IBM QRadar

IBM QRadar

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only
  • 1.  custom action script block a traffic on firewall

    Posted Wed December 04, 2019 05:43 AM
    would like to know if anyone has done similar. I want qradar to connect to firewall over API and tell firewall to drop that traffic.

    we use Cisco firepower management center (FMC) which supports API access to firewall. can qradar custom action call in API pass the destination IP value to firewall and drop traffic.

    ------------------------------
    s 3k
    ------------------------------


  • 2.  RE: custom action script block a traffic on firewall

    Posted Thu December 05, 2019 03:23 AM
    Hi @s 3k,

    I have not done it in my environment yet but it should be possible. QRadar can pass source IP and dest IP in the API calls.
    ​​

    ------------------------------
    Chinmay Kulkarni
    ------------------------------



  • 3.  RE: custom action script block a traffic on firewall

    Posted Thu December 05, 2019 05:51 AM
    thanks Chinmay
    Any others experienced in implementing a solution..i look for hints on how it was orchestrated. i would like to know whether qradar (and how) qradar passes source ip| dest IP and invoke firewall API if at all its possible.


    ------------------------------
    s 3k
    ------------------------------



  • 4.  RE: custom action script block a traffic on firewall

    Posted Sun August 24, 2025 08:27 AM

    Did you find a solution in the end?

    I'm also troubled.



    ------------------------------
    界佑 陳
    ------------------------------



  • 5.  RE: custom action script block a traffic on firewall

    Posted 2 days ago

    Hi,

    have done this for a customer years ago and used it as an example in my lectures for training. Warning: after successful testing we deactivated it cause of too many false actions. The blocking addresses were based on an IPS device. Here is what you have to do: define a custom action for your shunning script talking to your firewall. Checkpoint does provide a special CLI language for that purpose called sam. Select that scrpt in your rule dealing with your top offenses. Check the screenshots enclosed for details. Unfortunately I cant share the py script but basically just follow the sk97306.



    ------------------------------
    [Karl] [Jaeger] [#ibmchampion]
    [QRadar Specialist]
    ------------------------------