<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TP - Best Practices in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251078#M49124</link>
    <description>&lt;P&gt;Does the IPS recommendation also apply to other blades, such as AB and AV?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or AV/AB can be enabled on the VS's one needs, without the need to enable it also on VS0?&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jun 2025 19:17:52 GMT</pubDate>
    <dc:creator>Matlu</dc:creator>
    <dc:date>2025-06-11T19:17:52Z</dc:date>
    <item>
      <title>TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251062#M49117</link>
      <description>&lt;P&gt;Hello, Mates.&lt;/P&gt;
&lt;P&gt;In VSX environments, the recommendation regarding enabling Threat Prevention Blades on all the VS's you have, is always going to depend on how ‘robust’ your main VSX box is?&lt;/P&gt;
&lt;P&gt;Does enabling Threat Prevention “force” you to also enable HTTPS Inspection on your VS's or is this always optional?&lt;/P&gt;
&lt;P&gt;Thanks for your recommendations.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 15:50:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251062#M49117</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-06-11T15:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251064#M49119</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;I always tell people to follow this mentality "When in doubt, always leave default settings". If then, you notice any issues, you can tailor it as needed.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 16:11:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251064#M49119</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-11T16:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251072#M49121</link>
      <description>&lt;P&gt;You only enable IPS on VS0 for updates not to protect VS0. VS0 is for mgmt purpose&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A class="checkpoint_toggle" target="_blank"&gt;Should I enable IPS Software Blade on the VSX Gateway?&lt;/A&gt;&lt;/P&gt;
&lt;DIV id="IPS_Q1"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;You must enable and configure the IPS Software Blade in these objects:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;VSX Gateway or VSX Cluster (because VS0 handles contract validation for all Virtual Systems).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Applicable Virtual Systems.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To enable Anti-Bot, Anti-Virus, or IPS on Virtual Systems&lt;/P&gt;
&lt;P&gt;Important:&lt;/P&gt;
&lt;P&gt;Make sure the routing, DNS, and proxy settings for the VSX GatewayClosed or VSX ClusterClosed Members (VS0) are configured correctly.&lt;/P&gt;
&lt;P&gt;You must enable and configure the Software Blades in these objects:&lt;/P&gt;
&lt;P&gt;VSX Gateway or VSX Cluster (because VS0 handles contract validation for all Virtual Systems).&lt;/P&gt;
&lt;P&gt;Applicable Virtual Systems.&lt;/P&gt;
&lt;P&gt;Make sure the VSX Gateway or VSX Cluster and the applicable Virtual Systems can connect to the Internet.&lt;/P&gt;
&lt;P&gt;Virtual Systems get updates through the VSX Gateway or VSX Cluster (VS0).&lt;/P&gt;
&lt;P&gt;If the VSX Gateway or VSX Cluster fails to connect, each Virtual SystemClosed uses its proxy settings to get the updates from the Internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding HTTPS inspection. Now you can run IPS without but you don't get the full inspection. The firewall cannot inspect traffic that is encrypted. Most traffic now is encrypted so it is quite important.&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 11 Jun 2025 18:17:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251072#M49121</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-06-11T18:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251073#M49122</link>
      <description>&lt;P&gt;To enable IPS/AB/AV blades, there are 2 ways?&lt;/P&gt;
&lt;P&gt;Because I know people who enable these blades ‘Instance by Instance’ (VS x VS), but according to your explanation, I understand that I can enable the blades from the box as such (VS0) and this should ‘Replicate’ on all my VS's?&lt;/P&gt;
&lt;P&gt;Is that the logic?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 18:28:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251073#M49122</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-06-11T18:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251074#M49123</link>
      <description>&lt;P&gt;If you want to use IPS on a VS you always enable it on VS0 and any other VS that you want to run IPS.&lt;/P&gt;
&lt;P&gt;For example&lt;/P&gt;
&lt;P&gt;VS0: IPS&lt;/P&gt;
&lt;P&gt;VS1:No ips because internal fw&lt;/P&gt;
&lt;P&gt;VS2: IPS enabled&lt;/P&gt;
&lt;P&gt;You can attach a IPS profile on each VS, also VS0&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 18:34:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251074#M49123</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-06-11T18:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251078#M49124</link>
      <description>&lt;P&gt;Does the IPS recommendation also apply to other blades, such as AB and AV?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or AV/AB can be enabled on the VS's one needs, without the need to enable it also on VS0?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 19:17:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251078#M49124</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-06-11T19:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251087#M49126</link>
      <description>&lt;P&gt;Yes, AB/AV should only be enabled on VSes where it is required.&lt;BR /&gt;Traffic is checked via ThreatCloud, so the VS needs Internet access.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 19:56:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251087#M49126</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-11T19:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251096#M49131</link>
      <description>&lt;P&gt;In general terms, does Threat Prevention make sense to be used in FW or VS's that have Internet access?&lt;/P&gt;
&lt;P&gt;Because these blades, enabling them in FW that do not have Internet access, would not make sense, right?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 22:49:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251096#M49131</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-06-11T22:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251097#M49132</link>
      <description>&lt;P&gt;Personally bro, at least in my logical opinion, it makes total sense to use those blades on VS with Internet access and NOT use them on ones that dont have it. Its literally same method for regular quantum fws and truth be told, pretty much applies to any fw vendor out there.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 22:53:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251097#M49132</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-11T22:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251105#M49139</link>
      <description>&lt;P&gt;HTTPS is not mandatory for TP but what the blades can see is limited to clear traffic without it same as any gateway.&lt;/P&gt;
&lt;P&gt;IPS and TEX are the two blades I believe must be enabled also on VSO if to be used on other VS.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2025 00:00:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251105#M49139</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-06-12T00:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: TP - Best Practices</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251123#M49147</link>
      <description>&lt;P&gt;Yes also needed on VS0&lt;/P&gt;
&lt;H2&gt;Anti-Bot and Anti-Virus&lt;/H2&gt;
&lt;DIV class="checkpoint_toggleAll"&gt;Click Here to Show This Section&lt;/DIV&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="checkpoint_toggle" target="_blank"&gt;When I enable the Anti-Bot / Anti-Virus Software Blade in the Virtual System object, should I also enable this blade in the VSX Gateway object?&lt;/A&gt;&lt;BR /&gt;
&lt;DIV id="AB_AV_Q1"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Yes.&lt;/P&gt;
&lt;P&gt;Because contracts validation and initialization of default updates parameters are performed from the VSX Gateway itself (context of VS0).&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 12 Jun 2025 07:38:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/TP-Best-Practices/m-p/251123#M49147</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-06-12T07:38:39Z</dc:date>
    </item>
  </channel>
</rss>

