<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practices for outbound Internet access for servers behind internal firewalls in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132953#M23978</link>
    <description>&lt;OL&gt;
&lt;LI&gt;For load, it probably doesn't matter too much. Your environment sounds similar to mine, and I prefer to apply URL filtering and so on at the outermost perimeter because it gives me one consistent place to check when there are certain classes of problem. Human time is a vastly more expensive resource than processor time.&lt;/LI&gt;
&lt;LI&gt;FQDN objects present negligible load in general. I'm not sure about updatable objects.&lt;/LI&gt;
&lt;LI&gt;I personally think zones are a fantastic way to shoot yourself in the foot. I prefer to do everything by IP (or FQDN, which is ultimately by IP), so no matter how it arrives at the firewall, it gets the same treatment.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;In my environment, I have a core transit per datacenter with a bunch of firewalls hanging off of it. There are interior firewalls which own networks servers live on, then there are transit firewalls which sit between the core transit and other things (for example, one transit firewall per Internet connection, one per WAN link category [to my other datacenters, to customers, to vendors, etc.], etc.). This allows the rules on any given interior firewall to be written for arbitrary clients to reach the services provided by that application. The transit firewalls then have all the rules relevant to their connection.&amp;nbsp;I find this really simplifies plotting out the A-to-B path between endpoints, which simplifies making changes and troubleshooting when things break.&lt;/P&gt;
&lt;P&gt;The doctrine of blocking things as close to the source as possible only really matters in extremely resource-constrained environments. Computers are fast, and networks are no longer as enormously oversubscribed. With the exception of rare edge cases like a firewall on the ISS, you can afford to block stuff where it makes your life easiest as opposed to where it makes the computer's life easiest.&lt;/P&gt;</description>
    <pubDate>Sun, 31 Oct 2021 18:08:30 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2021-10-31T18:08:30Z</dc:date>
    <item>
      <title>Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132823#M23970</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have external firewalls that are connected to the Internet and several internal firewalls, both security gateways and virtual systems on VSX.&lt;/P&gt;&lt;P&gt;Many servers behind the internal firewalls need restricted access to the Internet. We would like to optimise the use of resources and licenses in order to get the best value for money and I have some questions regarding this:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is it preferable to only perform URL filtering and anti-bot on the external firewall to reduce load on the internal firewalls?&lt;/LI&gt;&lt;LI&gt;Should domain objects and updatable objects ideally also be defined only on the external firewalls or is the extra load caused by these objects on the internal firewalls neglectable?&lt;/LI&gt;&lt;LI&gt;Should we use a dedicated external interface on the internal firewalls and use "ExternalZone" as destination to allow the required traffic from internal servers or is there a better way?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;BR /&gt;It would be great to hear how those of you with a similar architecture do this. Please note that we prefer using proxy servers (sitting between the internal and external firewalls) for outbound Internet access, but this is not possible for all services.&lt;/P&gt;&lt;P&gt;We are currently running R80.40 on management and R80.20 on the security gateways and VSX.&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 15:12:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132823#M23970</guid>
      <dc:creator>net-harry</dc:creator>
      <dc:date>2021-10-28T15:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132916#M23976</link>
      <description>&lt;P&gt;It depends on all of these things.&lt;BR /&gt;If your internal gateways don't have Internet access themselves, you really can't use Updatable Objects or URLF/Anti-Bot.&lt;/P&gt;
&lt;P&gt;Domain Objects do need to have access to a DNS server that can resolve to the Internet.&lt;BR /&gt;Likewise, Updatable Objects need access to the Internet.&lt;BR /&gt;Load for either of these things should be minimal.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Oct 2021 23:26:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132916#M23976</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-10-30T23:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132929#M23977</link>
      <description>&lt;P&gt;Thank you very much &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;for your feedback!&lt;/P&gt;&lt;P&gt;The reason why I ask is that we are considering to use only the NGFW bundle on the internal firewalls and use the NGTP (or NGTX) bundle on the external firewalls.&lt;/P&gt;&lt;P&gt;If I understand correctly using domain objects and updatable objects on the internal firewalls will not increase CPU load much. Could you please confirm if the same is true for custom applications/sites? My understanding is that this feature is included with Application Control (included in NGFW bundle).&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 12:14:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132929#M23977</guid>
      <dc:creator>net-harry</dc:creator>
      <dc:date>2021-10-31T12:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132953#M23978</link>
      <description>&lt;OL&gt;
&lt;LI&gt;For load, it probably doesn't matter too much. Your environment sounds similar to mine, and I prefer to apply URL filtering and so on at the outermost perimeter because it gives me one consistent place to check when there are certain classes of problem. Human time is a vastly more expensive resource than processor time.&lt;/LI&gt;
&lt;LI&gt;FQDN objects present negligible load in general. I'm not sure about updatable objects.&lt;/LI&gt;
&lt;LI&gt;I personally think zones are a fantastic way to shoot yourself in the foot. I prefer to do everything by IP (or FQDN, which is ultimately by IP), so no matter how it arrives at the firewall, it gets the same treatment.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;In my environment, I have a core transit per datacenter with a bunch of firewalls hanging off of it. There are interior firewalls which own networks servers live on, then there are transit firewalls which sit between the core transit and other things (for example, one transit firewall per Internet connection, one per WAN link category [to my other datacenters, to customers, to vendors, etc.], etc.). This allows the rules on any given interior firewall to be written for arbitrary clients to reach the services provided by that application. The transit firewalls then have all the rules relevant to their connection.&amp;nbsp;I find this really simplifies plotting out the A-to-B path between endpoints, which simplifies making changes and troubleshooting when things break.&lt;/P&gt;
&lt;P&gt;The doctrine of blocking things as close to the source as possible only really matters in extremely resource-constrained environments. Computers are fast, and networks are no longer as enormously oversubscribed. With the exception of rare edge cases like a firewall on the ISS, you can afford to block stuff where it makes your life easiest as opposed to where it makes the computer's life easiest.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 18:08:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132953#M23978</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-10-31T18:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132959#M23979</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;I know NGTP bundle include Application Control, URL Filtering, IPS, Antivirus, Anti-Bot and Email Security; what does NGFW bundle include? Is it not IPS just basic&amp;nbsp;layer 3 firewall?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 20:22:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132959#M23979</guid>
      <dc:creator>Cyber_Serge</dc:creator>
      <dc:date>2021-10-31T20:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132963#M23980</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25334"&gt;@Cyber_Serge&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;NGFW includes Firewall, Identity Awareness, IPsec VPN, Advanced Networking &amp;amp; Clustering, Mobile Access, IPS, Application Control and Content Awareness according to the following:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.checkpoint.com/downloads/products/check-point-appliance-comparison-chart.pdf" target="_blank"&gt;https://www.checkpoint.com/downloads/products/check-point-appliance-comparison-chart.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 20:59:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132963#M23980</guid>
      <dc:creator>net-harry</dc:creator>
      <dc:date>2021-10-31T20:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132964#M23981</link>
      <description>&lt;P&gt;Thank you very much&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;for your feedback!&lt;/P&gt;&lt;P&gt;If I understand correctly you apply URL filtering only on the external firewalls. How do your rules on the interior firewalls look for sources that require traffic to the Internet where you do not know the IP address of the destination? I am now considering applying URL filtering (using domain objects, updatable objects or &lt;SPAN&gt;custom applications/sites) on the internal firewall, since these features are included in the NGFW bundle) and then do URL categories, anti-bot and other features that require the NGTP bundle on the external firewalls.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Harry&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 21:13:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132964#M23981</guid>
      <dc:creator>net-harry</dc:creator>
      <dc:date>2021-10-31T21:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132965#M23982</link>
      <description>&lt;P&gt;In my particular case, my inside-to-outside rules on my interior firewalls generally look a bit like this:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Specific sources which need the Internet access.&lt;/LI&gt;
&lt;LI&gt;Destination is RFC 1918 negated. If the things need access to internal services, they get that with explicit IP-to-IP rules.&lt;/LI&gt;
&lt;LI&gt;Service is the relevant services (typically 443).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Then on the perimeter firewalls, there is a whole separate layer for URL filtering, which is controlled by another team.&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 21:19:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132965#M23982</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-10-31T21:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132966#M23983</link>
      <description>&lt;P&gt;Thanks for the information!&lt;/P&gt;&lt;P&gt;That is how I was planning to do it if we decide to only do filtering on the external firewalls.&lt;/P&gt;&lt;P&gt;I agree that this simplifies the topology and would be a good option,&lt;/P&gt;&lt;P&gt;Thanks again for your help!&lt;/P&gt;</description>
      <pubDate>Sun, 31 Oct 2021 21:33:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132966#M23983</guid>
      <dc:creator>net-harry</dc:creator>
      <dc:date>2021-10-31T21:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: Best practices for outbound Internet access for servers behind internal firewalls</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132968#M23984</link>
      <description>&lt;P&gt;If you are only doing basic firewall with no threat prevention features enabled, then enabling App Control will cause at least some traffic to go through the Medium Path, which will cause a performance impact.&lt;BR /&gt;The extent that will happen depends on how you construct your rulebase.&lt;BR /&gt;If you’re already using IPS or App Control, then the performance impact should be minimal.&lt;/P&gt;
&lt;P&gt;And yes, you can use Custom Application/Sites with an NGFW license, which includes App Control.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 00:13:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-practices-for-outbound-Internet-access-for-servers-behind/m-p/132968#M23984</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-01T00:13:03Z</dc:date>
    </item>
  </channel>
</rss>

