<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Layers in R80 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1728#M103130</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@TIm Hall @Martin Raska,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The explanation Tim provided was spot on!&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While I am not the authority on the subject, the exam content is based on the course ware and after consulting with that team the context of the question is based on the R80.10 gateway.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tug&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.checkpoint.com/downloads/professional-services/training/check-point-certification-faq.pdf"&gt;Certification FAQ&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Jan 2018 18:33:22 GMT</pubDate>
    <dc:creator>Jason_Tugwell</dc:creator>
    <dc:date>2018-01-11T18:33:22Z</dc:date>
    <item>
      <title>Policy Layers in R80.x</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1717#M103119</link>
      <description>&lt;P&gt;I would like to clarify the use of layers in R80 Management Server and SmartConsole.&lt;/P&gt;
&lt;P&gt;A layer is a set of rules, or a rule-base. R80 organizes the policy with &lt;EM&gt;ordered layers&lt;/EM&gt;. For example, Gateways that have the Firewall and Application control blades enabled, will have their policies split into two ordered layers: &lt;EM&gt;Network&lt;/EM&gt; and &lt;EM&gt;Applications&lt;/EM&gt;. Another example is Gateways that have the IPS and Threat Emulation blades enabled, will have their policies split into two ordered layers: &lt;EM&gt;IPS&lt;/EM&gt; and &lt;EM&gt;Threat Prevention&lt;/EM&gt;. For Pre-R80 Gateways, this basically means the same enforcement as it always was, only in a different representation in the Security Management.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5;"&gt;Ordered layers are enforced this way: When the Gateway matches a rule in a layer, it starts to evaluate the rules in the next layer. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The layers concept opens more options for policy management:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Setting different view and edit permissions per layer for different administrator roles.&lt;/LI&gt;
&lt;LI&gt;Re-using a layer in different places: The same application control layer in different policy packages ( &lt;A href="https://community.checkpoint.com/thread/1091" target="_blank"&gt;Sharing a layer across different policies&lt;/A&gt;&amp;nbsp; ), or the same inline layer for different scopes.&lt;/LI&gt;
&lt;LI&gt;Explaining global and local policies in Multi-Domain with the same feature set of layers: A &lt;EM&gt;domain layer&lt;/EM&gt; will be the set of rules that are added in each domain by the domain administrator.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;R80.10 Gateways and above will have the ability to utilize layers in new ways:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Unifying all blades into a single policy (&lt;A href="https://community.checkpoint.com/thread/1042" target="_blank"&gt;How to use the unified policy?&lt;/A&gt; )&lt;/LI&gt;
&lt;LI&gt;Segregating a policy into more ordered layers, not necessarily by blades&lt;/LI&gt;
&lt;LI&gt;Allowing sub-policies inside a rulebase, with the use of &lt;EM&gt;inline layers&lt;/EM&gt; (&lt;A href="https://community.checkpoint.com/thread/1037" target="_blank"&gt;How do I define diffrent policies to diffrent users?&lt;/A&gt; )&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Message was edited by: Tomer Sole&lt;/P&gt;</description>
      <pubDate>Sun, 22 Dec 2019 07:21:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1717#M103119</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2019-12-22T07:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1718#M103120</link>
      <description>&lt;P style="color: #333333;"&gt;Quote from &lt;A href="https://community.checkpoint.com/migrated-users/2059" target="_blank"&gt;Jim Oqvist&lt;/A&gt;​:&lt;/P&gt;
&lt;P style="color: #333333;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="color: #333333;"&gt;R80 introduces a new policy concept called Layers to efficiently work with the rule base.&lt;/P&gt;
&lt;P style="color: #333333;"&gt;For Access Control Policy Two types of layers for maximum flexibility exists, &lt;SPAN style="font-weight: bold; font-style: inherit; font-family: inherit;"&gt;inline&lt;/SPAN&gt; layer and &lt;SPAN style="font-weight: bold; font-style: inherit; font-family: inherit;"&gt;ordered&lt;/SPAN&gt; layer. Where layers &lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;allow separating the security policy into multiple components. In this way creating better security and manageability. &lt;/SPAN&gt;Support concurrent-admin's and segregation of duties, allow organizations to reuse of layer either as inline or ordered in multiple policy's to be more efficient.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In &lt;SPAN style="font-weight: bold; font-style: inherit; font-family: inherit;"&gt;Inline Layers&lt;/SPAN&gt; only traffic &lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; text-decoration: underline;"&gt;&lt;EM style="font-weight: inherit; font-family: inherit;"&gt;matched&lt;/EM&gt;&lt;/SPAN&gt;/&lt;EM style="font-weight: inherit; font-family: inherit; text-decoration: underline;"&gt;accepted&lt;/EM&gt; on the parent rule will reach and be inspected by the inside layer rules.&lt;/LI&gt;
&lt;LI&gt;In &lt;SPAN style="font-weight: bold; font-style: inherit; font-family: inherit;"&gt;Ordered Layers&lt;/SPAN&gt; when an &lt;EM style="font-weight: inherit; font-family: inherit;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit; text-decoration: underline;"&gt;accept&lt;/SPAN&gt; &lt;/EM&gt;rule from the first layer is matched, the gateway goes over the rules in the next layer
&lt;UL style="padding: 0 0 0 30px; font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;
&lt;LI style="margin-top: 0.5ex; margin-bottom: 0.5ex; font-weight: inherit; font-style: inherit; font-family: inherit; list-style-type: inherit;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;For backward compatibility with pre-R80 gateway you will use ordered layers to manage the Firewall rule base and Application control rule base, where first layer needs to be Firewall layer and second layer needs to be Application control and URL Filtering layer.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;During an upgrade from pre-R80 to R80 with gateways using policy packages that are using Firewall and Application control policy's, the existing policy will be separated to ordered Layer with Network Layer – Firewall policy rules as the first layer and&amp;nbsp; Application Layer – Application control policy rules as the second layer.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="color: #333333;"&gt;&lt;SPAN style="color: #505050; font-weight: bold; font-family: inherit; font-style: inherit;"&gt;Here is an example of traffic matching using&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE class="jiveBorder tablesorter" style="border: 1px solid #c6c6c6; color: #333333;" border="1"&gt;
&lt;THEAD style="border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;
&lt;TR style="border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;
&lt;TH class="header" style="padding: 6px; border: 1px solid #c6c6c6; font-style: inherit; font-family: inherit; color: #505050; background-color: #f2f2f2; background-position: no-repeat;" colspan="2" valign="middle"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN style="font-weight: bold; font-family: inherit; font-style: inherit;"&gt;Policy with Inline Layers&lt;/SPAN&gt;&lt;SPAN style="font-weight: bold; font-family: inherit; font-style: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TH&gt;
&lt;TH class="header" style="padding: 6px; border: 1px solid #c6c6c6; font-style: inherit; font-family: inherit; color: #505050; background-color: #f2f2f2; background-position: no-repeat;" valign="middle"&gt;&lt;SPAN style="font-weight: bold; font-family: inherit; font-style: inherit;"&gt;Policy with Ordered Layers&lt;/SPAN&gt;&lt;/TH&gt;
&lt;TH class="header" style="padding: 6px; border: 1px solid #c6c6c6; font-style: inherit; font-family: inherit; color: #505050; background-color: #f2f2f2; background-position: no-repeat;" valign="middle"&gt;&lt;SPAN style="font-weight: bold; font-family: inherit; font-style: inherit;"&gt;Policy mixed with Ordered and Inline Layers&lt;/SPAN&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;
&lt;TR style="border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;
&lt;TD style="padding: 6px; border: 1px solid #c6c6c6; font-style: inherit; font-family: inherit;"&gt;&lt;A style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #6d6e71;" href="https://community.checkpoint.com/legacyfs/online/checkpoint/40296_pastedImage_31.png" target="_blank"&gt;&lt;IMG style="margin: 10px 10px 10px 0; border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit;" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/40296_pastedImage_31.png" border="0" width="126" height="118" /&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px; border: 1px solid #c6c6c6; font-style: inherit; font-family: inherit;"&gt;&lt;A style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #6d6e71;" href="https://community.checkpoint.com/legacyfs/online/checkpoint/40297_pastedImage_18.png" target="_blank"&gt;&lt;IMG style="margin: 10px 10px 10px 0; border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit;" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/40297_pastedImage_18.png" border="0" width="118" height="117" /&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px; border: 1px solid #c6c6c6; font-style: inherit; font-family: inherit;"&gt;&lt;A style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #6d6e71;" href="https://community.checkpoint.com/legacyfs/online/checkpoint/40532_pastedImage_2.png" target="_blank"&gt;&lt;IMG style="margin: 10px 10px 10px 0; border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit;" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/40532_pastedImage_2.png" border="0" width="183" height="120" /&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;TD style="padding: 6px; border: 1px solid #c6c6c6; font-style: inherit; font-family: inherit;"&gt;&lt;A style="font-weight: inherit; font-style: inherit; font-family: inherit; color: #6d6e71;" href="https://community.checkpoint.com/legacyfs/online/checkpoint/40533_pastedImage_4.png" target="_blank"&gt;&lt;IMG style="margin: 10px 10px 10px 0; border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit;" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/40533_pastedImage_4.png" border="0" width="297" height="118" /&gt;&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Sun, 24 Nov 2019 22:51:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1718#M103120</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2019-11-24T22:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1719#M103121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very clear thnx !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2016 21:08:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1719#M103121</guid>
      <dc:creator>Rutger_Truyers</dc:creator>
      <dc:date>2016-03-01T21:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1720#M103122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for sharing, great summary. Few questions if you're ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder whether there is any kind of "layer priorities", for instance the inline layers case, what's the rule processing if there are contradictions between the layer rules?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any best practices for R80 Rulebase Construction and Optimization similar to sk102812&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's the implication in the gateway side with other features such as SecureXL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2017 01:51:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1720#M103122</guid>
      <dc:creator>Ed_Munoz</dc:creator>
      <dc:date>2017-01-18T01:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1721#M103123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;Hi&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d; font-family: Calibri, sans-serif;"&gt;&lt;SPAN style="font-size: 11pt;"&gt;Not sure I follow the question regarding “layer priorities” (for the priorities example – per layer the verification of rules is the same as in &lt;/SPAN&gt;&lt;SPAN style="font-size: 14.6667px;"&gt;previous&lt;/SPAN&gt;&lt;SPAN style="font-size: 11pt;"&gt; versions).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;Regarding best practices, per layer &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; font-family: 'Helvetica','sans-serif'; color: #666666;"&gt;sk102812&lt;/SPAN&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt; still applies.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;However, the ability to use layers instead of sections exist.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;The R80.10 admin guide should supply use cases and best practices.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;Tal&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jan 2017 08:36:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1721#M103123</guid>
      <dc:creator>Tal_Ben_Avraham</dc:creator>
      <dc:date>2017-01-30T08:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1722#M103124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a question:&lt;/P&gt;&lt;P&gt;How many policy layers the Access Control Policy supports?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jan 2018 14:41:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1722#M103124</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2018-01-09T14:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1723#M103125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See my reply from the Layer Design Patterns posts (which I should really add more to.. )&amp;nbsp;&lt;/P&gt;&lt;H4 style="color: #000000; background-color: #ffffff; border: 0px; font-weight: 600; font-size: 16px;" id="toc-hId--159614331"&gt;&lt;A href="https://community.checkpoint.com/message/7100-layer-design-patterns-1-inspect-additional-content" target="_blank"&gt;https://community.checkpoint.com/message/7100-layer-design-patterns-1-inspect-additional-content&lt;/A&gt;&amp;nbsp;&lt;/H4&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Enforcement with ordered layers is executed on the gateway in a way that does not add a performance impact with every new layer.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;It is more likely that a large number of ordered layers will be harder to manage by the admin, before any performance impact will kick in (imagine that "Tree" of Access Control Policy composed of over 10 ordered layers.. Maybe not the best visibility).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 08:55:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1723#M103125</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2019-06-21T08:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1724#M103126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not aware of a specific limit in this area.&lt;/P&gt;&lt;P&gt;That said, I struggle to see a use case where you'd need more than a few.&lt;/P&gt;&lt;P&gt;Can you articulate the use case you're thinking of?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jan 2018 22:41:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1724#M103126</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-09T22:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1725#M103127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's a question from CCSA exam study guide&lt;/P&gt;&lt;P&gt;r80-system-administrator-study-guide.pdf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 08:41:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1725#M103127</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2018-01-10T08:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1726#M103128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As someone who teaches the CCSA class I think I can provide some insight here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the CCSA R80 class, there was a question like this and the answer was "up to two" ordered layers.&amp;nbsp; At the time only R77.30 gateways were available and this was correct, due to gateway limitations you could not have more than two Access Control Policy ordered layers (Network &amp;amp; APCL/URLF).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However in the CCSA R80.10 courseware, the answer was changed to "one or more ordered layers" due to the availability of R80.10 gateways.&amp;nbsp; With R80.10 gateway there could now be more than two ordered layers in the Access Control Policy.&amp;nbsp; However for an R77.30 gateway managed with R80+, the answer is still "up to two" ordered layers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question needs to be clarified with context as to the gateway version, so I'm mentioning certification manager&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/45425"&gt;Jason Tugwell&lt;/A&gt; in the hope that he'll see this thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 13:26:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1726#M103128</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-10T13:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1727#M103129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your effort Tim.&lt;/P&gt;&lt;P&gt;Your book is awesome.I have a hard copy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 14:04:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1727#M103129</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2018-01-10T14:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1728#M103130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@TIm Hall @Martin Raska,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The explanation Tim provided was spot on!&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While I am not the authority on the subject, the exam content is based on the course ware and after consulting with that team the context of the question is based on the R80.10 gateway.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tug&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.checkpoint.com/downloads/professional-services/training/check-point-certification-faq.pdf"&gt;Certification FAQ&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 18:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1728#M103130</guid>
      <dc:creator>Jason_Tugwell</dc:creator>
      <dc:date>2018-01-11T18:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1729#M103131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will it be possible to layer SSL Inspection Policy in the future, too ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a use case where our First Level Support should be able to create SSL Bypass Rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 09:28:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1729#M103131</guid>
      <dc:creator>Stadt_Heidelber</dc:creator>
      <dc:date>2018-05-23T09:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1730#M103132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We plan to improve the user experience of HTTPS Inspection&amp;nbsp;and we will update once we&amp;nbsp;have information that we can share.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 19:23:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1730#M103132</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-05-31T19:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1731#M103133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your posts, Tomer! Very clear and very helfpul.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 12:01:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1731#M103133</guid>
      <dc:creator>Nicholas_Scott</dc:creator>
      <dc:date>2019-03-01T12:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1732#M103134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Stadt,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In practice you can think of SSL Inspection policy as a different layer.&lt;/P&gt;&lt;P&gt;And in the future it will also remain as a separate fixed layer.&lt;/P&gt;&lt;P&gt;Can you elaborate on your use case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Tal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Mar 2019 12:14:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/1732#M103134</guid>
      <dc:creator>Tal_Ben_Avraham</dc:creator>
      <dc:date>2019-03-03T12:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/52719#M103135</link>
      <description>&lt;P&gt;Hi Tomer,&lt;/P&gt;&lt;P&gt;I have an R80.20 policy this is being applied to 2 gateways. It has the typical: Access Control - &amp;gt; Policy and NAT.&amp;nbsp; I want to add a shared 'Ordered Layer' called Mgt_Monitor) to it (and other policies) that have common rules for Network Management devices. When I have tested adding this, it changes the layout shows up as "Network" and Mgt_Monitor. So both layers are now there. This thread does not really address how to 'network type' layers will be processed by the firewall, and what happens with the clean up rules that are in existence.&lt;/P&gt;&lt;P&gt;The end goal of what I'm after is being able to do a similar effect as the Global Policy in a MDS/CMA except this is a CMA and I want to be able to share the ordered layer among the various policies in the CMA.&lt;/P&gt;&lt;P&gt;A clearer understanding or example of using multiple 'network' type layers and how they interact would be very helpful.&amp;nbsp; I have opened an SR but don't have answer from that yet, but thought you might have a better handle on how this was designed to operate.&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;PG&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 00:06:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/52719#M103135</guid>
      <dc:creator>Paul_Gademsky</dc:creator>
      <dc:date>2019-05-07T00:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/54134#M103136</link>
      <description>&lt;P&gt;To add to this question more.....&lt;/P&gt;&lt;P&gt;This use case is a layer of rules that would be applied to many firewalls to provide access for devices behind them to central management systems.&lt;/P&gt;&lt;P&gt;I can not think up anything I can match on that does not cause other existing rules in the individual firewalls policies to break due the the layer cleanup drop.&lt;/P&gt;&lt;P&gt;In a layered policy the cleanup rule basically only being matched to Allow or Drop. There is no possibility of say.. the option to simply exit the layer and continuing down the rules of a parent layer for a match? That would be an awesome option to have! &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;If there is some way to currently do this using policy layers I would love to know.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 17:42:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/54134#M103136</guid>
      <dc:creator>DIEHARD</dc:creator>
      <dc:date>2019-05-22T17:42:50Z</dc:date>
    </item>
    <item>
      <title>Ordered Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/61051#M103137</link>
      <description>&lt;P&gt;So I have a customer that has the following configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Layer 1: Network management has a policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule 1:&lt;/P&gt;&lt;P&gt;Source: Admin Network&lt;/P&gt;&lt;P&gt;Destination: Firewalls&lt;/P&gt;&lt;P&gt;Action: Accept&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Layer is set to implicit “Accept”&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Layer 2: Network Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule 1&lt;/P&gt;&lt;P&gt;Source: Internal Networks (does not cover admin network)&lt;/P&gt;&lt;P&gt;Destination: Any&lt;/P&gt;&lt;P&gt;Action: Accept&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule 2:&lt;/P&gt;&lt;P&gt;Source: Any&lt;/P&gt;&lt;P&gt;Destination: Any&lt;/P&gt;&lt;P&gt;Action: Drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The traffic from admin network to firewalls gets dropped on Layer 2/Rule 2 is this how this is supposed to work??&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 15:52:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/61051#M103137</guid>
      <dc:creator>Juan_Concepcion</dc:creator>
      <dc:date>2019-08-23T15:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Ordered Layers in R80</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/62803#M103138</link>
      <description>me also as same</description>
      <pubDate>Sun, 15 Sep 2019 17:35:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-Layers-in-R80-x/m-p/62803#M103138</guid>
      <dc:creator>lulu</dc:creator>
      <dc:date>2019-09-15T17:35:42Z</dc:date>
    </item>
  </channel>
</rss>

