<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need to create an access control policy to restrict access to a network object in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201323#M37852</link>
    <description>&lt;P&gt;Good morning!&amp;nbsp; I need some advice and guidance.&amp;nbsp; I've been tasked with restricting access to a network object to a small group of department users for auditing purposes.&amp;nbsp; The access rule should permit access to this object only to members of this department.&lt;/P&gt;&lt;P&gt;We are a small shop of 25 users.&amp;nbsp; The department that should be allowed access has 5 members.&lt;/P&gt;&lt;P&gt;We are in a hybrid environment - both in-office and WFH.&lt;/P&gt;&lt;P&gt;Restricting users while they are working in the office would be easy - I could just assign them static IPs and allow only those IPs access.&lt;/P&gt;&lt;P&gt;While WFH - our remote users receive an IP from the Check Point security gateway IP pool network that I have defined.&amp;nbsp; This IP pool is on a separate network than the internal users but is allowed access via access rules.&lt;/P&gt;&lt;P&gt;Currently we are not utilizing the Identity Awareness blade.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm guessing that this may be the best solution?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone point me in the right direction?&amp;nbsp; We have a disaster recovery site that I can use for testing purposes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks guys and gals.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Dec 2023 17:41:41 GMT</pubDate>
    <dc:creator>Joe_Kanaszka</dc:creator>
    <dc:date>2023-12-21T17:41:41Z</dc:date>
    <item>
      <title>Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201323#M37852</link>
      <description>&lt;P&gt;Good morning!&amp;nbsp; I need some advice and guidance.&amp;nbsp; I've been tasked with restricting access to a network object to a small group of department users for auditing purposes.&amp;nbsp; The access rule should permit access to this object only to members of this department.&lt;/P&gt;&lt;P&gt;We are a small shop of 25 users.&amp;nbsp; The department that should be allowed access has 5 members.&lt;/P&gt;&lt;P&gt;We are in a hybrid environment - both in-office and WFH.&lt;/P&gt;&lt;P&gt;Restricting users while they are working in the office would be easy - I could just assign them static IPs and allow only those IPs access.&lt;/P&gt;&lt;P&gt;While WFH - our remote users receive an IP from the Check Point security gateway IP pool network that I have defined.&amp;nbsp; This IP pool is on a separate network than the internal users but is allowed access via access rules.&lt;/P&gt;&lt;P&gt;Currently we are not utilizing the Identity Awareness blade.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm guessing that this may be the best solution?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone point me in the right direction?&amp;nbsp; We have a disaster recovery site that I can use for testing purposes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks guys and gals.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 17:41:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201323#M37852</guid>
      <dc:creator>Joe_Kanaszka</dc:creator>
      <dc:date>2023-12-21T17:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201324#M37853</link>
      <description>&lt;P&gt;As they say Joe, you hit the nail on the head with IA blade argument and here is why. If you think about it logically, thats really the best feature of IA, it ALWAYS follows the user, regardless what IP they are assigned. Without it, its almost impossible to track those things. So, if identity awareness is not an option, then sounds to me that you have to rely on what IP they get, but then again, if they are assigned OM address from the pool, then most likely, it would always be different when they connect.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 18:14:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201324#M37853</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-21T18:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201339#M37858</link>
      <description>&lt;P&gt;Identity Awareness or IP per user for Office mode e.g. ( $FWDIR/conf/ipassignment.conf ) might by sufficient given the small scale here.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 21:12:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201339#M37858</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-12-21T21:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201341#M37860</link>
      <description>&lt;P&gt;Thanks Chris!&amp;nbsp; Gotta think about this.&amp;nbsp; I'd rather not over-engineer a solution to solve a small issue, but if IA is easy to setup it may be worth it.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 21:42:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201341#M37860</guid>
      <dc:creator>Joe_Kanaszka</dc:creator>
      <dc:date>2023-12-21T21:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201343#M37862</link>
      <description>&lt;P&gt;Thanks Rock!&amp;nbsp; Given the small environment, how hard would it be to configure static IPs for the renmote users via the&amp;nbsp;&lt;SPAN&gt;$FWDIR/conf/ipassignment.conf?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 21:41:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201343#M37862</guid>
      <dc:creator>Joe_Kanaszka</dc:creator>
      <dc:date>2023-12-21T21:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201344#M37863</link>
      <description>&lt;P&gt;Man, thats my new nickname, Rock, among many I already have haha. Anyway, I dont think its hard, but again, going back to what I said, to me, it makes more sense to utilize IA blade, so it goes by user name, no matter what their IP address is.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy (Rock)&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 21:55:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201344#M37863</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-21T21:55:33Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201345#M37864</link>
      <description>&lt;P&gt;HA!&amp;nbsp; Makes sense to me as well.&amp;nbsp; Thanks Andy (Rock)!&amp;nbsp; &amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 21:57:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201345#M37864</guid>
      <dc:creator>Joe_Kanaszka</dc:creator>
      <dc:date>2023-12-21T21:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201346#M37865</link>
      <description>&lt;P&gt;You can also call me Mr Portokalo lol. Thats cause I do Greek accent well haha and it comes from my favorite movie "My big fat Greek wedding". Thats actually one of our Canadian women in it, Nia Vardalos.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 22:05:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201346#M37865</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-21T22:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201347#M37866</link>
      <description>&lt;P&gt;Thanks again Andy!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 22:07:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201347#M37866</guid>
      <dc:creator>Joe_Kanaszka</dc:creator>
      <dc:date>2023-12-21T22:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201348#M37867</link>
      <description>&lt;P&gt;Happy to help mate!&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy aka Rock aka Mr Portokalo&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 22:09:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201348#M37867</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-21T22:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201402#M37893</link>
      <description>&lt;P&gt;My Big Fat Greek Wedding was a great movie!&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2023 20:02:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201402#M37893</guid>
      <dc:creator>sbastani</dc:creator>
      <dc:date>2023-12-22T20:02:28Z</dc:date>
    </item>
    <item>
      <title>Re: Need to create an access control policy to restrict access to a network object</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201403#M37894</link>
      <description>&lt;P&gt;Yes sir! &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Specially the speech Gus Portokalos gave when Toula got maried &lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 22 Dec 2023 20:05:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Need-to-create-an-access-control-policy-to-restrict-access-to-a/m-p/201403#M37894</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-22T20:05:12Z</dc:date>
    </item>
  </channel>
</rss>

