<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Top human fails to avoid in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8736#M1080</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe a list of anti-best practices? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 02 Mar 2019 03:15:25 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-03-02T03:15:25Z</dc:date>
    <item>
      <title>Top human fails to avoid</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8735#M1079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's a long time since I've thinking in this topic. After years working with Check Point products, inside and outside Check Point, I see repeatedly the same several mistakes. I'm aware that this topic is not very 'corporate', but I still think it would be good to compile a list of typical fails when deploying or managing Check Point devices, in order for people to be careful with not falling into the same ones!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm specially referring to mistakes that are basic, easy to avoid, but with usually very bad consequences. Another TOP list &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;So here you are several epic fails deserving of the following gif:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Resultado de imagen de orson welles gif" height="168" src="https://media.giphy.com/media/5hHOBKJ8lw9OM/giphy.gif" width="218" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't try this at home!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(without any specific order):&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Deploying a new VSX Gateway and forget to change the number of CoreXL instances per VS.&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This is typical from people who doesn't know VSX. If you're migrating to VSX, or just deploying a new cluster, and you're also using some Software Blades, each VS will need enough CPU power to process the traffic. Of course, it will depend on the amount of traffic, level of inspection and amount of accelerated traffic.&lt;/P&gt;&lt;P&gt;This fail is also curious because during the maintenance window everything usually works, but the next morning, when the load of traffic is high, everything goes wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Deploying a new VSX Gateway and forget to change the default limit of the maximum concurrent connections.&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Pretty similar to the previous fail, this time affecting to the amount of the concurrent connections a VS can manage. Remember&amp;nbsp;that you need to specify these kind of things for telling the VS the amount of resources it has.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Threat Prevention policy with a "Any Any ... Any" inspecting everything.&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;This is something that is difficult to do with many other firewalls, where you have to manually assign a profile per access control rule. Think in an environment with a thousand of rules for instance.&lt;/P&gt;&lt;P&gt;However, we have an access control policy and a threat prevention policy, allowing to easy separately manage these two different things. The drawback is that someone may just enable the Threat Prevention Blades (IPS, AV, AB, TE, TX) to all the traffic, regardless if it makes sense or not.&lt;/P&gt;&lt;P&gt;Have in mind that a Security Gateway may be located in the datacenter network, internal access network, external perimeter, front-end, cloud... everything in one place, a combination of them... Think in your main traffic flows and how you want to protect them. Then, you can build a simple Threat Prevention policy, enabling the Blades that it makes sense to enable in each one and, of course, you don't need to go over each of your access control rules to do it &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be continued... &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 16:14:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8735#M1079</guid>
      <dc:creator>Victor_MR</dc:creator>
      <dc:date>2019-03-01T16:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Top human fails to avoid</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8736#M1080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe a list of anti-best practices? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Mar 2019 03:15:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8736#M1080</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-02T03:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: Top human fails to avoid</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8737#M1081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From an operational point of view...running kernel debugs outside of a maintenance window.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Mar 2019 15:07:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8737#M1081</guid>
      <dc:creator>Mark_Mitchell</dc:creator>
      <dc:date>2019-03-02T15:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Top human fails to avoid</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8738#M1082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Doing exactly what TAC asks you to do while debugging.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When you need to check on a specific problem on a highly loaded gateway and the only time you can do some troubleshooting is during business hours and TAC asks you to run 'fw monitor -o debug.pcap' and you just type it in without any filtering. A sure thing to get your gateway to it's knees.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Mar 2019 19:19:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8738#M1082</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-03-02T19:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: Top human fails to avoid</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8739#M1083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/43758"&gt;Victor&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're talking to me from the sele:-)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most problems are caused by configuration errors or default settings that are not adjusted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also find more information about the topics ans performance tuning&amp;nbsp; here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041"&gt;R80.x Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3073"&gt;R80.x Security Gateway Architecture (Content Inspection)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_PerformanceTuning_AdminGuide/html_frameset.htm" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_PerformanceTuning_AdminGuide/html_frameset.htm"&gt;Performance Tuning R80.20 Administration Guide&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_PerformanceTuning_AdminGuide/html_frameset.htm" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_PerformanceTuning_AdminGuide/html_frameset.htm"&gt;Performance Tuning R80.10 (Part of Check Point Infinity)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Mar 2019 06:54:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8739#M1083</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-03-03T06:54:27Z</dc:date>
    </item>
    <item>
      <title>Re: Top human fails to avoid</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8740#M1084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;Danny&lt;/A&gt;&amp;nbsp;had also wrote an article about the top 10 config mistakes:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/5575"&gt;Check Point configuration mistakes - Top 10&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe we can write an article in the&amp;nbsp;&lt;A href="https://community.checkpoint.com/thread/9695"&gt;Check Point for Beginners&lt;/A&gt;&amp;nbsp;section, which describes the typical issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Mar 2019 08:36:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Top-human-fails-to-avoid/m-p/8740#M1084</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-03-03T08:36:35Z</dc:date>
    </item>
  </channel>
</rss>

