IP Block Feature

Description

The IP Block feature provides the ability to block malicious traffic to and from certain IP addresses.

The IP Block feature requires the list of malicious IP addresses as a feed (URL).

The IP Block feature runs periodically, fetches the IP list again and updates the IP addresses in the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. based on the list in the feed.

The blocking mechanism is enforced by an Access Control ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. with a Dynamic ObjectClosed Special object type, whose IP address is not known in advance. The Security Gateway resolves the IP address of this object in real time..

Check Point's Security Intelligence maintains and periodically updates a list of IP addresses known as TOR Exit Nodes:

https://secureupdates.checkpoint.com/IP-list/TOR.txt

Best Practice - We recommend to consider the "Custom Intelligence Feeds" from sk132193.

Notes:

  • These IP ranges are excluded by default: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

  • The IP Block feature supports only IPv4 feeds.

CLI

Procedure

Follow these steps in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. and on the Security GroupClosed A logical group of Security Gateway Modules that provides Active/Active cluster functionality. A Security Group can contain one or more Security Gateway Modules. Security Groups work separately and independently from each other. To the production networks, a Security Group appears a single Security Gateway..