Hi, We have a CheckPoint firewall which has been configured to replace DNS queries to known malicious destinations with a bogus DNS trap IP, when devices then subsequently attempt to connect to that DNS trap IP a reaction script can be triggered. We are essentially looking for guidance on a web GET/POST/whatever that we could then initiate to unregister all devices associated with a given username.
NB: The CheckPoint wouldn't know the MAC address of the node involved in the abuse. To debug the event information from CheckPoint I temporarily simply made the script log all data it receives: [Expert@checkpoint-management:0]# cat $RTDIR/bin/ext_commands/block_on_clearpass #!/bin/bash EVENT=$(cat) echo $EVENT >> /tmp/block_on_clearpass Herewith a sanitised sample: [Expert@checkpoint-management:0]# tail -n 1 /tmp/block_on_clearpass (StartTime: 20Dec2022 11:10:26; Uuid: deadbeef-dead-beef-dead-beef00000000; rowid: ENdeadbeef-dead-beef-dead-beef00000000; id_generated_by_indexer: false; first: true; sequencenum: 1; log_id: 2000; DisplayName: IP_Block_from_DNS_Trap; Category: User Defined Events; cu_rule_id: DEADBEEF-DEAD-BEEF-DEAD-BEEFDEADBEEF; is_correlated: 1; num_of_updates: 0; is_last: 0; event_start_time: 1671534625; detection_time: 2022-12-20T09:10:26Z; time_interval: 60; max_num_count_detected: 2; cu_log_count: 2; cu_detected_by_hostname: checkpoint-management; cu_detected_by: 172.254.254.23; users_repetitions: 2; aba_customer: SMC User; source_repetitions: 2; origin_repetitions: 2; destination_repetitions: 2; service_repetitions: 2; Severity: High; type: Correlated; ProductName: VPN-1 & FireWall-1; product_family: Access; Destination: (hostname: laptop-joed; countryname: Israel; IP: 62.0.58.94; repetitions: 1) ; Origin: (IP: 0; hostname: redacted-fw01; repetitions: 1) ; Service: (port: 443; protocol: 6; servicename: https; repetitions: 1) ; Source: (user_name: joed; IP: 172.254.254.23; machine_name: laptop-joed; repetitions: 1) ; logid: 392281947) ; I'm essentially hoping for a way that I can unregister all nodes belonging to 'joed' in the above example... [cid:image001.gif@01D915F4.F6144F70]<https://www.syrex.com/> David Herselman | Managing Director e: d...@syrex.co<mailto:d...@syrex.co> | o: 086 11 79739<tel:+27117211900> | c: 082 784 7222<tel:082%20784%207222> a: turnberry office park, 48 grosvenor road, bryanston, 2021<https://maps.google.com/?q=Syrex> www.syrex.com<https://www.syrex.com/> / accreditations<https://www.syrex.com/accreditations> This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this email. Please notify the sender immediately by email if you have received this email by mistake and delete it from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited. Think before you print. [cid:image002.png@01D915F4.F6144F70]<https://www.facebook.com/syrexsa> [cid:image003.png@01D915F4.F6144F70]<https://twitter.com/syrexsa> [cid:image004.png@01D915F4.F6144F70]<https://www.linkedin.com/company/1723334> CHANGE OF BANKING DETAILS We have not changed our banking details recently. We will not just send an email to inform you of a change, should we ever do so.
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users