<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Time based rules and resetting connections that are active once the time based rule ends in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Time-based-rules-and-resetting-connections-that-are-active-once/m-p/113949#M21333</link>
    <description>&lt;P&gt;We only check the time component when the connection is established.&lt;BR /&gt;Its not something we check on an ongoing basis.&lt;/P&gt;
&lt;P&gt;An “easy” way to do this would be an RFE.&lt;BR /&gt;That said, with a little scripting, you could probably achieve what you’re after.&lt;BR /&gt;Ultimately, you can kill in-progress connections with fw sam, sam erdos, or similar using a cron &amp;nbsp;job.&lt;BR /&gt;I believe you can just kill all ssh connections to the Internet with a single command, the exact nature of which depends on where the gateway sits in the network (it has to be done by IP).&lt;/P&gt;</description>
    <pubDate>Thu, 18 Mar 2021 14:30:35 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-03-18T14:30:35Z</dc:date>
    <item>
      <title>Time based rules and resetting connections that are active once the time based rule ends</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Time-based-rules-and-resetting-connections-that-are-active-once/m-p/113941#M21332</link>
      <description>&lt;P&gt;We have a requirement to allow outbound SSH access, but only at certain times of the day as part of a new solution to be implemented.&lt;/P&gt;&lt;P&gt;From my understanding we can create a time based rule to allow this, and during this time frame new SSH connections would be allowed as per the rule.And not outside of the allowed timeframe.&lt;/P&gt;&lt;P&gt;However the connection would not torn down&amp;nbsp; that had already been established that matched this rule during the time it was active once the rule was past it's time to allow the traffic?&lt;/P&gt;&lt;P&gt;Is there a simple way to achive this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Andy.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 13:32:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Time-based-rules-and-resetting-connections-that-are-active-once/m-p/113941#M21332</guid>
      <dc:creator>Andrew_Tindall</dc:creator>
      <dc:date>2021-03-18T13:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Time based rules and resetting connections that are active once the time based rule ends</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Time-based-rules-and-resetting-connections-that-are-active-once/m-p/113949#M21333</link>
      <description>&lt;P&gt;We only check the time component when the connection is established.&lt;BR /&gt;Its not something we check on an ongoing basis.&lt;/P&gt;
&lt;P&gt;An “easy” way to do this would be an RFE.&lt;BR /&gt;That said, with a little scripting, you could probably achieve what you’re after.&lt;BR /&gt;Ultimately, you can kill in-progress connections with fw sam, sam erdos, or similar using a cron &amp;nbsp;job.&lt;BR /&gt;I believe you can just kill all ssh connections to the Internet with a single command, the exact nature of which depends on where the gateway sits in the network (it has to be done by IP).&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 14:30:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Time-based-rules-and-resetting-connections-that-are-active-once/m-p/113949#M21333</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-18T14:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Time based rules and resetting connections that are active once the time based rule ends</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Time-based-rules-and-resetting-connections-that-are-active-once/m-p/113971#M21335</link>
      <description>&lt;P&gt;Assuming you have Connection Persistence set to "Rematch all connections", I suppose you could execute a &lt;STRONG&gt;fw fetchlocal&lt;/STRONG&gt; on the gateway via cron right at the start of the timeframe where SSH is no longer allowed.&amp;nbsp; This will invoke a rematch operation, which I believe will close the expired SSH connections.&amp;nbsp; There does not seem to be a way to kick off only a rematch operation without doing a full policy reinstall that I can find.&amp;nbsp; For more info about the rematch operation see Scenario 1 here:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103598&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_blank"&gt;sk103598: Connectivity Issues after Policy Install&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 16:04:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Time-based-rules-and-resetting-connections-that-are-active-once/m-p/113971#M21335</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-03-18T16:04:55Z</dc:date>
    </item>
  </channel>
</rss>

