<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R81.10 Rulebase creation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200382#M37599</link>
    <description>&lt;P&gt;Computers are really, really fast. The only rule order optimization worth caring about is stuff which disables SecureXL templates. Check 'fwaccel stat' to see if it says templates are "disabled from rule ###" or something similar, and consider moving that rule lower.&lt;/P&gt;
&lt;P&gt;Otherwise, arrange your rules to make sense for the humans who have to deal with them.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Dec 2023 21:38:16 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2023-12-12T21:38:16Z</dc:date>
    <item>
      <title>R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200375#M37595</link>
      <description>&lt;P&gt;R77.30 Reference -&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk106597" target="_self"&gt;sk106597&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does such a thing exist for R81.10? I've looked at the&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/Welcome.htm" target="_self"&gt;R81.10 Security Management Administration Guide&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_LoggingAndMonitoring_AdminGuide/Topics-LMG/Introduction.htm" target="_self"&gt;R81.10 Logging and Monitoring Administration Guide&lt;/A&gt;&amp;nbsp;per the suggestion of the R77.30 reference article, but nothing concrete jumps out at me.&lt;/P&gt;&lt;P&gt;The main thing I am wondering is, is it still best practice to have VPN (site-to-site) rules at the top of the rulebase, or should it follow more of a hit count approach now?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 19:53:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200375#M37595</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2023-12-12T19:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200377#M37596</link>
      <description>&lt;P&gt;I will tell you approach I have and works perfectly fine, but, everyone is different.&lt;/P&gt;
&lt;P&gt;-generic rules, such as geo blocks, vpn rules, blocking known bad IPs etc, top of the rulebase&lt;/P&gt;
&lt;P&gt;-for each interface that belongs to specific zone, inline layer inside default network layer&lt;/P&gt;
&lt;P&gt;-separate ordered layer that has appc+urlf enabled for those rules (MAKE SURE that layer has any any allow at the bottom, otherise all traffic would be blocked)&lt;/P&gt;
&lt;P&gt;-any additional ordered layer for specific blade if needed&lt;/P&gt;
&lt;P&gt;Alsom keep in mind, link you gave is indeed good reference, but, it was written when layers with CP did not exist back in the day, unlike some other vendors.&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 20:09:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200377#M37596</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-12T20:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200382#M37599</link>
      <description>&lt;P&gt;Computers are really, really fast. The only rule order optimization worth caring about is stuff which disables SecureXL templates. Check 'fwaccel stat' to see if it says templates are "disabled from rule ###" or something similar, and consider moving that rule lower.&lt;/P&gt;
&lt;P&gt;Otherwise, arrange your rules to make sense for the humans who have to deal with them.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 21:38:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200382#M37599</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-12-12T21:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200384#M37600</link>
      <description>&lt;P&gt;The Admin guide contains guidance on crafting the Access Policy:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/Best-Practices-for-Access-Control-Rules.htm?tocpath=Creating%20an%20Access%20Control%20Policy%7C_____9" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/Best-Practices-for-Access-Control-Rules.htm?tocpath=Creating%20an%20Access%20Control%20Policy%7C_____9&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 23:46:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200384#M37600</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-12-12T23:46:23Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200392#M37602</link>
      <description>&lt;P&gt;Alongside all the other advice in this thread, I'd suggest that putting VPN rules into an inline layer (one layer per VPN community) is a good idea, as it means you can manage that traffic without having to be concerned about it accidently matching any general rules lower down in the policy. A parent rule with 'any any any' but with the VPN community specified probably would work, but I've not personally tested that.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 03:24:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200392#M37602</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2023-12-13T03:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200421#M37611</link>
      <description>&lt;P&gt;It does work, I tried that before, but honestly, I always prefer to have VPN rules in general section, BEFORE any inline layers, but again, thats just me.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 10:18:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200421#M37611</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-13T10:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200483#M37639</link>
      <description>&lt;P&gt;I've started doing this recently and I've been a big fan. Easier to manage and I feel better about getting more granular with the security policy as it doesn't add to the overall length of the main policy, just uh the inline, which is fine.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 13:32:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200483#M37639</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2023-12-13T13:32:52Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200484#M37640</link>
      <description>&lt;P&gt;It was not easy to get used to from R77 code, but it makes so much more sense. Cisco had layered approach for who knows how long now, but obviously, as their web filtering feature is not that great, thats where CP comes in.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 13:34:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200484#M37640</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-13T13:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Rulebase creation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200486#M37641</link>
      <description>&lt;P&gt;Yes, I went over that in my original post. The section of the Admin guide you linked to and that I've read as well, does not spell out VPN rule placement like the R77.30 SK did, that's why I made this post, to see if VPN rules should still be placed at the top of the rulebase as was once suggested in R77.30. This appears to no longer be a thing from the feedback I am getting due to the evolution of the software, which is great.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 13:43:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-Rulebase-creation/m-p/200486#M37641</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2023-12-13T13:43:19Z</dc:date>
    </item>
  </channel>
</rss>

