<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: About Global properties in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117483#M21884</link>
    <description>&lt;P&gt;Don't believe enabling via implied rules is strictly necessary.&lt;BR /&gt;ICMP would need to be allowed prior to your stealth rule, yes.&lt;/P&gt;</description>
    <pubDate>Mon, 03 May 2021 02:11:11 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-05-03T02:11:11Z</dc:date>
    <item>
      <title>About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19775#M3662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please help us the working of Accept Domain name over UDP (queries) and Accept Domain Name over TCP (Zone transfer) in the global properties. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we enable what it exactly does.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vengatesh SR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2018 11:58:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19775#M3662</guid>
      <dc:creator>Vengatesh_SR</dc:creator>
      <dc:date>2018-12-27T11:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19776#M3663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/57505"&gt;Vengatesh SR&lt;/A&gt;‌,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This option will enabled DNS queries on UDP/53 and DNS zone transfer over TCP/53 using a implicit rule. In other words, it not necessary create a rule on rulebase to accept dns traffic if this option is enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alisson Lima&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2018 12:45:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19776#M3663</guid>
      <dc:creator>Alisson_Lima</dc:creator>
      <dc:date>2018-12-27T12:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19777#M3664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes we can see the implicit rule created if we enable the Accept Domain name over UDP (queries) and Accept Domain Name over TCP (Zone transfer). We have already enabled it in our production device. We need to know if we can disable it now we will get any impact or not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also wanted to know what it exactly does if we kept enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2018 12:49:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19777#M3664</guid>
      <dc:creator>Vengatesh_SR</dc:creator>
      <dc:date>2018-12-27T12:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19778#M3665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you disable these global properties, then DNS lookups and zone transfers through the firewall will be blocked unless it is permitted by a different rule.&lt;/P&gt;&lt;P&gt;If you don't know if these things are happening through the he Security Gateway, then I recommend logging Implied Rules for a time before deciding to disable these properties.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76626_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2018 23:02:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/19778#M3665</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-12-27T23:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117167#M21811</link>
      <description>&lt;P&gt;What is best practice , shold we enable accept ICMP request in implied rules?&lt;/P&gt;&lt;P&gt;if firewall interface is gateway for vlan and server in that vlan required to ping gateway interface what other solution? should we allow before stealth rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 13:26:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117167#M21811</guid>
      <dc:creator>pankajagr83</dc:creator>
      <dc:date>2021-04-28T13:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117483#M21884</link>
      <description>&lt;P&gt;Don't believe enabling via implied rules is strictly necessary.&lt;BR /&gt;ICMP would need to be allowed prior to your stealth rule, yes.&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 02:11:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117483#M21884</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-05-03T02:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117485#M21885</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/698"&gt;@Alisson_Lima&lt;/a&gt;&amp;nbsp;is 100% correct. In simple words, anything you enable in that section would allow connection on implied rule, so you dont have to create specific policy based rules for it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From R80 smart console guide, you can also click on help section and read it there as well. Hope that helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL class="listbullet"&gt;
&lt;LI class="listbullet"&gt;&lt;STRONG class="menuoptions"&gt;First&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Applied first, before all other rules in the Rule Base - explicit or implied&lt;/LI&gt;
&lt;LI class="listbullet"&gt;&lt;STRONG class="menuoptions"&gt;Last&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Applied last, after all other rules in the Rule Base - explicit or implied, but before the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="menuoptions"&gt;Implicit Cleanup Rule&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI class="listbullet"&gt;&lt;STRONG class="menuoptions"&gt;Before Last&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Applied before the last explicit rule in the Rule Base&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 03 May 2021 02:22:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117485#M21885</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-05-03T02:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117554#M21897</link>
      <description>&lt;P&gt;Dameon brings up a good point here, and this is a topic I cover in the CCSA classes that I teach.&amp;nbsp; &amp;nbsp;The stealth rule should always be one of the first rules in your Network/Firewall policy layer, but what kind of rules need to appear prior to the stealth rule?&amp;nbsp; The main ones are:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Administrative Access Rules&lt;/STRONG&gt; - Allowing SSH/HTTPS/4434 from trusted internal hosts/networks to the firewall itself for purposes of management via the Gaia Web interface and clish/expert mode.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ping/Traceroute&lt;/STRONG&gt; - If you want the firewall to answer pings sent directly to one of its interfaces and/or show up as a visible hop in a traceroute, you'll need a rule allowing it.&amp;nbsp; Generally I don't have a problem with the firewall responding to pings/traceroutes sent from an internal reasonably-trusted network, but definitely not for the Internet.&amp;nbsp; Note that including the traceroute service in a rule used to halt SecureXL Accept Templating from that point (i.e. "acceleration disabled from rule #X"), but this limitation was lifted in gateway code version R80.10.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;SNMP/NMS Polling&lt;/STRONG&gt; - If you have a Network Management Station (NMS) initiating SNMP polls to the firewall, you'll need an explicit rule allowing it.&amp;nbsp; Notice that it is possible to only allow the NMS to perform SNMP reads by utilizing the special service snmp-read, which would be considered best practices unless the NMS is performing SNMP set operations which is not too likely.&amp;nbsp; Netflow and external authentication connections such as RADIUS/TACACS initiated by the firewall itself will be allowed by default (implied rule "Accept outgoing packets from gateway") unless you explicitly block it.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;DHCP Server/Relay&lt;/STRONG&gt; - If the firewall is performing DHCP Relay or acting as a DHCP server, the rules permitting this traffic must appear prior to the stealth rule.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;There are a few other corner-case rules that have to appear prior to the Stealth Rule (VRRP multicast advertisements, legacy Client Authentication, SecureRemote Topology Downloads, etc.) but these are the big ones.&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 13:38:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/117554#M21897</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-05-03T13:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: About Global properties</title>
      <link>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/135136#M24196</link>
      <description>&lt;P&gt;Hi! Could you help me please, i need to watch Global Properties in cli, how can i get this?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Nov 2021 09:37:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/About-Global-properties/m-p/135136#M24196</guid>
      <dc:creator>Fincher</dc:creator>
      <dc:date>2021-11-29T09:37:28Z</dc:date>
    </item>
  </channel>
</rss>

