<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stealth Rule in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Stealth-Rule/m-p/13311#M2227</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, typically prior to the Stealth Rule you'll have rules such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Admin. Access - SSH/HTTPS/4434 to the firewall from trusted internal hosts/subnets&lt;/P&gt;&lt;P&gt;2) Ping/Traceroute - Can internal hosts ping the firewall itself, and will the firewall hop show up in traceroute path or "star out"&lt;/P&gt;&lt;P&gt;3) SNMP Monitoring traffic from an NMS to the firewall itself&lt;/P&gt;&lt;P&gt;4) dhcp-request/dhcp-reply/DHCP relay services if needed&lt;/P&gt;&lt;P&gt;5) Allow for Dynamic Routing Protocols &amp;amp; VRRP if firewall is configured for those&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some other corner cases (Legacy Client Auth, old versions of SecuRemote and such), but generally these are the only rules you should have in front of the Stealth rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Nov 2017 14:36:08 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2017-11-23T14:36:08Z</dc:date>
    <item>
      <title>Stealth Rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Stealth-Rule/m-p/13310#M2226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checkmates,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be this question is bit stupid, But i want to know if stealth rule implemented like this we don't have access to firewalls (like ssh) right ?&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61057_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 06:45:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Stealth-Rule/m-p/13310#M2226</guid>
      <dc:creator>Prashan_Attanay</dc:creator>
      <dc:date>2017-11-23T06:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Stealth Rule</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Stealth-Rule/m-p/13311#M2227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, typically prior to the Stealth Rule you'll have rules such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Admin. Access - SSH/HTTPS/4434 to the firewall from trusted internal hosts/subnets&lt;/P&gt;&lt;P&gt;2) Ping/Traceroute - Can internal hosts ping the firewall itself, and will the firewall hop show up in traceroute path or "star out"&lt;/P&gt;&lt;P&gt;3) SNMP Monitoring traffic from an NMS to the firewall itself&lt;/P&gt;&lt;P&gt;4) dhcp-request/dhcp-reply/DHCP relay services if needed&lt;/P&gt;&lt;P&gt;5) Allow for Dynamic Routing Protocols &amp;amp; VRRP if firewall is configured for those&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some other corner cases (Legacy Client Auth, old versions of SecuRemote and such), but generally these are the only rules you should have in front of the Stealth rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2017 14:36:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Stealth-Rule/m-p/13311#M2227</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-23T14:36:08Z</dc:date>
    </item>
  </channel>
</rss>

