<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic White Paper - Security Zones in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/53415#M10641</link>
    <description>&lt;H3&gt;Author&lt;/H3&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2943"&gt;@Jesse_Ybarra&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Abstract:&lt;/H3&gt;
&lt;P&gt;As security technologies grow more complex the administrator has many tools at his or her disposal to regulate and enforce traffic in firewall devices. While security zones are not new tools, an individual may underutilise the objects in daily activities. This paper attempts to explain what a security zone function in a firewall and how it applies to modern security techniques. The key benefits to a security zone is tight control of traffic and routing functions while maintaining&amp;nbsp;simplified control.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the full list of White Papers, &lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603" target="_blank"&gt;go here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jul 2019 12:58:20 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2019-07-08T12:58:20Z</dc:date>
    <item>
      <title>White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/53415#M10641</link>
      <description>&lt;H3&gt;Author&lt;/H3&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2943"&gt;@Jesse_Ybarra&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Abstract:&lt;/H3&gt;
&lt;P&gt;As security technologies grow more complex the administrator has many tools at his or her disposal to regulate and enforce traffic in firewall devices. While security zones are not new tools, an individual may underutilise the objects in daily activities. This paper attempts to explain what a security zone function in a firewall and how it applies to modern security techniques. The key benefits to a security zone is tight control of traffic and routing functions while maintaining&amp;nbsp;simplified control.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the full list of White Papers, &lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603" target="_blank"&gt;go here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 12:58:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/53415#M10641</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-07-08T12:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/74066#M15047</link>
      <description>Could you help me to confirm whether R77.20.87 version of SMB 1450 Appliances support Security Zones via Centralized Management  of SMC ?</description>
      <pubDate>Tue, 04 Feb 2020 03:41:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/74066#M15047</guid>
      <dc:creator>Lei_Liu</dc:creator>
      <dc:date>2020-02-04T03:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/74074#M15048</link>
      <description>As long as you can define zone oninterface within Topology on gateway object, then most likely yes..</description>
      <pubDate>Tue, 04 Feb 2020 05:21:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/74074#M15048</guid>
      <dc:creator>Martin_Valenta</dc:creator>
      <dc:date>2020-02-04T05:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/74090#M15051</link>
      <description>&lt;P&gt;We find in the new features list of R80.10:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Security Zones&lt;/STRONG&gt;: Group interfaces of gateways into Security Zones for new Source and Destination definitions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;sk10538 Check Point R77.20.xx for 600 / 700 / 1100 / 1200R / 1400 / 910 Appliance Features and Known Limitations only mentions Security Zones 2 times:&lt;/P&gt;
&lt;TABLE id="limitations-Table" class="footnote" border="1" width="100%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="11.073825503355707%"&gt;SMB-5608&lt;/TD&gt;
&lt;TD width="88.81431767337807%"&gt;Policy installation fails on a centrally manged environment with more than 255 interfaces (in total) whose "security zone" is not set to "none" (ex: internal,external, etc.).
&lt;UL&gt;
&lt;LI&gt;Workaround: If there are no policy rules that use these security zones, change their configuration to "&lt;EM&gt;none&lt;/EM&gt;" (in the Gateway properties -&amp;gt; Topology tab).&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE id="limitations-Table" class="footnote" border="1" width="100%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;01132456&lt;/TD&gt;
&lt;TD&gt;Assigning Security Zones to interfaces on a SmartProvisioning profile is not supported.&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But in&amp;nbsp; sk159772 Check Point R80.20 for 1500 Appliances Features and Known Limitations we read:&lt;/P&gt;
&lt;TABLE id="lim-Table" class="footnote" border="1" width="90%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR class="SubTitle" bgcolor="#d6dff0"&gt;
&lt;TD width="30%"&gt;Blade / Feature&lt;/TD&gt;
&lt;TD width="8%"&gt;Locally &lt;BR /&gt;managed&lt;/TD&gt;
&lt;TD width="8%"&gt;Centrally&lt;BR /&gt;managed&lt;/TD&gt;
&lt;TD width="32%"&gt;Comments&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="SubTitle" bgcolor="#33ccff"&gt;
&lt;TD colspan="4"&gt;Unified Access&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE id="lim-Table" class="footnote" border="1" width="90%" cellspacing="2" cellpadding="4"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="36.645962732919244%"&gt;Security Zones&lt;/TD&gt;
&lt;TD width="11.925465838509325%"&gt;Yes&lt;/TD&gt;
&lt;TD width="11.5527950310559%"&gt;Yes&lt;/TD&gt;
&lt;TD width="39.62732919254658%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR class="SubTitle" bgcolor="#33ccff"&gt;
&lt;TD colspan="4" width="99.75155279503105%"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It still is not explicitly stated, but&amp;nbsp;sk133252&amp;nbsp;Rules mismatch on appliance cluster when manually configured Security Zones object used tells us at least that&amp;nbsp;Security Zones are supported with&amp;nbsp;&lt;SPAN&gt;1400, 1100, 1200R units.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;But for which purpose are they supported ? I would suspect for topology definition to do address anti-spoofing. Centrally managed SMB units had their topology imported into&amp;nbsp;&lt;/SPAN&gt;Dashboard, where it could not be edited.&lt;/P&gt;
&lt;P&gt;So i would assume that R80.10 Security Zones are fully supported by&amp;nbsp;Check Point R80.20 for 1500 Appliances at least...&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 09:29:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/74090#M15051</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-02-04T09:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/89792#M17996</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Is there any limitation how many security zones can be created? I cannot find this information in guides and DS (R80.20 - R80.40)?&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;MariuszT&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 11:48:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/89792#M17996</guid>
      <dc:creator>MariuszT</dc:creator>
      <dc:date>2020-06-25T11:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/89808#M17997</link>
      <description>&lt;P&gt;No limitations&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 14:29:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/89808#M17997</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-06-25T14:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/147808#M25834</link>
      <description>&lt;P&gt;Is there any document to prove that?&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 08:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/147808#M25834</guid>
      <dc:creator>ducluongtrann</dc:creator>
      <dc:date>2022-05-04T08:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: White Paper - Security Zones</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/147827#M25839</link>
      <description>&lt;P&gt;It is really hard to prove a negative. You realise that, right? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;No limitations, unless there is a document stating there is a limitation for amount of security zones. Yet, to the best of my knowledge, it does not exist.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are, however, other limitations, mentioned in&amp;nbsp;&lt;SPAN&gt;sk128572.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 12:08:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/147827#M25839</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-05-04T12:08:09Z</dc:date>
    </item>
  </channel>
</rss>

