<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Criteria in the security rules in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186532#M31159</link>
    <description>&lt;P&gt;Yes we have different approaches to many things not least of which is our fundamental ethos.&lt;/P&gt;
&lt;P&gt;Zones can be defined as part of the interface topology in all current software releases of GAiA and subsequently referenced in the security policy rules src/dst but this wasn't always the case. They are often used in parent rules for layers.&lt;/P&gt;
&lt;P&gt;Refer also:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk128572" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk128572&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Security-Zones.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Security-Zones.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/td-p/53415#M10641" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/td-p/53415#M10641&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 16 Jul 2023 03:56:32 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2023-07-16T03:56:32Z</dc:date>
    <item>
      <title>Criteria in the security rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186528#M31156</link>
      <description>&lt;P&gt;Hello, world.&lt;/P&gt;
&lt;P&gt;This question, maybe it is very "silly", but I want to understand more about the operation of the Checkpoint Firewall.&lt;/P&gt;
&lt;P&gt;My doubt is based on the security rules that are created in the SmartConsole.&lt;/P&gt;
&lt;P&gt;For example, an administrator defines a security rule:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source: 192.168.50.64&lt;/P&gt;
&lt;P&gt;Destination: 172.17.20.30&lt;/P&gt;
&lt;P&gt;HTTP Service&lt;/P&gt;
&lt;P&gt;Action: Allow(Accept)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In other manufacturers such as Fortinet, Palo Alto (to name a few brands), in their rules, they usually "call" either the interface or zone, where the traffic arrives and leaves, but in Checkpoint this is not usually common (at least in my experience, I mean, when working security policies based on zones).&lt;/P&gt;
&lt;P&gt;So, when an administrator defines a rule, as I put it above, like Checkpoint, he "identifies" the origin where the packet will enter and where it will be taken out????&lt;/P&gt;
&lt;P&gt;Is there a flow to understand this?&lt;/P&gt;
&lt;P&gt;I hope you can understand my doubt, and help to clarify it.&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jul 2023 23:23:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186528#M31156</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-07-15T23:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: Criteria in the security rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186532#M31159</link>
      <description>&lt;P&gt;Yes we have different approaches to many things not least of which is our fundamental ethos.&lt;/P&gt;
&lt;P&gt;Zones can be defined as part of the interface topology in all current software releases of GAiA and subsequently referenced in the security policy rules src/dst but this wasn't always the case. They are often used in parent rules for layers.&lt;/P&gt;
&lt;P&gt;Refer also:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk128572" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk128572&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Security-Zones.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Security-Zones.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/td-p/53415#M10641" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/td-p/53415#M10641&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2023 03:56:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186532#M31159</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-07-16T03:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: Criteria in the security rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186545#M31160</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;I think what you defined specifically applies to PAN and Fortinet, for sure. They have an easy way to define zones, unlike CP. But, regardless of that, layers in CP starting R80 give you an amazing option for policy hardening, compared to R77 and before.&lt;/P&gt;
&lt;P&gt;Links&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;sent are good reference.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2023 23:36:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186545#M31160</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-16T23:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Criteria in the security rules</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186546#M31161</link>
      <description>&lt;P&gt;To add to my last response, I guess you could technically compare say if you have inline layer on CP with internal zone (tied to internal interface) to something like internal to WAN section on Fortigate firewall. Maybe not the best comparison, but somewhat similar. On FGT firewalls, once you create a rule from, just as an example, ssl vpn interface to say internal, that would represent what vpn clients can access when they connect in. That could, I guess, compare to say inline layer on CP firewall.&lt;/P&gt;
&lt;P&gt;Makes sense?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2023 23:41:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Criteria-in-the-security-rules/m-p/186546#M31161</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-16T23:41:22Z</dc:date>
    </item>
  </channel>
</rss>

