<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192285#M67321</link>
    <description>&lt;P&gt;The implied rules are what allow the traffic to TCP 80/443 in the first place.&lt;BR /&gt;This option changes when those rules apply (either before the Access Policy or before the last explicitly configured rule).&lt;BR /&gt;If you set this option to 1 and don't have a rule that blocks the traffic, the implied rule should still function.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Sep 2023 18:23:01 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-09-11T18:23:01Z</dc:date>
    <item>
      <title>Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192141#M67320</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Re sk180808, can someone please confirm the following&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180808" target="_blank" rel="noopener" data-aura-rendered-by="3367:0"&gt;https://support.checkpoint.com/results/sk/sk180808&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We have specific http and https traffic e.g. SSL VPN traffic, destined to external gateway IPs that needs to be allowed. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With option 1 configured, will this traffic be caught by an implied rule before hitting the last explicit rule (the last explicit rule in the rule-base is a clean up rule)? Or do I&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;need to define an explicit allow rule for this traffic before the explicit clean up rule?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Simon&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Sep 2023 23:28:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192141#M67320</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-09-10T23:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192285#M67321</link>
      <description>&lt;P&gt;The implied rules are what allow the traffic to TCP 80/443 in the first place.&lt;BR /&gt;This option changes when those rules apply (either before the Access Policy or before the last explicitly configured rule).&lt;BR /&gt;If you set this option to 1 and don't have a rule that blocks the traffic, the implied rule should still function.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 18:23:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192285#M67321</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-11T18:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192354#M67322</link>
      <description>&lt;P&gt;Correct.&lt;/P&gt;
&lt;P&gt;Also TAC confirmed this option is only related to multi-portal traffic.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So if option 1 is enabled, malicious http/https traffic sourced from an external source IP destined to a gateway external IP portal URL will be dropped by explicit drop rules, all other http/https multi-portal traffic will be allowed by implied rule, before the last explicit drop rule (explicit cleanup).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My other concern is still allowing&amp;nbsp;SSL VPN traffic whereby the user is connecting using a client (not multi-portal traffic), but dropping malicious connections to gateway external IPs on http/https that are currently being accepted by implied rule.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is SSL VPN traffic whereby the user is connecting using a client caught by a different implied rule, in which case it should be unaffected? This SSL VPN client traffic is https, though TAC mentioned this could also be port 4500 which I've never seen (port 4500 generally used NAT traversal in IPSEC VPN).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Or is this traffic not caught by a separate implied rule, and I will need to ensure I explicitly allow this traffic?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 23:50:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192354#M67322</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-09-11T23:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192362#M67323</link>
      <description>&lt;P&gt;I will let&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;confirm 100%, but I believe that option is only related to 80/443 ports, not anything else...but, I could be mistaken.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 00:42:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192362#M67323</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-12T00:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192437#M67324</link>
      <description>&lt;P&gt;Unless you’re running it on a different port, SSL VPN traffic also goes through MultiPortal.&lt;BR /&gt;Which means you would need explicit rules to allow this traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 15:39:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192437#M67324</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-12T15:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192469#M67325</link>
      <description>&lt;P&gt;Including SSL VPN traffic where the user is connecting from a client?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 23:34:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192469#M67325</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2023-09-12T23:34:04Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192567#M67326</link>
      <description>&lt;P&gt;Pretty sure any traffic destined to the gateway on port 443 will involve MultiPortal on some level.&lt;BR /&gt;That would include SSL VPN traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 16:12:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/192567#M67326</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-13T16:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/195406#M67327</link>
      <description>&lt;P&gt;Hey, sorry to respond late to this, but just wondering...since customer is on R81.20 take 24, is rule enough to just block http access to the cluster, without modifying value listed in the sk?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="footnote" border="1" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR class="SubTitle" bgcolor="#ebebeb"&gt;
&lt;TD&gt;Variable Value&lt;/TD&gt;
&lt;TD&gt;Security Gateway Behavior&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;0&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;The Security Gateway / Cluster Member enforces the applicable implied rules for the Multi-Portal traffic before the explicit "Drop" rules (the "Before Drop" position).&lt;BR /&gt;This is the default.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;1&lt;/TD&gt;
&lt;TD&gt;The Security Gateway / Cluster Member enforces the applicable implied rules for the Multi-Portal traffic before the last explicit rule (the "Before Last" position).&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 13:16:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/195406#M67327</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-10-17T13:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Gateway accepts HTTP/HTTPS traffic by implied rule for HTTP/HTTPS Web Portals</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/195434#M67328</link>
      <description>&lt;P&gt;This feature was added to R81.20 via JHF but is OFF by default.&lt;BR /&gt;It must be explicitly configured per the SK.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2023 14:46:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Security-Gateway-accepts-HTTP-HTTPS-traffic-by-implied-rule-for/m-p/195434#M67328</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-10-17T14:46:14Z</dc:date>
    </item>
  </channel>
</rss>

