<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy verification between a rule that has as source access role and a rule that has as source IP. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115140#M76265</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can policy verification at r80.40&amp;nbsp; work between a rule that has as source access role with specific network 192.168.1.0/24 and any user for example and a rule that has as source IP the network 192.168.1.0/24?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 02 Apr 2021 09:53:17 GMT</pubDate>
    <dc:creator>KostasGR</dc:creator>
    <dc:date>2021-04-02T09:53:17Z</dc:date>
    <item>
      <title>Policy verification between a rule that has as source access role and a rule that has as source IP.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115140#M76265</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can policy verification at r80.40&amp;nbsp; work between a rule that has as source access role with specific network 192.168.1.0/24 and any user for example and a rule that has as source IP the network 192.168.1.0/24?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Apr 2021 09:53:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115140#M76265</guid>
      <dc:creator>KostasGR</dc:creator>
      <dc:date>2021-04-02T09:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Policy verification between a rule that has as source access role and a rule that has as source</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115170#M76266</link>
      <description>&lt;P&gt;Rules are only marked as hiding when they have the same source/destination/service.&lt;BR /&gt;In R80.40, if such rules have the same action, they’re not flagged at all.&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk161574&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk161574&amp;amp;partition=Advanced&amp;amp;product=Quantum&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For your specific question: I don’t know what the intended behavior is.&lt;/P&gt;</description>
      <pubDate>Sat, 03 Apr 2021 16:27:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115170#M76266</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-03T16:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: Policy verification between a rule that has as source access role and a rule that has as source</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115184#M76267</link>
      <description>&lt;P&gt;Can you send specific example (screenshot)? I believe this behavior never changed with Check Point since days of R55 or even before. If specific rule higher in the rulebase hides one below, then verification will most likely fail. Its a bit different now with layered rules, but principle is still the same.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Apr 2021 01:48:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115184#M76267</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-04-04T01:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: Policy verification between a rule that has as source access role and a rule that has as source</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115227#M76268</link>
      <description>&lt;P&gt;R55 did not have Access Role objects (that only came in at R75).&lt;BR /&gt;That said, the basic rulebase verification logic is the same as it's been since well before that.&lt;BR /&gt;Between the rulebase layers and the different rulebase matching process in R80+, I'm not sure how relevant the policy verification step is.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Apr 2021 01:11:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115227#M76268</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-05T01:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Policy verification between a rule that has as source access role and a rule that has as source</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115346#M76269</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attaching the screenshots.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11281iCEF3F64F7E1FA585/image-size/medium?v=v2&amp;amp;px=400" role="button" title="policy.png" alt="policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="access role.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11282iA9B88DB580833B56/image-size/medium?v=v2&amp;amp;px=400" role="button" title="access role.png" alt="access role.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; The verification result is pass.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Kostas&lt;/P&gt;</description>
      <pubDate>Tue, 06 Apr 2021 06:17:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Policy-verification-between-a-rule-that-has-as-source-access/m-p/115346#M76269</guid>
      <dc:creator>KostasGR</dc:creator>
      <dc:date>2021-04-06T06:17:33Z</dc:date>
    </item>
  </channel>
</rss>

