<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nested layers in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15923#M91015</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this is now it currently works:&amp;nbsp;a packet must hit an accept rule in ALL ordered layers.&lt;/P&gt;&lt;P&gt;In the case of MDS Global rules, they are basically joined to the local ruleset, so it’s evaluated as one ruleset, not three.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Nov 2018 19:50:53 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-11-15T19:50:53Z</dc:date>
    <item>
      <title>Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15918#M91010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been working with R80.10 MDS rule bases for a while. Today I was testing out the new ordered layer rule base in SmartCenter R80.10 and tried to implement something close to "global rules".&amp;nbsp;My expectations were that the firewall would evaluate one layer after the other, also nested, in stead it is evaluating the policy in ordered parallell.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will Check Point support nested layers in the future? I think this is the way most engineers would expect the ordered layer should actually work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 14:55:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15918#M91010</guid>
      <dc:creator>Harald_Hansen</dc:creator>
      <dc:date>2018-11-13T14:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15919#M91011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you provide a concrete example of what you're trying to accomplish that you don't believe the current model supports?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 18:09:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15919#M91011</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-15T18:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15920#M91012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just a simple way of converting a MDS ruleset to SmartCenter is not supported. This would be the perfect way of using ordered layers if they were behaving in a way one would expect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Layer one&lt;/STRONG&gt; (Like MDS global ruleset above domain rules):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Firewall rules (like stealth rules)&lt;/LI&gt;&lt;LI&gt;Access to domain services etc&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Layer two&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Local ruleset for this policy&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Layer three&lt;/STRONG&gt; &lt;SPAN&gt;(Like MDS &lt;/SPAN&gt;&lt;SPAN&gt;g&lt;/SPAN&gt;&lt;SPAN&gt;lobal ruleset below&amp;nbsp;domain rules)&lt;/SPAN&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Global access rules&lt;/LI&gt;&lt;LI&gt;Global drop rules&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 18:54:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15920#M91012</guid>
      <dc:creator>Harald_Hansen</dc:creator>
      <dc:date>2018-11-15T18:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15921#M91013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To get to Layer 2, the packet must hit an Accept rule in Layer 1.&lt;/P&gt;&lt;P&gt;This can be an implicit rule, which can be configured on a per-layer basis.&lt;/P&gt;&lt;P&gt;Or, of course, it can hit an explicit accept rule.&lt;/P&gt;&lt;P&gt;Help me understand why this isn’t a workable solution?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 19:12:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15921#M91013</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-15T19:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15922#M91014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Because if you have a drop rule in the last policy the packet won't be accepted, even if it is accepted in a previous policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 19:16:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15922#M91014</guid>
      <dc:creator>Harald_Hansen</dc:creator>
      <dc:date>2018-11-15T19:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15923#M91015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this is now it currently works:&amp;nbsp;a packet must hit an accept rule in ALL ordered layers.&lt;/P&gt;&lt;P&gt;In the case of MDS Global rules, they are basically joined to the local ruleset, so it’s evaluated as one ruleset, not three.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 19:50:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15923#M91015</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-15T19:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15924#M91016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exactly. This is why we need nested layers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As it is I cannot use ordered layers to create smart and useful policies. I can understand why the design is as is, though &amp;nbsp;in the real world we need it the other way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To me, both inline and ordered layers have significant limitations that reduce the usability of either. I cry at the wasted opportunity.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 20:22:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15924#M91016</guid>
      <dc:creator>Harald_Hansen</dc:creator>
      <dc:date>2018-11-15T20:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15925#M91017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems to me you could achieve the desired result with Layer 3 in your example above by using an inline layer to represent it in Layer 2.&lt;/P&gt;&lt;P&gt;Specifically the last rule would have Source Any Destination Any as the last rule with action of Layer 3.&lt;/P&gt;&lt;P&gt;This would eliminate the problem of “must match an accept rule in Layer 3” as that layer would be entirely skipped If it matches any other rule in Layer 2.&lt;/P&gt;&lt;P&gt;Maybe less elegant than you’re thinking, but seems like it should achieve the desired result.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 00:43:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15925#M91017</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T00:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: Nested layers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15926#M91018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that's a good idea. I have experimented a bit with this regarding the stealth rules, but didn't think of using it for the entire policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 08:44:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Nested-layers/m-p/15926#M91018</guid>
      <dc:creator>Harald_Hansen</dc:creator>
      <dc:date>2018-11-16T08:44:44Z</dc:date>
    </item>
  </channel>
</rss>

