<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic stealth rule conflict mobile access rule in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155386#M26423</link>
    <description>&lt;P&gt;Rule 1 conflict with Rule 2 for Services &amp;amp; Application https when installing policy&lt;/P&gt;&lt;P&gt;Rule 1 is stealth rule - SRC: Any, DST: GWs, Services: Any, Action:Drop&lt;/P&gt;&lt;P&gt;Rule 2 is under mobile access rule(layer) - SRC: IPs, DST: GW, Services: https, Action: Drop&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tell me why the rules conflict and what needs to be changed in order for the policy to be established&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 22 Aug 2022 08:18:50 GMT</pubDate>
    <dc:creator>Arturxr</dc:creator>
    <dc:date>2022-08-22T08:18:50Z</dc:date>
    <item>
      <title>stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155386#M26423</link>
      <description>&lt;P&gt;Rule 1 conflict with Rule 2 for Services &amp;amp; Application https when installing policy&lt;/P&gt;&lt;P&gt;Rule 1 is stealth rule - SRC: Any, DST: GWs, Services: Any, Action:Drop&lt;/P&gt;&lt;P&gt;Rule 2 is under mobile access rule(layer) - SRC: IPs, DST: GW, Services: https, Action: Drop&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;tell me why the rules conflict and what needs to be changed in order for the policy to be established&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2022 08:18:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155386#M26423</guid>
      <dc:creator>Arturxr</dc:creator>
      <dc:date>2022-08-22T08:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155398#M26477</link>
      <description>&lt;P&gt;I do not understand what you are trying to achieve - Rule 1 Any GWs Any Drop is the big brother of IPs GWs https Drop and will always shadow Rule 2 ! So just leave out Rule2...&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2022 10:58:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155398#M26477</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-08-22T10:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155570#M26522</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I made a mistake with the description, in the second rule Accept.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;According to Mobile Access R80.30 Administration Guide in Mobile Access and the Unified Access Policy - Best Practices for Rules:&lt;BR /&gt;Do not use a gateway as the Destination in a Mobile Access rule. The rules authorize a user's access to an internal resource. Use Any or the internal hosts of relevant applications in the Destination column.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;We set the portal address in Destination (the portal address is the external virtual interface of the cluster), after that our traffic is dropped implied rules - dropped by multiportal infrastructure&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 06:52:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155570#M26522</guid>
      <dc:creator>Arturxr</dc:creator>
      <dc:date>2022-08-24T06:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155626#M26525</link>
      <description>&lt;P&gt;Sorry, i can not understand you. You have two conflicting rules in your first post, both with Dest GW, and now you tell us:&amp;nbsp;&lt;SPAN&gt;Do not use a gateway as the Destination in a Mobile Access rule.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 08:24:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155626#M26525</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-08-24T08:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155635#M26531</link>
      <description>&lt;P&gt;I know lots of people may disagree with what I will say, but I always found stealth rule in the policy not that useful. If you think about it, implicit clean up rule would block any unwanted traffic, but its true that at the end of the day stealth rule does serve the purpose of blocking communication to the firewall itself.&lt;/P&gt;
&lt;P&gt;Anyway, back to your issue...Im also little confused like&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;. Can you send a screenshot? I think it would help...happy to do remote if you like and help you out.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2022 11:55:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/155635#M26531</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-08-24T11:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156598#M26911</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="New_Policy.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17697iA41BECF676C6793C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="New_Policy.jpg" alt="New_Policy.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Policy_inst_Error.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17698i6E7D8693A5748BBD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Policy_inst_Error.jpg" alt="Policy_inst_Error.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 07:54:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156598#M26911</guid>
      <dc:creator>Arturxr</dc:creator>
      <dc:date>2022-09-06T07:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156600#M26912</link>
      <description>&lt;P&gt;&lt;SPAN&gt;when trying to install a policy with rules 15, 16 enabled and rule 9 disabled, it fails.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 07:57:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156600#M26912</guid>
      <dc:creator>Arturxr</dc:creator>
      <dc:date>2022-09-06T07:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156601#M26913</link>
      <description>&lt;P&gt;I would suggest that you better ask TAC for a solution...&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 08:04:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156601#M26913</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-06T08:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156602#M26914</link>
      <description>&lt;P&gt;after we set the portal address to rule 16 instead of the gateway object in destination, our traffic began to be blocked by implied rules&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 08:08:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156602#M26914</guid>
      <dc:creator>Arturxr</dc:creator>
      <dc:date>2022-09-06T08:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156621#M27017</link>
      <description>&lt;P&gt;Can you send screenshot of how currently rules are set?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2022 12:28:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156621#M27017</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-09-06T12:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156803#M27065</link>
      <description>&lt;DIV class=""&gt;mobile access portal uses 443 port, gaia - 4434&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ruleeees.PNG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17709i4A9A4C03DF3557BD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ruleeees.PNG" alt="ruleeees.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="log.PNG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17710iC91A25B030DF7104/image-size/medium?v=v2&amp;amp;px=400" role="button" title="log.PNG" alt="log.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 08:19:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/156803#M27065</guid>
      <dc:creator>Arturxr</dc:creator>
      <dc:date>2022-09-08T08:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/157271#M27284</link>
      <description>&lt;P&gt;&lt;BR /&gt;We moved the Mobile Access rule above the Stealth rule, but now we have third-party users, when they receive an address from our pool, they lose their local network.&lt;BR /&gt;All traffic begins to wrap itself in the tunnel. Can you tell me where to set it up?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 08:39:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/157271#M27284</guid>
      <dc:creator>Arturxr</dc:creator>
      <dc:date>2022-09-15T08:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/157273#M27285</link>
      <description>&lt;P&gt;Why not contact TAC to get this resolved once and for all ?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 09:02:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/157273#M27285</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-15T09:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: stealth rule conflict mobile access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/157310#M27290</link>
      <description>&lt;P&gt;I agree 100% with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;. Just work with TAC and have this resolved.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 12:55:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/stealth-rule-conflict-mobile-access-rule/m-p/157310#M27290</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-09-15T12:55:32Z</dc:date>
    </item>
  </channel>
</rss>

