<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rules Order in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224121#M43010</link>
    <description>&lt;P&gt;so the rule will be :&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Network Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;Destination : any&lt;/LI&gt;
&lt;LI&gt;Action : accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Application Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;destination : any&lt;/LI&gt;
&lt;LI&gt;service &amp;amp; application : youtube&lt;/LI&gt;
&lt;LI&gt;action : accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Can you confirm?&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2024 01:40:28 GMT</pubDate>
    <dc:creator>handiansudianto</dc:creator>
    <dc:date>2024-08-21T01:40:28Z</dc:date>
    <item>
      <title>Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224030#M42985</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have network policy layer and application policy layer. The network policy have higher preference than application policy.&lt;/P&gt;
&lt;P&gt;With this scenario i want to know :&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If there any incoming traffic matched one of rule set in the network rule, will application policy applied?&lt;/LI&gt;
&lt;LI&gt;How can application policy applied, because the application policy have secondary preference and on the bottom of network rule the is implicit deny? In my mind because in network policy have implicit denied so the application policy will not applied.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 20 Aug 2024 07:16:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224030#M42985</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-20T07:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224034#M42987</link>
      <description>&lt;P&gt;If you use network policy and application policy as SEPARATE layers, than yes, application policy will be applied to a specific connection only once the is a matching accept rule in the network policy is found, as shown in the picture:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-08-20 at 10.23.17.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27285iB211DBC8E0AFA961/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2024-08-20 at 10.23.17.png" alt="Screenshot 2024-08-20 at 10.23.17.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;However, applications can be used as part of the network security policy, with or without inline layers, then the final rulebase match should include applications control.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 08:27:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224034#M42987</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-08-20T08:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224036#M42988</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;So when no match network rule for the traffic, this mean the application rule will not applied?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 08:32:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224036#M42988</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-20T08:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224038#M42989</link>
      <description>&lt;P&gt;To repeat myself, if you are using these two policies as separate layers, yes. In a general sense, not necessarily.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 08:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224038#M42989</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-08-20T08:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224089#M42996</link>
      <description>&lt;P&gt;For traffic to pass the gateway, it must match an Accept rule in both the Network and Application layer.&lt;BR /&gt;This is how Ordered Layers work.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 15:32:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224089#M42996</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-20T15:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224093#M42997</link>
      <description>&lt;P&gt;&lt;SPAN&gt;With ordered layers, drop is final. Further layers will not be evaluated. Accept is more like "Continue"; it ends that layer's evaluation, then the next layer gets a chance to drop it.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 16:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224093#M42997</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-08-20T16:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224118#M43007</link>
      <description>&lt;P&gt;Hi, What happen if example host 10.10.10.10 is permitted to the internet by network layer, but we don't have any rule in the application layer?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You say 'it must match an Accept rule in both the Network and Application layer', with above scenario host 10.10.10.10 is not able to reach to the internet due implicit deny on application rule even permitted on network layer?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 00:37:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224118#M43007</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-21T00:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224119#M43008</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;example i want host 10.10.10.10 is able to connect to youtube only. We create application rule to allow youtube for host 10.10.10.10, what should i fill in the network rule? Should i permit host 10.10.10.10 to&amp;nbsp; any?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 00:39:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224119#M43008</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-21T00:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224120#M43009</link>
      <description>&lt;P&gt;If you have multiple access layers in the policy package, each layer needs a rule to allow the traffic. There is no single correct way to write these rules.&lt;/P&gt;
&lt;P&gt;I am perhaps more cautious than many. I would write the access rule as 10.10.10.10 to a negated group containing all the non-public address space (RFC 1918, test networks, experimental networks, loopback, etc.) via https.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 01:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224120#M43009</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-08-21T01:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224121#M43010</link>
      <description>&lt;P&gt;so the rule will be :&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Network Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;Destination : any&lt;/LI&gt;
&lt;LI&gt;Action : accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Application Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;destination : any&lt;/LI&gt;
&lt;LI&gt;service &amp;amp; application : youtube&lt;/LI&gt;
&lt;LI&gt;action : accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Can you confirm?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 01:40:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224121#M43010</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-21T01:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224130#M43012</link>
      <description>&lt;P&gt;When a packet doesn't match a rule in a layer, the default action is performed. Assuming this is a policy that was updated from R77 days, the Application layer will have a default 'accept no log' action. This can be set when editing a policy layer.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason for the 'accept no log' default is that the Application layer is a legacy concept from R77 days when we had the Firewall policy and the App Control/URL Filtering layer as separate entities. We didn't want to make people configure access twice, so the application layer only does anything if you specifically put a rule in it to match some traffic, else it just lets it through as it must already have been accepted on the Network layer to get that far.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 05:42:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224130#M43012</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-08-21T05:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224131#M43013</link>
      <description>&lt;P&gt;Hi..&lt;/P&gt;
&lt;P&gt;I just realized default action on application rule is accept and not drop.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ok, application rule will work if there any match traffic from network rule?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 05:51:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224131#M43013</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-21T05:51:19Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224133#M43014</link>
      <description>&lt;P&gt;If the connection matches an Accept on the Network layer and nothing on the Application layer, it will pass through the gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:08:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224133#M43014</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-08-21T07:08:44Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224134#M43015</link>
      <description>&lt;P&gt;If i have below rule, what do you think?&lt;/P&gt;
&lt;P&gt;Host 10.10.10.10 able to any address on internet, or only can access to youtube?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Network Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;Destination : any&lt;/LI&gt;
&lt;LI&gt;Action : accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Application Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;destination : any&lt;/LI&gt;
&lt;LI&gt;service &amp;amp; application : youtube&lt;/LI&gt;
&lt;LI&gt;action : accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:13:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224134#M43015</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-21T07:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224136#M43017</link>
      <description>&lt;P&gt;They can get anywhere. The Youtube traffic will be inspected by Application control and anything else will match the default action for Application layer.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:31:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224136#M43017</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-08-21T07:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224137#M43018</link>
      <description>&lt;P&gt;So, can you know how to make an rule to allowing host 10.10.10.10 only to youtube?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:33:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224137#M43018</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-21T07:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224147#M43022</link>
      <description>&lt;P&gt;Add a rule in the Application policy below the one that allows Youtube that drops everything else.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also limit the services in the Network layer to only the relevant ports (presumably 80 and 443 for Youtube).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 09:07:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224147#M43022</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-08-21T09:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224167#M43025</link>
      <description>&lt;P&gt;That will work.&lt;BR /&gt;However, I would restrict the services to http/https and the destinations.&lt;BR /&gt;You can use the “ExternalZone” object for the destination easily enough.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 12:50:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224167#M43025</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-21T12:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224211#M43033</link>
      <description>&lt;P&gt;Hi..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Network Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;Destination : any&lt;/LI&gt;
&lt;LI&gt;Action : accept&lt;/LI&gt;
&lt;LI&gt;service : http, https&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Application Layer :
&lt;UL&gt;
&lt;LI&gt;source : 10.10.10.10&lt;/LI&gt;
&lt;LI&gt;destination : any&lt;/LI&gt;
&lt;LI&gt;service &amp;amp; application : youtube&lt;/LI&gt;
&lt;LI&gt;action : accept&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;It's the rule what you mean? I believe with this rule the host 10.10.10.10 can access to anywhere since the destination on network layer set to any. Am i right?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 00:45:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224211#M43033</guid>
      <dc:creator>handiansudianto</dc:creator>
      <dc:date>2024-08-22T00:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Rules Order</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224215#M43035</link>
      <description>&lt;P&gt;Yes, they can get anywhere on those services.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 01:16:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Rules-Order/m-p/224215#M43035</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-08-22T01:16:53Z</dc:date>
    </item>
  </channel>
</rss>

