<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall rule for any tcp and udp port in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73562#M5622</link>
    <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;So it means any protocol (like TCP, UDP , GRE, IPSec, etc.) under IP-Protocol will be considered, it is like everything.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jan 2020 14:32:43 GMT</pubDate>
    <dc:creator>sajj</dc:creator>
    <dc:date>2020-01-28T14:32:43Z</dc:date>
    <item>
      <title>Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/60995#M4668</link>
      <description>&lt;P&gt;How can&amp;nbsp; we create a service for Any tcp and UDP ports.&lt;/P&gt;&lt;P&gt;Port should be-&amp;nbsp; Any&amp;nbsp;&lt;/P&gt;&lt;P&gt;And protocol should be - TCP and UDP ??&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 00:05:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/60995#M4668</guid>
      <dc:creator>Chauhanrht8</dc:creator>
      <dc:date>2019-08-23T00:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61031#M4671</link>
      <description>&lt;P&gt;Not sure why you would want to do this, but create a group and insert a tcp and udp object.&lt;/P&gt;&lt;P&gt;Each object respectively contains the port range of 1-65535 or just "any" and you are good to go.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 11:48:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61031#M4671</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-08-23T11:48:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61032#M4672</link>
      <description>&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 22px;"&gt;* Any also matches for applications and not just TCP/UDP ports as requested.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 22px;"&gt;Therefore just create a new&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;tcp_any&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;and&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;udp_any&lt;/STRONG&gt;&amp;nbsp;object&amp;nbsp;&lt;/EM&gt;&lt;STRONG&gt;&amp;nbsp;&amp;gt;0&lt;/STRONG&gt;, uncheck&lt;STRONG&gt; Match for Any&amp;nbsp;&lt;/STRONG&gt;and use these in your rule.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 22px;"&gt;Example:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 22px;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 346px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2259i3E0E93669D87B7DC/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG style="color: #e45785;"&gt;&lt;SPAN style="font-size: 22px;"&gt;How To Describe "Any Application"&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG style="color: #e45785;"&gt;Matching unknown traffic&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG style="width: 620px; height: 99px;" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60904_pastedImage_1.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG style="width: 620px; height: 73px;" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60906_pastedImage_3.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;IMG style="width: 620px; height: 260px;" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60908_pastedImage_5.png" border="0" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 15:52:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61032#M4672</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-08-23T15:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61034#M4673</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;I was not writing about "any" in the typical way of "any" in the service column. With any I meant to write "any" in the TCP or UDP objects itself. "Any" or 1-65535 should end up with the same functionality, doesn't it?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 12:07:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61034#M4673</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-08-23T12:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61039#M4674</link>
      <description>&lt;P&gt;You may want to be sure to uncheck the 'match for any' in the service properties.&amp;nbsp; &amp;nbsp;I expect you will receive the warning that service objects may inherit that change.&lt;/P&gt;&lt;P&gt;See &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk150553&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank" rel="noopener"&gt;sk150553&lt;/A&gt; for an example.&lt;/P&gt;&lt;P&gt;The idea sort of negates having a firewall though.&amp;nbsp; &amp;nbsp;I assume you likely have a good reason.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 13:55:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61039#M4674</guid>
      <dc:creator>-TJ-</dc:creator>
      <dc:date>2019-08-23T13:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61040#M4675</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/33206"&gt;@Chauhanrht8&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Creat two new services with a port range from 1 to 65535 for udp service and tcp service.&lt;/P&gt;
&lt;P&gt;Set no protocol in protocol field and&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;don't use ‚match for any‘.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now add this two new services to your rule.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;TCP_ANY:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Port: 1-65535&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Match for any: no&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Protocol: none&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;UDP_ANY:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Port: 1-65535&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Match for any: no&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Protocol: none&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2019 14:18:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61040#M4675</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-08-23T14:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61084#M4684</link>
      <description>Hello @HeikoAnken,&lt;BR /&gt;Thanks for the information.</description>
      <pubDate>Sat, 24 Aug 2019 15:33:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/61084#M4684</guid>
      <dc:creator>Chauhanrht8</dc:creator>
      <dc:date>2019-08-24T15:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73468#M5612</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What is the use case to have Protocol = NONE ?&lt;/P&gt;&lt;P&gt;Why 2 separate services are proposed (TCP_ANY&amp;nbsp; &amp;nbsp;and UDP_ANY) though the meaning is same as we are not using any protocol ? Is it only for more readability ?&lt;/P&gt;&lt;P&gt;What will be behavior of checkpoint firewalls if do not choose Protocol = None ? Because Source IP will choose either TCP or UDP for communication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sajjad&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 17:30:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73468#M5612</guid>
      <dc:creator>sajj</dc:creator>
      <dc:date>2020-01-27T17:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73500#M5615</link>
      <description>Protocol None is for the applications like FTP, H323 etc.&lt;BR /&gt;Why you want only TCP and UDP is that you don't want to allow all other protocols like GRE and IPSEC, which are neither TCP nor UDP.</description>
      <pubDate>Tue, 28 Jan 2020 06:25:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73500#M5615</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-28T06:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73562#M5622</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;So it means any protocol (like TCP, UDP , GRE, IPSec, etc.) under IP-Protocol will be considered, it is like everything.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 14:32:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73562#M5622</guid>
      <dc:creator>sajj</dc:creator>
      <dc:date>2020-01-28T14:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall rule for any tcp and udp port</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73563#M5623</link>
      <description>Any will allow all, while the 2 TCP and UDP (all ports) will not allow other protocols than TCP or UDP.</description>
      <pubDate>Tue, 28 Jan 2020 14:45:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Firewall-rule-for-any-tcp-and-udp-port/m-p/73563#M5623</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-28T14:45:36Z</dc:date>
    </item>
  </channel>
</rss>

