<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unified policy - how is that connection really handled? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22447#M4318</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so in R80 we have this deal where we have a rule match by committee where the CMI, protocol parsers and pattern matchers are all looking at the rulebase column-by-column to build their array of "candidate rules"&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT - they need to let some of that traffic run in some cases to get enough info about it before making a decision.&amp;nbsp; So, what I start to wonder is how much, if any, of this "sample traffic" is let through before the connection is shut down?&amp;nbsp; Does the gateway keep it in some kind of queue pending the final policy decision or does some of that traffic actually transit the gateway prior to that decision being made?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Jan 2018 07:35:45 GMT</pubDate>
    <dc:creator>Michael_Lawrenc</dc:creator>
    <dc:date>2018-01-11T07:35:45Z</dc:date>
    <item>
      <title>Unified policy - how is that connection really handled?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22447#M4318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so in R80 we have this deal where we have a rule match by committee where the CMI, protocol parsers and pattern matchers are all looking at the rulebase column-by-column to build their array of "candidate rules"&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT - they need to let some of that traffic run in some cases to get enough info about it before making a decision.&amp;nbsp; So, what I start to wonder is how much, if any, of this "sample traffic" is let through before the connection is shut down?&amp;nbsp; Does the gateway keep it in some kind of queue pending the final policy decision or does some of that traffic actually transit the gateway prior to that decision being made?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 07:35:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22447#M4318</guid>
      <dc:creator>Michael_Lawrenc</dc:creator>
      <dc:date>2018-01-11T07:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: Unified policy - how is that connection really handled?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22448#M4319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Generally speaking, we have to let the traffic through until a determination has been made.&lt;/P&gt;&lt;P&gt;The amount depends on what applications you've configured in your policy.&lt;/P&gt;&lt;P&gt;See also:&amp;nbsp;&lt;A class="link-titled" href="http://phoneboy.org/2016/12/14/which-comes-first-the-ports-or-the-application-id/" title="http://phoneboy.org/2016/12/14/which-comes-first-the-ports-or-the-application-id/"&gt;http://phoneboy.org/2016/12/14/which-comes-first-the-ports-or-the-application-id/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jan 2018 02:19:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22448#M4319</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-13T02:19:44Z</dc:date>
    </item>
    <item>
      <title>Re: Unified policy - how is that connection really handled?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22449#M4320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, and I am now up to speed on the little warning that comes with protocol inspection.&amp;nbsp; You know, it seems to me that sandboxing connections before releasing them would be in order.&amp;nbsp; Those few packets coming through prior to making the call on whether or not to drop makes me a little nervous. Of course, it's better than no layer 7 inspection at all, but these days I imagine crackists focusing on using those few initial packets to do... something bad.&amp;nbsp; In the old CVP days, we'd vector the whole file, scrub it and then release it.&amp;nbsp; Wondering why we can't do that with the first few packets vectored into a vm to make sure it's all good before opening the gate.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;BTW, nice to see your new site.&amp;nbsp; (New to me - it's been a loooong time since I've looked at phoneboy.)&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 00:19:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22449#M4320</guid>
      <dc:creator>Michael_Lawrenc</dc:creator>
      <dc:date>2018-01-30T00:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: Unified policy - how is that connection really handled?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22450#M4321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is why you should not allow all traffic on all ports to all destinations...to minimize the risk somewhat &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be fair, phoneboy.com has been around for quite some time, though it's purpose has evolved&amp;nbsp;quite a bit over the 20+ years I've had&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I started writing more about cyber security again, I decided to fork that content to a different site focused on that topic (phoneboy.org)&lt;/P&gt;&lt;P&gt;Now, I'm focusing my energy here &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2018 14:46:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Unified-policy-how-is-that-connection-really-handled/m-p/22450#M4321</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-30T14:46:38Z</dc:date>
    </item>
  </channel>
</rss>

