<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What actions are required to control the 'IP in IP' protocol at checkpoint? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195978#M36553</link>
    <description>&lt;P&gt;Thank you for your reply&lt;/P&gt;&lt;P&gt;I also think it should work normally.&lt;/P&gt;&lt;P&gt;However, I am suspicious that the 'Match by' protocol is displayed as icmp, so I am confused as to whether that is correct.&lt;/P&gt;&lt;P&gt;Is there a case for controlling the 'IP in IP' protocol at checkpoint?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Oct 2023 02:51:37 GMT</pubDate>
    <dc:creator>ChoiYunSoo</dc:creator>
    <dc:date>2023-10-24T02:51:37Z</dc:date>
    <item>
      <title>What actions are required to control the 'IP in IP' protocol at checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195888#M36533</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can Checkpoint control the 'IP in IP' protocol?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;'IP in IP' is an IP tunneling protocol that encapsulates one IP packet in another IP packet.&lt;/P&gt;&lt;P&gt;And if you search IP in IP in Checkpoint, you can check the corresponding protocol in Application/Categories&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, the 'matched by protocol' of the protocol is icmp.&lt;/P&gt;&lt;P&gt;There are some things I don't know about how the 'ip in ip' protocol works, but the fact that 'matched by protocol' is icmp remains a question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checkpoint If I apply 'ip in ip' from 'applications' categories to the rule, will I be able to get the desired action?&lt;/P&gt;&lt;P&gt;And if there is a way to use only the service object without using the application policy, please let me know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 538px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22915i3F7359B8DEE65A7A/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2023 09:25:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195888#M36533</guid>
      <dc:creator>ChoiYunSoo</dc:creator>
      <dc:date>2023-10-23T09:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: What actions are required to control the 'IP in IP' protocol at checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195891#M36534</link>
      <description>&lt;P&gt;This should work with the default settings as shown&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2023 10:16:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195891#M36534</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-10-23T10:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: What actions are required to control the 'IP in IP' protocol at checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195895#M36538</link>
      <description>&lt;P&gt;Afaik 'IP in IP' protocol is only used for experimental purposes today as there are many newer possibilities to achieve tunneling available. So why would you use this in rule base ?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Oct 2023 10:24:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195895#M36538</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-10-23T10:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: What actions are required to control the 'IP in IP' protocol at checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195978#M36553</link>
      <description>&lt;P&gt;Thank you for your reply&lt;/P&gt;&lt;P&gt;I also think it should work normally.&lt;/P&gt;&lt;P&gt;However, I am suspicious that the 'Match by' protocol is displayed as icmp, so I am confused as to whether that is correct.&lt;/P&gt;&lt;P&gt;Is there a case for controlling the 'IP in IP' protocol at checkpoint?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 02:51:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195978#M36553</guid>
      <dc:creator>ChoiYunSoo</dc:creator>
      <dc:date>2023-10-24T02:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: What actions are required to control the 'IP in IP' protocol at checkpoint?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195979#M36554</link>
      <description>&lt;P&gt;Your answer and general explanation were very helpful. Thank you.&lt;/P&gt;&lt;P&gt;But the last question, 'Why would you use this in rule base?' I don't understand the intent of the question.&lt;/P&gt;&lt;P&gt;I would appreciate it if you could tell me what your intention was with your question.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 02:53:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-actions-are-required-to-control-the-IP-in-IP-protocol-at/m-p/195979#M36554</guid>
      <dc:creator>ChoiYunSoo</dc:creator>
      <dc:date>2023-10-24T02:53:08Z</dc:date>
    </item>
  </channel>
</rss>

