
Shows the built-in help. |
|
Adds IP feed URLs (separated by a comma) to the configuration. |
|
Deletes IP feed URLs (separated by a comma) from the configuration. |
|
Shows the configured IP feed URLs. |
|
Specifies the Dynamic Object name in the configuration. For example, |
|
Show the configured Dynamic Object name. |
|
Updates the IP addresses in the configuration. |
|
Forces the update. |
|
Shows the output in JSON format. |
|
Clears the cache. |
|
Starts the periodic run of the feature at the specified intervals. Specify the interval ACTIVATE as a number followed by units:
|
|
Stops the periodic run of the feature. |
Procedure
Follow these steps in SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. and on the Security Group
A logical group of Security Gateway Modules that provides Active/Active cluster functionality. A Security Group can contain one or more Security Gateway Modules. Security Groups work separately and independently from each other. To the production networks, a Security Group appears a single Security Gateway..

Step |
Instructions |
||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 |
Connect with SmartConsole to the Management Server |
||||||||||||
2 |
Create a new Dynamic Object: From the right panel Objects, click New > More > Network Object > Dynamic Objects > Dynamic Object. |
||||||||||||
3 |
In the New Dynamic Object window, enter a name (for example, You use this name later in the CLI on the Security Group. |
||||||||||||
4 |
In the applicable Access Control policy, add a new rule that drops all traffic from the new Dynamic Object:
|
||||||||||||
5 |
Connect to the command line on the Security Group. |
||||||||||||
6 |
Log in to the Expert mode. |
||||||||||||
7 |
Configure the Dynamic Object as configured in SmartConsole:
|
||||||||||||
8 |
Examine the Dynamic Objects configuration to make sure the new Dynamic Object is added:
|
||||||||||||
9 |
Configure the Dynamic Object in the IP Block settings as configured in SmartConsole:
|
||||||||||||
10 |
Examine the IP Block configuration to make sure the new Dynamic Object is added:
|
||||||||||||
11 |
Configure the URL for the IP feed:
Example:
|
||||||||||||
12 |
Examine the configuration to make sure the feed URL is added:
|
||||||||||||
13 |
Start the periodic run at the specified intervals:
|
||||||||||||
14 |
Examine the configuration to make sure the "ip_block" command is scheduled to run at the specified intervals by the CPD daemon:
Example output:
|
||||||||||||
15 |
In SmartConsole, install the Access Control Policy on the Security Group object. |
||||||||||||
16 |
Examine the log on the Security Group:
|