<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Checkpoint Policy Optimization / Review in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161498#M28586</link>
    <description>&lt;P&gt;Hi Dave.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've recently gone through something similar.&lt;BR /&gt;It's quite hard to articulate all the considerations, but I'll try my best.&lt;/P&gt;&lt;P&gt;I found that creating inline layers was most helpful.&lt;/P&gt;&lt;P&gt;The logic was that I can frame the types of communications (both with ingress and egress):&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Between internal networks inside my DC.&lt;/LI&gt;&lt;LI&gt;Between external networks and my internal networks.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;So, i created an inline layer for incoming traffic for each subnet.&lt;BR /&gt;This way, I didn't need to address explicitly egress traffic from one internal network to another.&lt;/P&gt;&lt;P&gt;As for external networks, I've created an ingress and egress inline layers.&lt;BR /&gt;Usually, you'd have NAT facing external networks, which should receive traffic only from external networks.&lt;BR /&gt;So this NAT subnet is the ingress of course.&lt;/P&gt;&lt;P&gt;Each inline layer ended with an explicit "drop all" rule.&lt;BR /&gt;At first I've usually set it to allow all, so I won't cause any downtime by accident.&lt;BR /&gt;That was acceptable, because we had an explicit "allow all" rule...&lt;/P&gt;&lt;P&gt;Also, at the top of the policy, I've set a few global rules:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Administrative access - not just to the FWs, but also for technicians and sysadmins (they were all inside specific administrative subnets).&lt;BR /&gt;That because they need access to many places around the network, and it would be ineffective to create a specific rule in each inline layer.&lt;/LI&gt;&lt;LI&gt;DHCP rules (they need special attention as per some SK...)&lt;/LI&gt;&lt;LI&gt;All the known drops that I need, e.g. multicast, igmp, etc.&lt;/LI&gt;&lt;LI&gt;Probably a couple more rules which I can't remember now...&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;One last thing, we had remote braches networks.&lt;BR /&gt;I've decided to configure their policies with bare minimum rules.&lt;BR /&gt;Meaning, blocking east-west traffic inside the branch and allowing all traffic heading the DC (so the main FW handle it).&lt;BR /&gt;That way, I've made the branches FWs policies almost immutable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, in summary, this enabled me to contain the changes to specific networks each time.&lt;BR /&gt;That's one incoming inline layer per internal subnet, and 2 inline layers per external network (ingress+egress).&lt;/P&gt;&lt;P&gt;But be warned, it took up about 4-5 months for 2 policies with a total ~200 rules...&lt;BR /&gt;Although, I did gave it to a junior team member, so he also learned during the process...&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;BR /&gt;Feel free to contact me if you have any questions.&lt;/P&gt;</description>
    <pubDate>Mon, 07 Nov 2022 22:34:35 GMT</pubDate>
    <dc:creator>eliadtech</dc:creator>
    <dc:date>2022-11-07T22:34:35Z</dc:date>
    <item>
      <title>Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159555#M27958</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Ive to peform a policy streamlining / optimization for a client, which will be carried by eye. Its quite a large rule set.&lt;/P&gt;&lt;P&gt;Apart from the obvious checking like rule hits, logs etc, are there any recommendations / tips which might not be that obvious, that could improve or speed up the process, and also reduce risk of impact?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2022 13:26:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159555#M27958</guid>
      <dc:creator>superd</dc:creator>
      <dc:date>2022-10-14T13:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159557#M27959</link>
      <description>&lt;P&gt;Hey Dave,&lt;/P&gt;
&lt;P&gt;The best I can think of would be export the whole rulebase into CSV and then have a look at rules with services "any", hits, stuff like that.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2022 14:05:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159557#M27959</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-10-14T14:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159585#M27970</link>
      <description>&lt;P&gt;Assuming all gateways are R8x versions, rulebase order is less relevant than it was in earlier versions.&lt;BR /&gt;However, some services do still disable SecureXL templating.&lt;BR /&gt;Check the output of fwaccel stat on the gateway to ensure this isn't happening.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2022 16:21:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159585#M27970</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-14T16:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159623#M27993</link>
      <description>&lt;P&gt;Compliance Blade &amp;amp; SmartOptimize literature may give you some additional hints.&lt;/P&gt;
&lt;P&gt;Also be on the lookout for non-FQDN objects and regex using wildcards.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Oct 2022 01:06:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159623#M27993</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-15T01:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159698#M28022</link>
      <description>&lt;P&gt;Thanks Andy. Is there a quick way to script the changes back into the FW, or does it have to manually edited from smart console GUI?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Oct 2022 09:25:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159698#M28022</guid>
      <dc:creator>superd</dc:creator>
      <dc:date>2022-10-17T09:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159737#M28046</link>
      <description>&lt;P&gt;Hm, there might be, but I apologize, scripting has never been my stronger side, sorry brother : - (&lt;/P&gt;
&lt;P&gt;I am sending you what TAC sent me couple of years back, though this is little different and via api:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;---&amp;gt;To add address-range via API&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;:&lt;BR /&gt;mgmt_cli add address-range --batch address-ranges_full.csv&lt;BR /&gt;&lt;BR /&gt;#cat address-ranges_full.csv&lt;BR /&gt;name,ip-address-first,ip-address-last&lt;BR /&gt;range1,10.0.0.0,10.0.0.100&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;---&amp;gt; To add a network via API:&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;mgmt_cli add network --batch networks.csv&lt;BR /&gt;&lt;BR /&gt;#cat networks.csv&lt;BR /&gt;name,subnet,subnet-mask&lt;BR /&gt;network1,10.10.10.0,255.255.255.0&lt;BR /&gt;network2,20.20.20.0,255.255.255.0&lt;BR /&gt;network3,30.30.30.0,255.255.255.0&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;U&gt;---&amp;gt; To add a host&amp;nbsp;&lt;/U&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;mgmt_cli add host --batch test.csv&lt;BR /&gt;&lt;BR /&gt;#cat test.csv&lt;BR /&gt;name,ip-address&lt;BR /&gt;obj1,192.168.1.1&lt;/P&gt;</description>
      <pubDate>Mon, 17 Oct 2022 13:26:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/159737#M28046</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-10-17T13:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161173#M28500</link>
      <description>&lt;P&gt;A quick follow up query here - is there any way to export the VPN configs to a readable format so I can observe ciphers / gateways etc?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2022 17:07:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161173#M28500</guid>
      <dc:creator>superd</dc:creator>
      <dc:date>2022-11-03T17:07:20Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161174#M28501</link>
      <description>&lt;P&gt;I would rather make a new post about it if I were you...&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2022 17:40:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161174#M28501</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-11-03T17:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161175#M28502</link>
      <description>&lt;P&gt;Good question. personally, Im not aware of it being possible, but lets see what others say.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2022 17:57:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161175#M28502</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-03T17:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161177#M28504</link>
      <description>&lt;P&gt;In a simple way? No.&lt;BR /&gt;The data is available through the API, though.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2022 18:01:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161177#M28504</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-03T18:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161206#M28510</link>
      <description>&lt;P&gt;I find that on a gateway the command `vpn tu tlist` gives a good deal of information to start with.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 06:31:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161206#M28510</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2022-11-04T06:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161269#M28538</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/918"&gt;@Hugo_vd_Kooij&lt;/a&gt;&amp;nbsp;brings up a good point actually! I never thought of it, but you could so something like below from expert mode:&lt;/P&gt;
&lt;P&gt;vpn tu tlist &amp;gt; /var/log/vpn.txt&lt;/P&gt;
&lt;P&gt;Then file would show you the whole output, yes, its not in csv format, but I guess it could be converted once its off the firewall.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 17:12:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161269#M28538</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-04T17:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161498#M28586</link>
      <description>&lt;P&gt;Hi Dave.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've recently gone through something similar.&lt;BR /&gt;It's quite hard to articulate all the considerations, but I'll try my best.&lt;/P&gt;&lt;P&gt;I found that creating inline layers was most helpful.&lt;/P&gt;&lt;P&gt;The logic was that I can frame the types of communications (both with ingress and egress):&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Between internal networks inside my DC.&lt;/LI&gt;&lt;LI&gt;Between external networks and my internal networks.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;So, i created an inline layer for incoming traffic for each subnet.&lt;BR /&gt;This way, I didn't need to address explicitly egress traffic from one internal network to another.&lt;/P&gt;&lt;P&gt;As for external networks, I've created an ingress and egress inline layers.&lt;BR /&gt;Usually, you'd have NAT facing external networks, which should receive traffic only from external networks.&lt;BR /&gt;So this NAT subnet is the ingress of course.&lt;/P&gt;&lt;P&gt;Each inline layer ended with an explicit "drop all" rule.&lt;BR /&gt;At first I've usually set it to allow all, so I won't cause any downtime by accident.&lt;BR /&gt;That was acceptable, because we had an explicit "allow all" rule...&lt;/P&gt;&lt;P&gt;Also, at the top of the policy, I've set a few global rules:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Administrative access - not just to the FWs, but also for technicians and sysadmins (they were all inside specific administrative subnets).&lt;BR /&gt;That because they need access to many places around the network, and it would be ineffective to create a specific rule in each inline layer.&lt;/LI&gt;&lt;LI&gt;DHCP rules (they need special attention as per some SK...)&lt;/LI&gt;&lt;LI&gt;All the known drops that I need, e.g. multicast, igmp, etc.&lt;/LI&gt;&lt;LI&gt;Probably a couple more rules which I can't remember now...&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;One last thing, we had remote braches networks.&lt;BR /&gt;I've decided to configure their policies with bare minimum rules.&lt;BR /&gt;Meaning, blocking east-west traffic inside the branch and allowing all traffic heading the DC (so the main FW handle it).&lt;BR /&gt;That way, I've made the branches FWs policies almost immutable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, in summary, this enabled me to contain the changes to specific networks each time.&lt;BR /&gt;That's one incoming inline layer per internal subnet, and 2 inline layers per external network (ingress+egress).&lt;/P&gt;&lt;P&gt;But be warned, it took up about 4-5 months for 2 policies with a total ~200 rules...&lt;BR /&gt;Although, I did gave it to a junior team member, so he also learned during the process...&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;BR /&gt;Feel free to contact me if you have any questions.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 22:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/161498#M28586</guid>
      <dc:creator>eliadtech</dc:creator>
      <dc:date>2022-11-07T22:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Policy Optimization / Review</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/167265#M30227</link>
      <description>&lt;P&gt;Great response, much appreciated.&lt;/P&gt;&lt;P&gt;Apologies I am only picking up on this now, Ive been consumed with other projects.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 13:35:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-Policy-Optimization-Review/m-p/167265#M30227</guid>
      <dc:creator>superd</dc:creator>
      <dc:date>2023-01-10T13:35:36Z</dc:date>
    </item>
  </channel>
</rss>

