<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Schrodinger's Firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/276141#M105110</link>
    <description>&lt;P&gt;I cant sadly make too many comments about it, as I would need to see what those rules look like and more indepth logs. Other than that, it would more be an educated guess, sorry.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Apr 2026 22:37:50 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-04-27T22:37:50Z</dc:date>
    <item>
      <title>Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275372#M104887</link>
      <description>&lt;P&gt;I need to have a firewall that does what it is configured to do, not some black box that may or may not pass traffic depending on its quantum state at the time a packet traverses it.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CheckPointBlockAllow.png" style="width: 466px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34006i508884102FC3B39C/image-size/large?v=v2&amp;amp;px=999" role="button" title="CheckPointBlockAllow.png" alt="CheckPointBlockAllow.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In the above log snippet, the user accessing the site is&amp;nbsp;explicitly allowed to go to the category that is blocked by URL Filtering yet the firewall blocked it because there's a firewall rule way down the ruleset that blocks it for all users. In the block log it shows the username and in the accept log it shows the username............&lt;/P&gt;
&lt;P&gt;This is not how firewalls should work. If there is a rule above another rule that is set to pass traffic, it needs to do that. Whatever other technology in place that my interfere with that type of operation, should not be default. If we enable all the blades it still needs to adhere to proper top-down processing.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 18:38:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275372#M104887</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-13T18:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275373#M104888</link>
      <description>&lt;DIV&gt;
&lt;P&gt;You are misunderstanding how Check Point works, and you’re comparing apples with peaches here, because what you’re looking at are three completely different log types from three different inspection layers.&lt;/P&gt;
&lt;P&gt;The “Accept” you see is &lt;EM&gt;only&lt;/EM&gt; the Firewall layer saying: “connection can be established.” That’s all it means. It doesn’t promise that the traffic will sail untouched through every other blade. Once the session exists, HTTPS Inspection and URL Filtering jump in, and those blades have their own logic, their own policy order, and—important here—their own logs. So seeing Accept → Inspect → Block is completely normal. That’s just the flow through the pipeline.&lt;/P&gt;
&lt;P&gt;Check Point doesn’t treat all blades as one giant top‑down rulebase. Firewall rules are evaluated in their list, URLF/AppCtrl rules in their own list, HTTPS Inspection in yet another. They all run in different parts of the inspection chain. So an “allow” in FW and a “block” in URLF is exactly how the product is meant to behave. The username appearing in multiple logs is also expected because each blade logs identity separately when it handles the flow.&lt;/P&gt;
&lt;P&gt;Nothing quantum here. It only looks weird if you assume one unified rule list covers everything.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;If you want to make the logs less confusing, a simple trick is to filter by log type or blade in SmartConsole.&lt;/STRONG&gt; For example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Filter only &lt;STRONG&gt;Firewall&lt;/STRONG&gt; logs if you want to see pure rulebase hits&lt;/LI&gt;
&lt;LI&gt;Filter only &lt;STRONG&gt;URL Filtering&lt;/STRONG&gt; logs to see category‑based actions&lt;/LI&gt;
&lt;LI&gt;Filter for a specific &lt;STRONG&gt;blade:&lt;/STRONG&gt; &lt;CODE&gt;blade:Firewall&lt;/CODE&gt;, &lt;CODE&gt;blade:"URL Filtering"&lt;/CODE&gt;, &lt;CODE&gt;blade:"HTTPS Inspection"&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Or filter by action to focus on the relevant events: &lt;CODE&gt;action:Block&lt;/CODE&gt;, &lt;CODE&gt;action:Accept&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Once you split the logs by blade, the whole story becomes much clearer and you won’t get the impression that the firewall is contradicting itself.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 13 Apr 2026 19:11:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275373#M104888</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2026-04-13T19:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275374#M104889</link>
      <description>&lt;P&gt;URL filtering needs a bit of data in order to make a judgement. It can happen traffic is allowed by the firewall rulebase and in later stadium is blocked by URL filtering. That is pretty standard now. The top down process is no longer sufficient. There are to many factors now, for performance, more security etc.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure if you want to discuss this topic here, or need technical explanation how packet flow works. There are some complex packet flow PDF's that give you a general idea just how many turns a packet can take. Just think about slow path, fast path, PSL , VPN encryption, NAT etc etc&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 19:27:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275374#M104889</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-04-13T19:27:55Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275376#M104890</link>
      <description>&lt;P&gt;Your post explains the issue with Check Point firewalls very well and reinforces my point.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/687"&gt;@Danny&lt;/a&gt;&amp;nbsp;wrote:
&lt;DIV&gt;
&lt;P&gt;&lt;SPAN&gt;three different inspection layers&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You need to stop looking at the firewall through pre-R80 eyes. IMO R80 set out to address that and it has been a failure.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 19:58:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275376#M104890</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-13T19:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275377#M104891</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;The top down process is no longer sufficient.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That is exactly my point! Not only does the firewall obscure what it's doing, the top-down policy is no longer sufficient.&lt;/P&gt;
&lt;P&gt;The firewall needs to be &lt;STRONG&gt;incredibly clear&lt;/STRONG&gt; and straight forward on what it is doing and why.&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;There are to many factors now, for performance, more security etc.&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I would strongly argue that any security gains are heavily outweighed by this obscurity.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 21:21:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275377#M104891</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-13T21:21:37Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275378#M104892</link>
      <description>&lt;P&gt;To understand if what you're experiencing is expected behavior, I would need to see the actual rules involved with full log cards for the entries in question (sensitive details redacted).&lt;/P&gt;
&lt;P&gt;Note that using Session logs (as opposed to Connection logs) might also help in understanding what's going on, though you lose precise timestamps on repeated connection attempts.&lt;BR /&gt;It also reduces storage needed for logs.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2026 21:44:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275378#M104892</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-13T21:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275384#M104894</link>
      <description>&lt;P&gt;I get where you're coming from, but honestly, this is just how modern firewalls work now — and not just Check Point.&lt;/P&gt;
&lt;P&gt;The amount of stuff a firewall has to look at today is nowhere near what it was 15 years ago. You've got HTTPS inspection, URL filtering, app control, identity awareness, all on top of the classic packet filtering. Cramming all of that into one single top-down rulebase just doesn't work anymore. I wouldn't have a clue how to design that completely top-down across all blades while keeping it performant. Check Point decided to split this into blades, each doing their own thing with their own policy. You can agree or disagree with that approach, but it's a design decision, not a bug.&lt;/P&gt;
&lt;P&gt;And it's not like the competition does it any differently. Fortinet branches into security profiles from the firewall policy — AV, web filter, app control all do their own evaluation. Palo Alto has their own layered processing. The only place where you still get pure top-down is router ACLs, and that's because ACLs solve a much simpler problem.&lt;/P&gt;
&lt;P&gt;So what you're seeing — Accept on the firewall layer, Block on URLF — that's exactly what's supposed to happen. Firewall says "connection is fine", URLF looks at the content and says "nope". Each blade tags its logs, so you can always tell what did what.&lt;/P&gt;
&lt;P&gt;Yes, it takes time to get comfortable reading across the different blades, and if you really need the full packet flow you're stuck with fw monitor. That's the reality. But given what we're asking these boxes to do today, I don't see how you'd keep things simple AND maintain serious security coverage. Something has to give.&lt;BR /&gt;&lt;BR /&gt;Just my $0.02.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 05:42:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275384#M104894</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-04-14T05:42:46Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275422#M104904</link>
      <description>&lt;P&gt;The "expected behavior" is from my frame of reference, not the devs and it is 100% not expected -- and that's the problem. I should be able to look at a firewall ruleset and clearly see issues and if not the log should clearly show why, but it does not. This is evidenced by rules that clearly are set to allow traffic but don't.&lt;/P&gt;
&lt;P&gt;The issue isn't "can the firewall" -- the issue is "does the firewall clearly show".&lt;/P&gt;
&lt;P&gt;The rules that I have are very straight forward -- user is granted access to a category and further down the list there is a general block for that category. The screenshot shows it works.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 13:18:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275422#M104904</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-14T13:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275425#M104905</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16383"&gt;@Vincent_Bacher&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;this is just how modern firewalls work now&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;I don't accept this. This is defeatism. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16383"&gt;@Vincent_Bacher&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I don't see how you'd keep things simple AND maintain serious security coverage. Something has to give.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That's why I made this post because that something is R&amp;amp;D money. Top-down ruleset is Firewall 101 and it's not working.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2026 13:23:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275425#M104905</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-14T13:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275457#M104917</link>
      <description>&lt;P&gt;Classification by the various blades is not a "one and done" activity, it's done continuously.&lt;BR /&gt;Which means if an allowed connection suddenly looks like it violates policy, you might see something like the behavior you're describing.&lt;BR /&gt;Another possibility is this is a bug that we should fix.&lt;BR /&gt;Either way, more concrete information is needed to validate what is going on here.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 00:01:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275457#M104917</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-04-15T00:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275483#M104929</link>
      <description>&lt;P&gt;It's not defeatism, it's pragmatism born from experience. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;There's a difference between pushing a vendor for better tooling, better visibility, better logs — all valid — and expecting them to redesign their core architecture because somebody doesn't like it.&lt;BR /&gt;&lt;BR /&gt;That's like walking into Mercedes and demanding they replace the star with a fish.&lt;BR /&gt;You can ask, but you know what the answer will be.&lt;BR /&gt;&lt;BR /&gt;Calling that a lack of R&amp;amp;D investment is a bit naive if I'm honest &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; — this isn't a budget problem,&lt;BR /&gt;it's a design decision driven by what Layer 7 inspection demands.&lt;BR /&gt;We can debate whether Check Point gives us good enough tools to work within that design.&lt;BR /&gt;That's a fair conversation.&lt;BR /&gt;&lt;BR /&gt;But asking for flat top-down across all blades in 2026?&lt;BR /&gt;That ship has sailed, and not because anyone gave up.&lt;BR /&gt;&lt;BR /&gt;Again just my $ 0,02 &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 07:42:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275483#M104929</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-04-15T07:42:16Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275534#M104947</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16383"&gt;@Vincent_Bacher&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;it's a design decision&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;lol yup&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2026 12:37:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275534#M104947</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-15T12:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275828#M105060</link>
      <description>&lt;P&gt;I understand that, but the underlying issue is &lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_SecurityManagement_AdminGuide/Content/Topics-SECMG/Best-Practices-for-Access-Control-Rules.htm" target="_self"&gt;this&lt;/A&gt; -- why even allow Application and Firewall rules to co-exist on a layer if "best practices" says to separate them out?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2026 22:53:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275828#M105060</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-20T22:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275894#M105071</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21861"&gt;@B_P&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Mind sharing how policy layers are configured? Do you have multiple ordered layers? If so, what blades are enabled on each layer?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 16:25:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275894#M105071</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-04-21T16:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275911#M105075</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/687"&gt;@Danny&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe most customers encounter the scenario mentioned by &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21861"&gt;@B_P&lt;/a&gt;&amp;nbsp;: an end user is initially restricted from accessing the Internet, but later requests access to a specific website due to business needs.&lt;/P&gt;&lt;P&gt;This kind of frequent and granular policy adjustment can lead to a high level of rule duplication, which may ultimately result in unexpected behavior.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2026 03:03:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/275911#M105075</guid>
      <dc:creator>Vanness_Chen</dc:creator>
      <dc:date>2026-04-22T03:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/276140#M105109</link>
      <description>&lt;P&gt;We have two ordered layers, the first being firewall only for GEO IP and the second being firewall and App/URL.&lt;/P&gt;
&lt;P&gt;The second layer has over 70 inline layers in various depths. We only use Firewall and App &amp;amp; URL filtering and only on the ones that need it.&lt;/P&gt;
&lt;P&gt;100% our issues revolve around a *single* Firewall and App &amp;amp; URL layer which controls Internet access for our general users and has about 200 rules.&lt;/P&gt;
&lt;P&gt;And most of those issues are from higher up rules being overridden by lower rules that block. For example, we want to grant specific identity users a specific app category access and deny everyone else, but because Schrodinger's firewall, users' packets are both accepted and blocked until an admin looks at the log.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 22:22:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/276140#M105109</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2026-04-27T22:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Schrodinger's Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/276141#M105110</link>
      <description>&lt;P&gt;I cant sadly make too many comments about it, as I would need to see what those rules look like and more indepth logs. Other than that, it would more be an educated guess, sorry.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Apr 2026 22:37:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Schrodinger-s-Firewall/m-p/276141#M105110</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-04-27T22:37:50Z</dc:date>
    </item>
  </channel>
</rss>

