<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Management Server Traffic Hits the Implied Rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255012#M49924</link>
    <description>&lt;P&gt;Thank you once again,&amp;nbsp;I see — this is the solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Chethan&lt;/P&gt;</description>
    <pubDate>Wed, 13 Aug 2025 06:57:36 GMT</pubDate>
    <dc:creator>chethan_m</dc:creator>
    <dc:date>2025-08-13T06:57:36Z</dc:date>
    <item>
      <title>Management Server Traffic Hits the Implied Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255007#M49920</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently deploying CGNS firewalls on AWS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Architecture:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The management server is hosted on-premises behind a Check Point firewall cluster.&lt;/LI&gt;&lt;LI&gt;The CGNS firewall cluster is deployed in the cloud (AWS).&lt;/LI&gt;&lt;LI&gt;A route-based IPsec site-to-site VPN is established between the on-prem Check Point firewall cluster and the AWS VPN Gateway.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Issue:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Initially, we successfully established SIC communication between the on-prem SMS and the CGNS firewall cluster, and were able to push policies.&lt;/LI&gt;&lt;LI&gt;However, after a few minutes, the communication between the SMS and CGNS firewalls dropped (Gateways Lost).&lt;/LI&gt;&lt;LI&gt;We observed that traffic related to CPD (port 18191) and CPD_amon (port 18192) was hitting&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;implied rules&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;instead of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;explicit VPN access rules&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;configured.&lt;/LI&gt;&lt;LI&gt;Non-Check Point related traffic continues to flow over the VPN tunnel and is encrypted as expected.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should any exclusions be made in the "$FWDIR/lib/implied_rules.def&lt;SPAN&gt;&amp;nbsp;file"&amp;nbsp; to ensure CP management traffic is properly use the VPN tunnel instead of Implied rules.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any guidance or suggestions to help resolve this would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Chethan&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 06:35:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255007#M49920</guid>
      <dc:creator>chethan_m</dc:creator>
      <dc:date>2025-08-13T06:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Management Server Traffic Hits the Implied Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255009#M49921</link>
      <description>&lt;P&gt;SIC traffic should not go via your VPN rules, ever. If your VPn tunnel is down, you would lose control. For that reason, it is covered by implied rules, and it is not recommended to change that.&lt;BR /&gt;&lt;BR /&gt;Management traffic is encrypted, and there is no need to encrypt it again through your IPSec tunnels.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 06:43:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255009#M49921</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-08-13T06:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Management Server Traffic Hits the Implied Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255010#M49922</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thank you for the quick response,&amp;nbsp;&lt;/SPAN&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is currently no alternative communication channel between the on-prem SMS and the cloud-deployed CGNS firewalls. AWS Direct Connect is also not yet in place.&lt;/P&gt;&lt;P&gt;Given that the management server traffic is already encrypted, would it be feasible to re-establish SIC using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;public IP addresses&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;instead of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;private IP addresses&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Chethan&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 06:48:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255010#M49922</guid>
      <dc:creator>chethan_m</dc:creator>
      <dc:date>2025-08-13T06:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Management Server Traffic Hits the Implied Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255011#M49923</link>
      <description>&lt;P&gt;I don't see why not, I've done this many times with many customers around the globe.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 06:51:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255011#M49923</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-08-13T06:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Management Server Traffic Hits the Implied Rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255012#M49924</link>
      <description>&lt;P&gt;Thank you once again,&amp;nbsp;I see — this is the solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Chethan&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 06:57:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Management-Server-Traffic-Hits-the-Implied-Rules/m-p/255012#M49924</guid>
      <dc:creator>chethan_m</dc:creator>
      <dc:date>2025-08-13T06:57:36Z</dc:date>
    </item>
  </channel>
</rss>

