<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACCESS RULE POLICY in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181582#M33233</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;You will not get any issue for this.&lt;/P&gt;&lt;P&gt;IP block rule or advisory(for blocking IP or URL) should be on top of the rule base.&lt;/P&gt;&lt;P&gt;Note: &lt;SPAN&gt;Unused objects and duplicate objects will increase the policy verification time. Avoid creating duplicate objects and delete unnecessary objects. Cleaning up these objects can greatly improve the overall policy installation time.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk102812" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk102812&lt;/A&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;</description>
    <pubDate>Sun, 21 May 2023 17:18:23 GMT</pubDate>
    <dc:creator>Yashsmk</dc:creator>
    <dc:date>2023-05-21T17:18:23Z</dc:date>
    <item>
      <title>ACCESS RULE POLICY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181579#M33231</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I placed my access rule policy for blacklisted IP addresses at the top of the access rule. My group object for blacklisted IP addresses contains numerous IP addresses. Will there be any issues with the runtime for traffic to pass through?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 May 2023 15:44:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181579#M33231</guid>
      <dc:creator>Capt_Mundo</dc:creator>
      <dc:date>2023-05-21T15:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: ACCESS RULE POLICY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181582#M33233</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;You will not get any issue for this.&lt;/P&gt;&lt;P&gt;IP block rule or advisory(for blocking IP or URL) should be on top of the rule base.&lt;/P&gt;&lt;P&gt;Note: &lt;SPAN&gt;Unused objects and duplicate objects will increase the policy verification time. Avoid creating duplicate objects and delete unnecessary objects. Cleaning up these objects can greatly improve the overall policy installation time.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk102812" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk102812&lt;/A&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;</description>
      <pubDate>Sun, 21 May 2023 17:18:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181582#M33233</guid>
      <dc:creator>Yashsmk</dc:creator>
      <dc:date>2023-05-21T17:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: ACCESS RULE POLICY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181583#M33234</link>
      <description>&lt;P&gt;See here: &lt;A href="https://community.checkpoint.com/t5/Management/Management-has-0-17Million-Blacklist-IPs-in-DB/m-p/122578" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Management/Management-has-0-17Million-Blacklist-IPs-in-DB/m-p/122578&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 21 May 2023 19:13:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181583#M33234</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-05-21T19:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACCESS RULE POLICY</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181584#M33235</link>
      <description>&lt;P&gt;Just follow what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;gave you.&lt;/P&gt;</description>
      <pubDate>Sun, 21 May 2023 22:00:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ACCESS-RULE-POLICY/m-p/181584#M33235</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-21T22:00:42Z</dc:date>
    </item>
  </channel>
</rss>

