<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policies in Traditional and Simplified mode in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37289#M3059</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Uhmmm... but this case does not sounds like a not common case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it was a common case, we will not have a SK to this kind of situation...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Jul 2018 23:16:51 GMT</pubDate>
    <dc:creator>Jones_Jardel_Po</dc:creator>
    <dc:date>2018-07-06T23:16:51Z</dc:date>
    <item>
      <title>Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37280#M3050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible to copy all firewall, QoS rules from a simplified policy to a traditional policy?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 15:41:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37280#M3050</guid>
      <dc:creator>Jones_Jardel_Po</dc:creator>
      <dc:date>2018-07-06T15:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37281#M3051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traditional Mode policies have been discouraged since at least NG (R5x) versions.&lt;/P&gt;&lt;P&gt;In R80, the ability to create new Traditional Mode policies was removed and isn't coming back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's the real problem you're trying to solve?&lt;/P&gt;&lt;P&gt;Let's find a way to solve that in a way that doesn't involve Traditional Mode policies.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 16:57:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37281#M3051</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-06T16:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37282#M3052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a IPsec VPN established and I need to forward all Internet traffic to this tunnel, but only one internal subnet must be affected on tihs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I do this using communities?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 17:25:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37282#M3052</guid>
      <dc:creator>Jones_Jardel_Po</dc:creator>
      <dc:date>2018-07-06T17:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37283#M3053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This exact problem (and solution) is here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86582&amp;amp;partition=Advanced&amp;amp;product=IPSec" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86582&amp;amp;partition=Advanced&amp;amp;product=IPSec"&gt;Excluding subnets in encryption domain from accessing a specific VPN community&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 19:59:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37283#M3053</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-06T19:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37284#M3054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Dameon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to send to that tunnel only requests from 192.168.1.0/24 going to the Internet (example);&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thinking on that, I will need to exclude all my internal subnets going to the Internet, example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;// // User defined INSPECT code //&amp;nbsp; vpn_exclude_src={&amp;lt;192.168.1.1,192.168.1.254&amp;gt;}; vpn_exclude_dst={&amp;lt;I need to put all Internet IPs here?&amp;gt;};&amp;nbsp; #ifndef IPV6_FLAVORipv #define NON_VPN_TRAFFIC_RULES ((src in vpn_exclude_src) and (dst in vpn_exclude_dst)) #else #define NON_VPN_TRAFFIC_RULES 0 #endif&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I'll need to put all Internet IPs on&amp;nbsp;vpn_exclude_dst?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 22:18:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37284#M3054</guid>
      <dc:creator>Jones_Jardel_Po</dc:creator>
      <dc:date>2018-07-06T22:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37285#M3055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.&lt;/P&gt;&lt;P&gt;All IPs can be represented using the range specified in the All_Internet object, which is &amp;lt;0.0.0.0,255.255.255.255&amp;gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 22:32:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37285#M3055</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-06T22:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37286#M3056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 22:36:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37286#M3056</guid>
      <dc:creator>Jones_Jardel_Po</dc:creator>
      <dc:date>2018-07-06T22:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37287#M3057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;And a curious thing: why Check Point does not put this kind of configuration&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;in&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;the Smart Dashboard?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 22:40:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37287#M3057</guid>
      <dc:creator>Jones_Jardel_Po</dc:creator>
      <dc:date>2018-07-06T22:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37288#M3058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;If I had to guess, it's because it's not a common use case.&lt;/SPAN&gt;&lt;P class=""&gt;I personally hadn't heard of this specific use case before.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 22:51:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37288#M3058</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-06T22:51:21Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37289#M3059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Uhmmm... but this case does not sounds like a not common case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it was a common case, we will not have a SK to this kind of situation...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 23:16:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37289#M3059</guid>
      <dc:creator>Jones_Jardel_Po</dc:creator>
      <dc:date>2018-07-06T23:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Policies in Traditional and Simplified mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37290#M3060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;SKs exist for both common and uncommon issues.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2018 23:40:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policies-in-Traditional-and-Simplified-mode/m-p/37290#M3060</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-06T23:40:51Z</dc:date>
    </item>
  </channel>
</rss>

