<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Gateway to any destination access rule in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141602#M26887</link>
    <description>&lt;P&gt;Yes..in this post i was trying to get around the implicit rule in place..and this is the reason i was exploring an explicit rule possibility but i get your point here..i can harden the destinations to be reached&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2022 07:36:39 GMT</pubDate>
    <dc:creator>LostBoY</dc:creator>
    <dc:date>2022-02-16T07:36:39Z</dc:date>
    <item>
      <title>Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141576#M26881</link>
      <description>&lt;P&gt;I have an ACL rule which allows access from Gateway towards any destination on Https and DNS ports..i am using this for Gateway updates.&lt;/P&gt;&lt;P&gt;In a recent audit ..auditor is asking why "any" access is allowed here .. i remember speaking with a Checkpoint engineer some time back and he stated that Gateway to any access is not an issue in an ACL on specific ports .. is there any documentation in support of this ? or do i need to harden this rule ?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 16:59:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141576#M26881</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-02-15T16:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141577#M26882</link>
      <description>&lt;P&gt;That can certainly be debated...if support told you that sort of rule is not an issue, it really depends what context they may had been referring to. Personally, but this is just me, I would make sure that access from external to the firewall is hardened and configured as per your corporate policy, but as far as other way around, I dont see logical reasoning why you would have rule like that. Is there something specific that your firewall has to reach to?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 17:17:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141577#M26882</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-15T17:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141587#M26883</link>
      <description>&lt;P&gt;Hello buddy,&lt;/P&gt;
&lt;P&gt;Here, you can use updatable objects and needs to have access to these specific domains updates.checkpoint.com and dl3.checkpoint.com (apply these rule in top of the existing one with any and tested checking for updates, confirm the new rule logged the traffic and see if theres any other traffic that's being logged on the old rule that stills need to be permitted creating another new rule, if no traffic is logged for 48 hours then &amp;gt; disabled that rule for 1 week and if no issues has been presented deleted.&lt;/P&gt;
&lt;P&gt;Always remember to take snapshot in&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk131852&amp;amp;partition=Basic&amp;amp;product=Security" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk131852&amp;amp;partition=Basic&amp;amp;product=Security&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;P.D&lt;/P&gt;
&lt;P&gt;Like my buddy &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt; mentioned that all depends on the regulation you need to be in compliance or any internal company policy that does not permit the famous "nefarius any rules" AKA High Risk.&lt;/P&gt;
&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 20:16:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141587#M26883</guid>
      <dc:creator>K_montalvo</dc:creator>
      <dc:date>2022-02-15T20:16:34Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141590#M26884</link>
      <description>&lt;P&gt;Also, I believe its related to your earlier post on sort of same topic...&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Disable-Outgoing-Packets-from-Gateway/m-p/140413#M24889" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Disable-Outgoing-Packets-from-Gateway/m-p/140413#M24889&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 20:53:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141590#M26884</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-15T20:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141591#M26885</link>
      <description>&lt;P&gt;"Any" definitions shouldn't be used in firewall security policies as "Any" doesn't make clear what is actually meant. "Any" is not just the Internet, it's also all internal, DMZ, VPN partners, Home Offices and more. "Any" can also be different depending of the firewall vendor as some have exclusions from "Any", others work with a Zone-based model and define "Any" only for lower security zones, and so on...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recommend to check your real demand. You wrote: "&lt;SPAN&gt;&lt;EM&gt;i am using this for Gateway updates&lt;/EM&gt;". Define what that means. If your firewall updates time via DNS from an internal DNS server only, you should replace "Any" with that specific internal object/range/network. If your firewall updates via HTTPS from the internet, then "Any" should be replaced with your &lt;A href="https://community.checkpoint.com/t5/Management/Properly-defining-the-Internet-within-a-security-policy/td-p/10561" target="_self"&gt;object representing the internet&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Additional resources:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;sk64143 -&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk64143" target="_self"&gt;Tips to optimize your security management database&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;sk102812 -&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102812" target="_self"&gt;Best Practices - Firewall Policy Management&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;sk112576 -&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112576" target="_self"&gt;In Unified Policy, when using "Any" in Services &amp;amp; Applications column in Rule Base, not all applications appear&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Admin Guide - &lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_NextGenSecurityGateway_Guide/html_frameset.htm?topic=136972" target="_self"&gt;Creating an Access Control Policy&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 15 Feb 2022 22:13:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141591#M26885</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2022-02-15T22:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141592#M26886</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/687"&gt;@Danny&lt;/a&gt;&amp;nbsp;, as always, gave you FANTASTIC guidance. He is 100% correct...yes, Im positive that all of us are "guilty" of using "any" in the rules way more than what we should, but he makes an excellent point. Any can represent, dmz, internal, external, anything on the Internet, whole "kit &amp;amp; caboodle". Honestly, I would strongly urge you to make use of security zones available in R80+. Create layered sections that represent specific zones (dmz, internal, external) and that way, your rule base will be way more secure.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 23:15:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141592#M26886</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-15T23:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141602#M26887</link>
      <description>&lt;P&gt;Yes..in this post i was trying to get around the implicit rule in place..and this is the reason i was exploring an explicit rule possibility but i get your point here..i can harden the destinations to be reached&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 07:36:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141602#M26887</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-02-16T07:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141603#M26888</link>
      <description>&lt;P&gt;Got your point...i have been observing the logs since yesterday and as it is an AWS firewall it is reaching to AWS DNS for name resolution and for updates i can direct it to an interal proxy hence mitingating this "any"&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 07:38:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141603#M26888</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-02-16T07:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway to any destination access rule</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141604#M26889</link>
      <description>&lt;P&gt;Thank you ..i think i have 2 options here looking at this&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)allow updatable checkpoint update object&amp;nbsp;&lt;/P&gt;&lt;P&gt;2)Enable Update via proxy&lt;/P&gt;&lt;P&gt;This will help to get around this any rule.. Thanks again for the guidance&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2022 07:39:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-to-any-destination-access-rule/m-p/141604#M26889</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-02-16T07:39:56Z</dc:date>
    </item>
  </channel>
</rss>

