<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using security zone with security policies in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123743#M17810</link>
    <description>&lt;P&gt;I believe looks at the topology related to the interface therefore the directly connected interface and any routes via that interfaces are in scope for&amp;nbsp; the zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Jul 2021 21:16:49 GMT</pubDate>
    <dc:creator>genisis__</dc:creator>
    <dc:date>2021-07-13T21:16:49Z</dc:date>
    <item>
      <title>Using security zone with security policies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123736#M17808</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am a beginner with checkpoint.&lt;/P&gt;&lt;P&gt;Here is my question: When you use security zones as a source or destination in your security policies, does checkpoint limits the ip addresses to those matching the connected subnet of the interface bound to the security zone? Or does it allow any ip address coming from that interface?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 18:48:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123736#M17808</guid>
      <dc:creator>strou</dc:creator>
      <dc:date>2021-07-13T18:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using security zone with security policies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123741#M17809</link>
      <description>&lt;P&gt;I think it will allow any connection from the interface as you only tell the gateway which interface belongs to zone XY if you don't use address spoofing. But you should enable address spoofing and with that every connection from an unknown IP will be dropped even before the security policy. You can choose to only include the network where the Cluster IP resides in or choose "defined by routes" or even select a group of subnets if you have that use case.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 20:29:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123741#M17809</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2021-07-13T20:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using security zone with security policies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123743#M17810</link>
      <description>&lt;P&gt;I believe looks at the topology related to the interface therefore the directly connected interface and any routes via that interfaces are in scope for&amp;nbsp; the zone.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jul 2021 21:16:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123743#M17810</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-07-13T21:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: Using security zone with security policies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123763#M17811</link>
      <description>&lt;P&gt;It is also important to note if the interface is marked in Topology as External or Internal.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 05:48:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Using-security-zone-with-security-policies/m-p/123763#M17811</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2021-07-14T05:48:53Z</dc:date>
    </item>
  </channel>
</rss>

