<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access layer policies in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-layer-policies/m-p/8135#M90739</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, Check Mates!&lt;/P&gt;&lt;P&gt;When we divide one access layer on many other layers&amp;nbsp;such as Network layer, Application layer and so on, how exactly do the rules work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, I have a network layer and an application one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Network layer I have accept rule from the admin host&amp;nbsp;in the network A to the network B&amp;nbsp;&lt;SPAN&gt;(services any here)&lt;/SPAN&gt; and drop rule for&amp;nbsp;the source any&amp;nbsp;and destination network B (services any here).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Application layer I have the following rules: 1 accept rule for the admin host in the network A to the network B, but&amp;nbsp; only with AD services. And the drop rule for &lt;SPAN&gt;the source any&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;and destination network B (services any here).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The &lt;STRONG&gt;admin&lt;/STRONG&gt; host &lt;STRONG&gt;can ping network B&lt;/STRONG&gt; in that situation!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I thought that the rules are checking from the top to the bottom, like Cisco ACLs, but when I disabled cleanup rule from the Network layer, the &lt;STRONG&gt;ping had lost&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eventually, I'm confused because of that. Why I have to add 2 cleanup rules, I guess that the one cleanup rule in the application layer is enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your time and future assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Nov 2018 12:13:24 GMT</pubDate>
    <dc:creator>Egor_Cherkasov</dc:creator>
    <dc:date>2018-11-23T12:13:24Z</dc:date>
    <item>
      <title>Access layer policies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-layer-policies/m-p/8135#M90739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, Check Mates!&lt;/P&gt;&lt;P&gt;When we divide one access layer on many other layers&amp;nbsp;such as Network layer, Application layer and so on, how exactly do the rules work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, I have a network layer and an application one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Network layer I have accept rule from the admin host&amp;nbsp;in the network A to the network B&amp;nbsp;&lt;SPAN&gt;(services any here)&lt;/SPAN&gt; and drop rule for&amp;nbsp;the source any&amp;nbsp;and destination network B (services any here).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Application layer I have the following rules: 1 accept rule for the admin host in the network A to the network B, but&amp;nbsp; only with AD services. And the drop rule for &lt;SPAN&gt;the source any&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;and destination network B (services any here).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The &lt;STRONG&gt;admin&lt;/STRONG&gt; host &lt;STRONG&gt;can ping network B&lt;/STRONG&gt; in that situation!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I thought that the rules are checking from the top to the bottom, like Cisco ACLs, but when I disabled cleanup rule from the Network layer, the &lt;STRONG&gt;ping had lost&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eventually, I'm confused because of that. Why I have to add 2 cleanup rules, I guess that the one cleanup rule in the application layer is enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your time and future assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2018 12:13:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-layer-policies/m-p/8135#M90739</guid>
      <dc:creator>Egor_Cherkasov</dc:creator>
      <dc:date>2018-11-23T12:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: Access layer policies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-layer-policies/m-p/8136#M90740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would be helpful if you included screenshots of your policy.&lt;/P&gt;&lt;P&gt;But in general, you're asking about ordered layers.&lt;/P&gt;&lt;P&gt;For a connection to be accepted, the packet must match an Accept rule in ALL layers.&lt;/P&gt;&lt;P&gt;This can either be an explicit Accept rule or an implicit one (either the layer cleanup rule OR a global property).&lt;/P&gt;&lt;P&gt;In a Network layer, the implicit cleanup rule is Drop.&lt;/P&gt;&lt;P&gt;In an Application layer (for R77.x gateways), the implicit cleanup rule is &lt;STRONG&gt;Accept&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;You can change this for installation to R80+ gateways (cannot for R77.x gateways):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74994_C84C9276-5D57-4A35-B415-F05C519C24D1.jpeg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping can also be allowed as a result of Global Properties (ICMP):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74993_381CC25A-EF6C-4F44-BB24-65BDF58BCAF0.jpeg" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2018 17:04:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-layer-policies/m-p/8136#M90740</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-23T17:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: Access layer policies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-layer-policies/m-p/8137#M90741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much!&lt;/P&gt;&lt;P&gt;You've answered my question, but I have no screenshots, because it's client's case.&lt;/P&gt;&lt;P&gt;So as I've understood the layers in Policy are standalone. And for a successful ping I have to take account of it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Nov 2018 06:02:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Access-layer-policies/m-p/8137#M90741</guid>
      <dc:creator>Egor_Cherkasov</dc:creator>
      <dc:date>2018-11-24T06:02:46Z</dc:date>
    </item>
  </channel>
</rss>

