<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple types of objects in source column leading to Policy Verification Failure in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59142#M12497</link>
    <description>&lt;P&gt;Hi Damon,&lt;/P&gt;&lt;P&gt;SmartConsole version 105&lt;/P&gt;&lt;P&gt;Gateway and Mgmt HotFix 169 on R80.10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jul 2019 10:31:12 GMT</pubDate>
    <dc:creator>Tom_Cripps</dc:creator>
    <dc:date>2019-07-29T10:31:12Z</dc:date>
    <item>
      <title>Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/58898#M12495</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I'm wondering if anyone knows why and if there is a way around this other than creating a duplicate rule and removing the foreign objects from one rule and placing them in the duplicated rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm curious if this is planned to be rectified in the near future?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 12:13:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/58898#M12495</guid>
      <dc:creator>Tom_Cripps</dc:creator>
      <dc:date>2019-07-24T12:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/58984#M12496</link>
      <description>Didn't realize this was a limitation.&lt;BR /&gt;What release are you using here?&lt;BR /&gt;</description>
      <pubDate>Thu, 25 Jul 2019 18:13:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/58984#M12496</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-25T18:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59142#M12497</link>
      <description>&lt;P&gt;Hi Damon,&lt;/P&gt;&lt;P&gt;SmartConsole version 105&lt;/P&gt;&lt;P&gt;Gateway and Mgmt HotFix 169 on R80.10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 10:31:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59142#M12497</guid>
      <dc:creator>Tom_Cripps</dc:creator>
      <dc:date>2019-07-29T10:31:12Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59253#M12498</link>
      <description>&lt;P&gt;It's definitely not allowed in R80.20 either.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1249"&gt;@Dima_M&lt;/a&gt;&amp;nbsp;any ideas on this one?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 15:39:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59253#M12498</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-30T15:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59357#M12499</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/15225"&gt;@Tom_Cripps&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You're right, this behavior is by design, motivation is to prevent collisions.&lt;/P&gt;
&lt;P&gt;Could you please share more details about your use case?&lt;/P&gt;
&lt;P&gt;Access Role can represent Any User@Specific Network - do you think it will be useful in your case?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 12:46:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59357#M12499</guid>
      <dc:creator>Dima_M</dc:creator>
      <dc:date>2019-07-31T12:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59365#M12500</link>
      <description>&lt;P&gt;Hi Dima,&lt;/P&gt;&lt;P&gt;Okay, that's something we also thought about internally as well and I can see the reasoning behind it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I wanted to avoid was including both an access role and networks in a single rule to avoid having two identical rules apart from the source column; not a huge deal just wondered if this was a fault I'd done or was by design.&lt;/P&gt;&lt;P&gt;Let me know though if you have any suggestions though?&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 12:59:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59365#M12500</guid>
      <dc:creator>Tom_Cripps</dc:creator>
      <dc:date>2019-07-31T12:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59374#M12501</link>
      <description>&lt;P&gt;Hey Tom,&lt;/P&gt;
&lt;P&gt;How about {Any/Any Identified Users/Machines} + {Specific Network} in access role - can it substitute the network object in your case?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 14:22:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59374#M12501</guid>
      <dc:creator>Dima_M</dc:creator>
      <dc:date>2019-07-31T14:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59419#M12502</link>
      <description>I most often see a use case for this in the following scenario:&lt;BR /&gt;- Internally not using IA&lt;BR /&gt;- IA used only for RemoteAccess users&lt;BR /&gt;- RemoteAccess users are both internal employees and external contractors&lt;BR /&gt;- Traffic to a specific destination allowed for all internal users, which means using client network for internal clients and using Access Role for internal employees using RemoteAccess&lt;BR /&gt;&lt;BR /&gt;In this case it doubles all "client to server" rules because of this limitation.&lt;BR /&gt;&lt;BR /&gt;There are some possible workarounds for this:&lt;BR /&gt;1. create a shared layer with all client to server connections and assign it two parent rules with one having source client network, one having source access role of internal employees&lt;BR /&gt;2. assign RemoteAccess OM IPs differently for internal/external and use the relevant IPs for the source&lt;BR /&gt;3. Start using IA internally, which might be difficult because of some other limitations IA brings. Examples of such issues are: Identity Sharing via Site2Site VPN causes IPSec replay attacks in some cases, Identity Sharing between gateways managed by differend MDM domains is not that easys and so on....&lt;BR /&gt;4. your idea of using a Access Role limited only by network, which I must admit I wouldn't have thought off</description>
      <pubDate>Thu, 01 Aug 2019 07:40:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59419#M12502</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-08-01T07:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple types of objects in source column leading to Policy Verification Failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59473#M12503</link>
      <description>&lt;P&gt;Hi Dima,&lt;/P&gt;&lt;P&gt;That could potentially work, would take a slight redesign from our current standard, but seems like a viable option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the tip.&lt;/P&gt;&lt;P&gt;Tom.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 07:21:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Multiple-types-of-objects-in-source-column-leading-to-Policy/m-p/59473#M12503</guid>
      <dc:creator>Tom_Cripps</dc:creator>
      <dc:date>2019-08-02T07:21:13Z</dc:date>
    </item>
  </channel>
</rss>

