<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Properly defining the Internet within a security policy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10575#M99661</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2 style="color: #000000; background-color: #ffffff; border: 0px; font-weight: 600; font-size: 22px;"&gt;&lt;STRONG style="border: 0px; font-weight: bold; font-size: 22px;"&gt;Method 7:&amp;nbsp; Using Public IP Network Ranges&lt;/STRONG&gt;&lt;/H2&gt;&lt;P&gt;&lt;STRONG style="border: 0px; font-weight: bold; font-size: 22px;"&gt;Create 6 network address ranges listed below, these should cover all the routable IPv4 public space:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1.0.0.0 - 9.255.255.255&lt;/P&gt;&lt;P&gt;11.0.0.0 - 126.255.255.255&lt;/P&gt;&lt;P&gt;128.0.0.0 - 169.253.255.255&lt;/P&gt;&lt;P&gt;169.255.0.0 - 172.15.255.255&lt;/P&gt;&lt;P&gt;172.32.0.0 - 192.167.255.255&lt;/P&gt;&lt;P&gt;192.169.0.0 - 223.255.255.255&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Create a network group called Internet_IPv4 to include all of them.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Use&amp;nbsp;Internet_IPv4 instead of any for internet rules.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The ranges that have been excluded are listed below in red:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;10.0.0.0 - 10.255.255.255 Private-Use Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;127.0.0.0 - 127.255.255.255 Loopback&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;169.254.0.0 - 169.254.255.255 Link Local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;172.16.0.0 - 172.31.255.255 Private-Use Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red; font-size: 11.0pt;"&gt;192.168.0.0 - 192.168.255.255 Private-Use Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note: There are several reserved IP subnets in the 192.0.0.0 and 198.0.0.0 address blocks that are included in the ranges above, to simplify the ranges a bit. I'm not too worried about including them. If the IPs are not forward-able&amp;nbsp;the ISP will drop them.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A class="link-titled" href="https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml" title="https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml"&gt;IANA IPv4 Special-Purpose Address Registry&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Jul 2018 13:49:17 GMT</pubDate>
    <dc:creator>A_H</dc:creator>
    <dc:date>2018-07-10T13:49:17Z</dc:date>
    <item>
      <title>Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10561#M99647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;Let's discuss!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;There are various methods of &lt;STRONG&gt;defining the Internet&lt;/STRONG&gt; within your firewall security policy.&lt;/P&gt;&lt;P&gt;I've showcased the five most common methods in the screen shot below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="60864" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60864_pastedImage_1.png" style="width: 620px; height: 465px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;The proper firewall definition of the Internet depends on your needs!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;This discussion shall raise your awareness that it's required to evaluate your specific demand to avoid using &lt;EM&gt;* Any&lt;/EM&gt; or &lt;EM&gt;All_Internet&lt;/EM&gt; by default.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;Method 1:&lt;/STRONG&gt; Using the default &lt;STRONG&gt;* Any&lt;/STRONG&gt; definition&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;SPAN style="color: #008000;"&gt;Pro:&lt;/SPAN&gt; Allows for proper Security Policy verification checks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;SPAN style="color: #ff0000;"&gt;Con:&lt;/SPAN&gt; Any is &lt;SPAN style="text-decoration: underline;"&gt;not the Internet&lt;/SPAN&gt;. In an ideal security world, you shouldn't use * Any in any of your firewall rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;Method 2:&lt;/STRONG&gt; &lt;SPAN style="font-size: 15px;"&gt;Using the default&lt;/SPAN&gt; IP Address range: &lt;STRONG&gt;All_Internet&lt;/STRONG&gt; &lt;SPAN style="font-size: 15px;"&gt;(0.0.0.0-255.255.255.255)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Pro: &lt;/SPAN&gt;While Hide-NAT on "Any" source doesn't work, using All_Internet as the source &lt;A class="" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117085" rel="nofollow"&gt;will do the job.&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp; Con:&lt;/SPAN&gt; The &lt;A href="https://en.wikipedia.org/wiki/Internet"&gt;Internet&lt;/A&gt; consists of various networks, public, private and other ones. In a security environment you operate all kind of corporate networks, DMZs, VPNs, Remote Users, Office Modes and many more entities using IP addresses. From a firewall security point of view the Internet definition means everything that is not internally, branch office, Site-to-Site or Remote Access VPN connected. For a firewall the Internet is everything else, public, untrusted, external. A simple IP Address range object with the name All_Internet provokes many misunderstandings. A security reviewer, like me, would be happy that * Any was replaced with an object someone hopefully took care of properly defining what the Internet for that specific firewall implementation is. Only when looking deeper into the object it gets clear that this definition is even more worse than * Any because it might supersede the automatic validation checks Check Point does. Please see the Global Properties for Non Unique IP Adresses shown below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;Method 3:&lt;/STRONG&gt; Using a Group with Exclusion&lt;/SPAN&gt; (Any except all corp. networks, branch office networks, VPN encryption domains, office mode networks, RFC 1918 networks and so on)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Pro:&lt;/SPAN&gt; Easy to use and understandable for humans within normal firewall administration.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp; Con:&lt;/SPAN&gt; Groups with Exclusion are very complex for automatic firewall validation checks, hard to troubleshoot for humans, known to sometimes cause issues when used in VPN encryption domains and therefore have many limitations (&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk97246"&gt;sk97246&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk101506"&gt;sk101506&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk107543"&gt;sk107543&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk107417"&gt;sk107417&lt;/A&gt;, ..). Also, what is &lt;EM&gt;* Any&lt;/EM&gt; from a firewalls perspective? How does a firewall define &lt;EM&gt;* Any&lt;/EM&gt;? Are there exclusions from &lt;EM&gt;* Any&lt;/EM&gt;? For Services everyone knows that Check Point per default excludes X11 from &lt;EM&gt;Any&lt;/EM&gt;. How about Networks?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;Method 4:&lt;/STRONG&gt; Using the Application and URL Filtering object 'Internet'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Pro:&lt;/SPAN&gt; Only applies to traffic heading outside the corporate network - to the DMZ and external interfaces. The object distinguishes between internal and external addresses.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp; Con:&lt;/SPAN&gt; This is only the default destination for Application and URL Filtering rules so you can only use this object in the destination column of Application and URL Filtering enabled rules and layers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;Method 5:&lt;/STRONG&gt; Negating a group that contains all your networks&lt;/SPAN&gt; (similar to Method 3 without using a Group without Exclusion)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;Pro:&lt;/SPAN&gt; Perfect definition of the Internet for the firewall and all of its automatic verification and validation mechanisms. Simple negation of all networks that your firewall 'knows' not to be part of the public, untrusted, external Internet.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp; Con:&lt;/SPAN&gt; Harder to understand for humans, especially in security policies with advanced complexity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 22px;"&gt;&lt;STRONG&gt;Appendix:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;STRONG&gt;Menu &amp;gt; Global Properties &amp;gt; Non Unique IP Addresses&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="60865" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60865_pastedImage_2.png" style="width: 620px; height: 402px;" /&gt;&lt;/P&gt;&lt;P class=""&gt;In the above window you can see the non-unique IPv4 and IPv6 address ranges.&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;Security Management considers addresses that are routable on the Internet as unique, and private, non-routable addresses as being non-unique (duplicated). It is possible to add address ranges to the default list. There is normally no need to change the default addresses.&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG class=""&gt;This list is used by SmartDashboard to perform automatic validity checks on addresses.&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;IPv4 Addresses&lt;/P&gt;&lt;P class=""&gt;RFC 1918 documents private address spaces which may be used on internal networks that will not have hosts directly connected to the Internet. The Internet assigned Numbers authority (IANA) has set aside the following three blocks of IP addresses for internal (private) network use:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI class=""&gt;Class A network numbers: 10.0.0.0–10.255.255.255&lt;/LI&gt;&lt;LI class=""&gt;Class B network numbers: 172.16.0.0–172.31.255.255&lt;/LI&gt;&lt;LI class=""&gt;Class C network numbers: 192.168.0.0–192.168.255.255&lt;/LI&gt;&lt;/UL&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;In an intranet that uses private addresses, a Check Point Security Gateway NAT gateway is put in place to connect the intranet to the Internet and translate the private addresses, to routable addresses. The default list of non-unique addresses are the three ranges specified in RFC 1918.&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;IPv6 Addresses&lt;/P&gt;&lt;P class=""&gt;There are so many IPv6 public addresses that is not usually necessary to assign private IPv6 addresses for an internal network. There is a "Unique Unicast" IP range of fc00::/7 that can be used for private IPv6 addresses as specified in RFC4193.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 01:33:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10561#M99647</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-11-10T01:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10562#M99648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;for me most of the time negating group is one of the most reliable ad easy way to define internet , I personally dislike group with exclusion for maaaany reason &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; , by the way ther's a chance that we can use the defined internet (any exeternal and dmz ) in the firewall policy in the future?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nice post btw &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 09:03:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10562#M99648</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2017-11-10T09:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10563#M99649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These are the small things but can impact a lot.&lt;/P&gt;&lt;P&gt;Good Information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 10:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10563#M99649</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2017-11-10T10:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10564#M99650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am just negating a group with all "private" ipv4 ranges.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 12:46:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10564#M99650</guid>
      <dc:creator>Dor_Marcovitch</dc:creator>
      <dc:date>2017-11-10T12:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10565#M99651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is always how I've done it, as well!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 18:04:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10565#M99651</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2017-11-10T18:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10566#M99652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys, what are your thoughts about Check Point's out-of-the-box "Internet" object?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Nov 2017 06:44:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10566#M99652</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2017-11-12T06:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10567#M99653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd like to add one more method&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;&lt;STRONG&gt;Method 6:&amp;nbsp; Using Security Zones&lt;/STRONG&gt;&lt;/H2&gt;&lt;P&gt;(Ref:&amp;nbsp; SmartConsole R80.10 Help)&lt;/P&gt;&lt;P class="" style="font-family: 'Open Sans Light', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #333333; background-color: inherit; word-spacing: 0px; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 25px; margin: 6pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0px; width: auto; height: auto; white-space: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px;"&gt;Security Zones let you to create a strong Access Control Policy that controls the traffic between parts of the network.&lt;/P&gt;&lt;P class="" style="font-family: 'Open Sans Light', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #333333; background-color: inherit; word-spacing: 0px; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 25px; margin: 6pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0px; width: auto; height: auto; white-space: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px;"&gt;A Security Zone object represents a part of the network (for example, the internal network or the external network). You assign a network interface of a Security Gateway to a Security Zone. You can then use the Security Zone objects in the Source and Destination columns of the Rule Base.&lt;/P&gt;&lt;P class="" style="font-family: 'Open Sans Light', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #333333; background-color: inherit; word-spacing: 0px; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 25px; margin: 6pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0px; width: auto; height: auto; white-space: normal; orphans: 2; widows: 2; -webkit-text-stroke-width: 0px;"&gt;Use Security Zones to:&lt;/P&gt;&lt;UL class="" style="list-style: circle outside none; margin-top: 3pt; margin-bottom: 0pt; color: #333333; font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;LI class="" style="font-family: 'Open Sans Light', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 25px; margin: 3pt 0pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Simplify the Policy. Apply the same rule to many Gateways.&lt;/LI&gt;&lt;LI class="" style="font-family: 'Open Sans Light', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 25px; margin: 3pt 0pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Add networks to Gateways interfaces without changing the Rule Base.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workflow&lt;/P&gt;&lt;OL class="" style="list-style: decimal outside none; margin-top: 6pt; margin-bottom: 0pt; color: #333333; font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;LI class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;&lt;P&gt;Define Security Zone objects. Or, use predefined security zones (ie. ExternalZone, InternalZone, DMZZone, WirelessZone)&lt;A class="" href="https://sc1.checkpoint.com/documents/R80.10/SmartConsole_OLH/EN/TE5TdfvLDUAMRJmWiaUeKw2.htm#o125013" style="cursor: auto; color: #0026ff;" target="_self" title="Predefined Security Zones"&gt;&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Assign Gateway interfaces to Security Zones&lt;/LI&gt;&lt;LI class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0pt 0pt; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Use the Security Zone objects in the Source and Destination of a rule. For example:&lt;TABLE border="0" cellpadding="2" cellspacing="0" style="border-collapse: collapse;" width="634"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TH bgcolor="#515254" style="border-width: 1px; border-style: solid; border-color: #dddddd #dddddd #dddddd #010101;" width="120"&gt;&lt;P class="" style="font-family: Tahoma, verdana, arial, helvetica, sans-serif; font-size: 10pt; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: bold; color: #ffffff; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: normal; margin: 1pt -2pt 2pt; padding: 6pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Source&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#515254" style="border: 1px solid #dddddd;" width="120"&gt;&lt;P class="" style="font-family: Tahoma, verdana, arial, helvetica, sans-serif; font-size: 10pt; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: bold; color: #ffffff; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: normal; margin: 1pt -2pt 2pt; padding: 6pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Destination&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#515254" style="border: 1px solid #dddddd;" width="102"&gt;&lt;P class="" style="font-family: Tahoma, verdana, arial, helvetica, sans-serif; font-size: 10pt; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: bold; color: #ffffff; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: normal; margin: 1pt -2pt 2pt; padding: 6pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;VPN&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#515254" style="border: 1px solid #dddddd;" width="83"&gt;&lt;P class="" style="font-family: Tahoma, verdana, arial, helvetica, sans-serif; font-size: 10pt; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: bold; color: #ffffff; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: normal; margin: 1pt -2pt 2pt; padding: 6pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Service&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#515254" style="border-width: 1px; border-style: solid; border-color: #dddddd #010101 #dddddd #dddddd;" width="76"&gt;&lt;P class="" style="font-family: Tahoma, verdana, arial, helvetica, sans-serif; font-size: 10pt; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: bold; color: #ffffff; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: normal; margin: 1pt -2pt 2pt; padding: 6pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Action&lt;/P&gt;&lt;/TH&gt;&lt;TH style="border-width: 1px; border-style: solid; border-color: #ffffff #ffffff #ffffff #010101;" width="132"&gt;&lt;P class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0cm; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD style="border: 1px solid #010101;" width="120"&gt;&lt;P class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0cm; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;InternalZone&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #010101;" width="120"&gt;&lt;P class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0cm; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;ExternalZone&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #010101;" width="102"&gt;&lt;P class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0cm; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Any Traffic&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #010101;" width="83"&gt;&lt;P class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0cm; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Any&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #010101;" width="76"&gt;&lt;P class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0cm; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;Accept&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-width: 1px; border-style: solid; border-color: #ffffff #ffffff #ffffff #010101;" width="132"&gt;&lt;P class="" style="font-family: 'Open Sans', 'Segoe UI Light', 'Segoe UI', calibri, arial; font-size: 14px; display: block; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: normal; color: #000000; background-color: inherit; word-spacing: normal; letter-spacing: normal; vertical-align: baseline; text-decoration: none; text-transform: none; line-height: 16px; margin: 6pt 0cm; padding: 0pt; float: none; clear: none; text-align: left; text-indent: 0cm; width: auto; height: auto; white-space: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are screenshots from SmartConsole topology settings and an example of a policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60886_pastedImage_5.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60884_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And can be defined in the rule base.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60885_pastedImage_2.png" style="width: 909px; height: 61px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Nov 2017 16:21:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10567#M99653</guid>
      <dc:creator>grandpafirewall</dc:creator>
      <dc:date>2017-11-12T16:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10568#M99654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice Information. I think This applies to R80 only as lower than R80 version don't have zone concept.&lt;/P&gt;&lt;P&gt;This is good feature in R80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Nov 2017 11:10:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10568#M99654</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2017-11-13T11:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10569#M99655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Security Zones are definitely helpful, and their use does not appear to impact SecureXL acceleration, templating, or the new Column-based/Early Drop rule matching based on my research so far.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Nov 2017 13:17:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10569#M99655</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-13T13:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10570#M99656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 22px;"&gt;&lt;STRONG&gt;Addendum &lt;SPAN style="font-size: 15px;"&gt;- Services &amp;amp; Applications&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #e45785;"&gt;&lt;SPAN style="font-size: 22px;"&gt;How To Describe "Any Application"&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #e45785;"&gt;Matching unknown traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60904_pastedImage_1.png" style="width: 620px; height: 99px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60906_pastedImage_3.png" style="width: 620px; height: 73px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/60908_pastedImage_5.png" style="width: 620px; height: 260px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Nov 2017 01:35:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10570#M99656</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-11-14T01:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10571#M99657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually IPv6 makes it much simpler. 2000::/3 is a good starting point for Internet. If you want it more accurate you can exclude your local Public IPv6 range(s). Nothing much to it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Nov 2017 12:25:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10571#M99657</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-11-15T12:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10572#M99658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/6703"&gt;Tomer Sole&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I just found this thread when searching for information about the All_Internet object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you are asking about is the App control object 'Internet', yes? I like it and would like to be able to use it for the access control policy&amp;nbsp;instead of&amp;nbsp;using the &lt;EM&gt;negate&lt;/EM&gt; option like&amp;nbsp;I am currently doing. Luckily this seems to be the least bad option from the list in the OP. Reading the answers here it seems many others would like to have the Internet object available for access control as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2018 06:23:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10572#M99658</guid>
      <dc:creator>Ilmo_Anttonen</dc:creator>
      <dc:date>2018-04-10T06:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10573#M99659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately Check Point seems to have &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk124292"&gt;issues with Security Zones in R80.x&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2018 07:30:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10573#M99659</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-04-24T07:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10574#M99660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Danny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it really an issue if all you have to do is create a single rule with "External Zone" object and label it in a separate section "Do not delete, will cause policy installation failures!"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2018 18:33:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10574#M99660</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-24T18:33:36Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10575#M99661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2 style="color: #000000; background-color: #ffffff; border: 0px; font-weight: 600; font-size: 22px;"&gt;&lt;STRONG style="border: 0px; font-weight: bold; font-size: 22px;"&gt;Method 7:&amp;nbsp; Using Public IP Network Ranges&lt;/STRONG&gt;&lt;/H2&gt;&lt;P&gt;&lt;STRONG style="border: 0px; font-weight: bold; font-size: 22px;"&gt;Create 6 network address ranges listed below, these should cover all the routable IPv4 public space:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1.0.0.0 - 9.255.255.255&lt;/P&gt;&lt;P&gt;11.0.0.0 - 126.255.255.255&lt;/P&gt;&lt;P&gt;128.0.0.0 - 169.253.255.255&lt;/P&gt;&lt;P&gt;169.255.0.0 - 172.15.255.255&lt;/P&gt;&lt;P&gt;172.32.0.0 - 192.167.255.255&lt;/P&gt;&lt;P&gt;192.169.0.0 - 223.255.255.255&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Create a network group called Internet_IPv4 to include all of them.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Use&amp;nbsp;Internet_IPv4 instead of any for internet rules.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The ranges that have been excluded are listed below in red:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;10.0.0.0 - 10.255.255.255 Private-Use Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;127.0.0.0 - 127.255.255.255 Loopback&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;169.254.0.0 - 169.254.255.255 Link Local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red;"&gt;172.16.0.0 - 172.31.255.255 Private-Use Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: red; font-size: 11.0pt;"&gt;192.168.0.0 - 192.168.255.255 Private-Use Networks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note: There are several reserved IP subnets in the 192.0.0.0 and 198.0.0.0 address blocks that are included in the ranges above, to simplify the ranges a bit. I'm not too worried about including them. If the IPs are not forward-able&amp;nbsp;the ISP will drop them.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A class="link-titled" href="https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml" title="https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml"&gt;IANA IPv4 Special-Purpose Address Registry&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2018 13:49:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10575#M99661</guid>
      <dc:creator>A_H</dc:creator>
      <dc:date>2018-07-10T13:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10576#M99662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm surprised at all the ways you're trying to mask 'ANY'.&amp;nbsp; Depending on your topology, infrastructure, security posture (layered defense), and active blades, most of these solutions are still effectively 'ANY'.&amp;nbsp; Embrace it, accept it, secure it, and document it.&amp;nbsp; BTW, I'm only talking about 'ANY' as a source or destination, when related to the Internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 17:53:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10576#M99662</guid>
      <dc:creator>Shannon_Diotte</dc:creator>
      <dc:date>2018-07-12T17:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10577#M99663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm... "ANY" should be avoided whenever possible.&lt;/P&gt;&lt;P&gt;Please see this comment by &lt;A href="https://community.checkpoint.com/migrated-users/41625"&gt;Timothy Hall&lt;/A&gt;‌:&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="link-titled" href="https://community.checkpoint.com/message/18334-re-securexl-is-enabled-but-the-traffic-is-not-accelerated?commentID=18334#comment-18334" title="https://community.checkpoint.com/message/18334-re-securexl-is-enabled-but-the-traffic-is-not-accelerated?commentID=18334#comment-18334"&gt;https://community.checkpoint.com/message/18334-re-securexl-is-enabled-but-the-traffic-is-not-accelerated?commentID=18334…&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2018 13:23:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10577#M99663</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-07-13T13:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10578#M99664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In most all cases, I agree the use of ANY is prohibited.&amp;nbsp; In these "Internet" cases, I'll agree if you can show me the value of&amp;nbsp;replacing ANY with a&amp;nbsp;negated or excluded internal networks object.&amp;nbsp; Or replacing ANY with all applicable IP ranges that represent the Internet.&amp;nbsp; In most common topologies that have a dedicated "Internet" firewall, you would never see your internal networks as an Internet source or destination.&amp;nbsp; You can mask ANY with some of these methods, and it can be debated that you've provided additional security by explicitly defining the Internet as a whole, but the effective outcome is still ANY.&amp;nbsp; To me,&amp;nbsp;the danger is in&amp;nbsp;providing a false sense of security to those that don't fully understand this concept.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally, I accept ANY in these instances (related to Internet only), and ensure that there's a documented process to manage and mitigate the associated risk with using ANY.&amp;nbsp; This includes, but isn't limited to, periodic reviews for continued use of ANY, requirements for additional security measures when using ANY, and management understanding and approval to use ANY.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2018 14:00:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10578#M99664</guid>
      <dc:creator>Shannon_Diotte</dc:creator>
      <dc:date>2018-07-13T14:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10579#M99665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it would only affected security aspects of access control, I'd agree with you. The problem with "Any" is the impact on performance of the gateways, as per post referenced earlier as well as inclusion of RFC 1918 ranges in it.&lt;/P&gt;&lt;P&gt;I have seen too many environments with Anti-Spoofing disabled to be comfortable with it.&lt;/P&gt;&lt;P&gt;My personal preference is to use "All Internet" object available with URLF and Application Control blades or the "External" zone object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do use "Any" extensively, I'd check the SecureXL status on the gateways to see how the acceleration is being affected. Your environment may very well perform nominally, if hardware specks are way higher than could've been otherwise.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2018 15:40:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10579#M99665</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-07-13T15:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: Properly defining the Internet within a security policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10580#M99666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On other firewall brands&amp;nbsp;I have used in the past, using "Any" was not affecting the performance. I know "Any" sounds bad, but there are things one want to be accessible from&amp;nbsp;any IP, for example&amp;nbsp;a web public server located in DMZ, behind the firewall. You want all the Internet IPs and private internal IPs to reach that Web server.&lt;/P&gt;&lt;P&gt;Another example is cloud services that cannot be properly handled by a DNS rule, due to the fact that the IPs change all the time and when the firewall checks, the IP is already different.&lt;/P&gt;&lt;P&gt;Even the Stealth and Cleanup rule has "Any" in it. As bad as it sounds "Any" might be a necessary evil.&lt;/P&gt;&lt;P&gt;For performance reasons I try to avoid "Any" and I was able to replace it with&amp;nbsp;Internet_IPv4 when I have no choice like inbound traffic to a public web server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2018 16:01:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Properly-defining-the-Internet-within-a-security-policy/m-p/10580#M99666</guid>
      <dc:creator>A_H</dc:creator>
      <dc:date>2018-07-13T16:01:42Z</dc:date>
    </item>
  </channel>
</rss>

