<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Statefull Firewall in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207368#M34402</link>
    <description>&lt;P&gt;If this HTTPS traffic is subject to NAT, make sure you are using the "original" pre-NAT IP addresses for matching in your Access Control policy.&amp;nbsp; It won't match properly against the post-NAT addresses and will fall to the cleanup rule.&lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2024 15:02:14 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2024-02-28T15:02:14Z</dc:date>
    <item>
      <title>Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207321#M34385</link>
      <description>&lt;P&gt;Good day all;&lt;/P&gt;&lt;P&gt;I have a question I have an internal server that is initiating a HTTPS connection to AWS via the internet, the connection fails and when I check it is being dropped by the clean up rule.&amp;nbsp; I thought that since this is a statefull firewall and the connection is initialed internally I wouldn't need to apply a policy to allow this connection.&amp;nbsp; What am I doing wrong?&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Thank you in advance!!!&lt;/P&gt;&lt;P&gt;Warren&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 21:47:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207321#M34385</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2024-02-27T21:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207323#M34386</link>
      <description>&lt;P&gt;There needs to be a rule allowing the initiator of the connection, then the reply traffic will be statefully matched.&lt;/P&gt;
&lt;P&gt;Do you have rules allowing the internal zone or subnets outbound?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Feb 2024 22:50:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207323#M34386</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-02-27T22:50:29Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207330#M34387</link>
      <description>&lt;P&gt;As Chris said, you need a rule to allow initial connection, not the other way around, as it would be stateful.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 02:50:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207330#M34387</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-02-28T02:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207342#M34390</link>
      <description>&lt;P&gt;Looks like you don't have a firewall rule for this traffic.&lt;/P&gt;
&lt;P&gt;Should be something like:&lt;/P&gt;
&lt;P&gt;src: internal IP&lt;/P&gt;
&lt;P&gt;dst: aws&lt;/P&gt;
&lt;P&gt;port:443&lt;/P&gt;
&lt;P&gt;allow&lt;/P&gt;
&lt;P&gt;You don't have to make a rule for src;AWS, dst: internal IP. That is the statefull part&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 08:59:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207342#M34390</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-02-28T08:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207368#M34402</link>
      <description>&lt;P&gt;If this HTTPS traffic is subject to NAT, make sure you are using the "original" pre-NAT IP addresses for matching in your Access Control policy.&amp;nbsp; It won't match properly against the post-NAT addresses and will fall to the cleanup rule.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 15:02:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207368#M34402</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-02-28T15:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207477#M34422</link>
      <description>&lt;P&gt;Thanks guys yeah I don't have a rule in place yet, I got caught up because I tried to ping 8.8.8.8 and when it didn't work I started focusing on that.&amp;nbsp; I thought all outbound connectivity was allowed by default but thank you for your help I will put in a rule for aws.&lt;/P&gt;&lt;P&gt;Thank you guys!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Warren&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207477#M34422</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2024-02-29T14:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207479#M34423</link>
      <description>&lt;P&gt;As long as its fixed mate, now you know for next time &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:39:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207479#M34423</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-02-29T14:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207481#M34424</link>
      <description>&lt;P&gt;Yes that is true, thank you again for your help!!&lt;/P&gt;&lt;P&gt;Thank you, sir!!&lt;/P&gt;&lt;P&gt;Warren&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:42:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207481#M34424</guid>
      <dc:creator>gurowar</dc:creator>
      <dc:date>2024-02-29T14:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Statefull Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207482#M34425</link>
      <description>&lt;P&gt;No worries. Put it this way...regardless of what fw you use, Cisco, Sonicwall, CP, FGT, PAN...makes no difference, you just need to know that when you place a rule for OUTBOUND connection to the Internet, no need for return rule, its stateful at that point, unless obviously you need to allow someone to access your host on the LAN from the Internet, you need to do NAT, port forwarding, what have you...you get the idea &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:45:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Statefull-Firewall/m-p/207482#M34425</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-02-29T14:45:21Z</dc:date>
    </item>
  </channel>
</rss>

