<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create a stealth rule in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-create-a-stealth-rule/m-p/121218#M17242</link>
    <description>&lt;P&gt;You've just described the Stealth rule and that's how you create it.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Jun 2021 02:14:53 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-06-15T02:14:53Z</dc:date>
    <item>
      <title>How to create a stealth rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-create-a-stealth-rule/m-p/121217#M17241</link>
      <description>&lt;P&gt;This is a silly question. I found there is a typical rule called stealth rule which can prevent the unauthroized accessing to Gateway itself. It should be located right below the firewall management rule. However, When I was about to create this kind of rule in smart console, I found there is no rule called stealth rule. so I want to check, this stealth rule is actually a standard rule. We only configure this rule like this&amp;nbsp;&lt;/P&gt;&lt;P&gt;Src: Any&lt;/P&gt;&lt;P&gt;Dest: FWs Host IP&lt;/P&gt;&lt;P&gt;Service: Any&lt;/P&gt;&lt;P&gt;Action: Drop&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 01:44:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-create-a-stealth-rule/m-p/121217#M17241</guid>
      <dc:creator>Huaming</dc:creator>
      <dc:date>2021-06-15T01:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a stealth rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-create-a-stealth-rule/m-p/121218#M17242</link>
      <description>&lt;P&gt;You've just described the Stealth rule and that's how you create it.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 02:14:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-create-a-stealth-rule/m-p/121218#M17242</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-15T02:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a stealth rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-create-a-stealth-rule/m-p/121220#M17243</link>
      <description>&lt;P&gt;Thanks for your advise.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 02:33:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-create-a-stealth-rule/m-p/121220#M17243</guid>
      <dc:creator>Huaming</dc:creator>
      <dc:date>2021-06-15T02:33:09Z</dc:date>
    </item>
  </channel>
</rss>

