<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point configuration mistakes - Top 10 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5832#M682</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like to&amp;nbsp;share Check Point's vision in avoiding such mistakes. One of our guidelines is to create a product which can save users from potential misconfigurations while maintaining the occasional exceptions, as sometimes the business need is stronger than the ideal security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some of the items that you mentioned were a result of&amp;nbsp;the Management Platform of R77. With R80 security management&amp;nbsp;architecture, we made 2 improvements that prevent this scenario (And we&amp;nbsp;will update the SK's to clarify that):&lt;/P&gt;&lt;P&gt;1. An improved &lt;A href="https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf"&gt;validations mechanism (see page 12)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. &lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/5554-what-are-the-limitations-for-network-object-names-in-r8010"&gt;Automatic translation of&amp;nbsp;nonstandard characters&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;2.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Use of Non-standard ASCII characters or reserved words&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;(&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk105708" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk105708&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk40768" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk40768&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk104077" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk104077&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk85540" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk85540&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk106573" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk106573&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk40179" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk40179&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk34990" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk34990&lt;/A&gt;)&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another item that you mentioned was:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;rules not ordered by hit count&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I would like to share that the new R80.10 Gateway comes with a new packet matching mechanism which eliminates the need to order rules by their hit count. This&amp;nbsp;has been tested at customers' production environments and was found to bring new performance improvements with their existing security policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following items&amp;nbsp;can be&amp;nbsp;avoided when using &lt;A _jive_internal="true" href="https://community.checkpoint.com/message/8009-compliance-blade-how-to-videos"&gt;Compliance Blade&lt;/A&gt;:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;1.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Missing documentation of actual configuration&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;6.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Missing firewall stealth rules in header of rulebase&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;(&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=55.0.12580973.2854810" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;How to create a stealth rule&lt;/A&gt;)&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;9.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Stateful inspection or IP address spoofing is disabled&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; color: #3d3d3d; font-weight: normal;"&gt;&lt;STRONG&gt;We are actively improving Compliance blade in order to include other potentials of misconfigurations.&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; color: #3d3d3d; font-weight: normal;"&gt;&lt;STRONG&gt;This community is a great resource for helping us to improve!&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 31 Aug 2017 13:32:57 GMT</pubDate>
    <dc:creator>Tomer_Sole</dc:creator>
    <dc:date>2017-08-31T13:32:57Z</dc:date>
    <item>
      <title>Check Point configuration mistakes - Top 10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5831#M681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG __jive_id="58362" class="image-1 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58362_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When reviewing Check Point security configurations I often experience similar configuration mistakes. Below is my Top 10 list of very typical mistakes with R77.x installations. Please share yours.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;1.&lt;/SPAN&gt; Missing documentation of actual configuration (&lt;/STRONG&gt;network map, recent migration documents, comment fields&lt;STRONG&gt;)&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;2.&lt;/SPAN&gt; Use of Non-standard ASCII characters or reserved words (&lt;/STRONG&gt;improved in R80&lt;STRONG&gt;)&lt;/STRONG&gt;&lt;BR /&gt; (&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk105708"&gt;sk105708&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk40768"&gt;sk40768&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk104077"&gt;sk104077&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk85540"&gt;sk85540&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk106573"&gt;sk106573&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk40179"&gt;sk40179&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk34990"&gt;sk34990&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;3.&lt;/SPAN&gt; On-board NICs, Broadcom NICs or Non-Intel NICs in use (Open Server)&lt;/STRONG&gt;&lt;BR /&gt; (&lt;A href="http://www.checkpoint.com/services/techsupport/hcl/#nic"&gt;HCL NIC limitations&lt;/A&gt;, &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk44584"&gt;sk44584&lt;/A&gt;, &lt;A href="http://www.maxpowerfirewalls.com/"&gt;Max Power Firewalls&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;4.&lt;/SPAN&gt; Missing segmentation of firewall management (SmartCenter) to secure the firewall infrastructure&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;5.&lt;/SPAN&gt; Direct login into Bash shell for &lt;EM&gt;admin&lt;/EM&gt; account or identical passwords for Clish login (User Mode) and Bash login (System Mode)&lt;/STRONG&gt;&lt;BR /&gt; (most often to enable SCP file transers, because &lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/5574-howto-creating-an-scpuser-account-on-gaia-clish"&gt;SCP-only shell&lt;/A&gt; is not known)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;6.&lt;/SPAN&gt; Missing firewall stealth rules in header of rulebase&lt;/STRONG&gt;&lt;BR /&gt; (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=55.0.12580973.2854810"&gt;How to create a stealth rule&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;7.&lt;/SPAN&gt; Unidentified bridges between networks / Unidentified error messages in log files&lt;/STRONG&gt;&lt;BR /&gt; (e.g. central firewall management was configured as gateway instead as host object and has two or more physical networks connected)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;8.&lt;/SPAN&gt; VPN tunnels are not consistently secured with VPN certificates&lt;/STRONG&gt;&lt;BR /&gt; (&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2175-howto-set-up-certificate-based-vpns-with-check-point-appliances-r77-edition"&gt;How to set up certificate based VPNs with Check Point appliances&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;9.&lt;/SPAN&gt; Stateful inspection or IP address spoofing is disabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2;"&gt;10.&lt;/SPAN&gt; Missing optimizations (CoreXL, SecureXL, drop &amp;amp; capacity optimization, rules not ordered by hit count, no use of color codes, missing naming convention etc.)&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Aug 2017 10:38:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5831#M681</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-08-31T10:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point configuration mistakes - Top 10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5832#M682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like to&amp;nbsp;share Check Point's vision in avoiding such mistakes. One of our guidelines is to create a product which can save users from potential misconfigurations while maintaining the occasional exceptions, as sometimes the business need is stronger than the ideal security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some of the items that you mentioned were a result of&amp;nbsp;the Management Platform of R77. With R80 security management&amp;nbsp;architecture, we made 2 improvements that prevent this scenario (And we&amp;nbsp;will update the SK's to clarify that):&lt;/P&gt;&lt;P&gt;1. An improved &lt;A href="https://www.checkpoint.com/downloads/product-related/r80.10-mgmt-architecture-overview.pdf"&gt;validations mechanism (see page 12)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. &lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/5554-what-are-the-limitations-for-network-object-names-in-r8010"&gt;Automatic translation of&amp;nbsp;nonstandard characters&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;2.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Use of Non-standard ASCII characters or reserved words&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;(&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk105708" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk105708&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk40768" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk40768&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk104077" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk104077&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk85540" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk85540&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk106573" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk106573&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk40179" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk40179&lt;/A&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk34990" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;sk34990&lt;/A&gt;)&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another item that you mentioned was:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;rules not ordered by hit count&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I would like to share that the new R80.10 Gateway comes with a new packet matching mechanism which eliminates the need to order rules by their hit count. This&amp;nbsp;has been tested at customers' production environments and was found to bring new performance improvements with their existing security policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following items&amp;nbsp;can be&amp;nbsp;avoided when using &lt;A _jive_internal="true" href="https://community.checkpoint.com/message/8009-compliance-blade-how-to-videos"&gt;Compliance Blade&lt;/A&gt;:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;1.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Missing documentation of actual configuration&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;6.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Missing firewall stealth rules in header of rulebase&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;(&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=55.0.12580973.2854810" rel="nofollow" style="color: #6d6e71; border: 0px; font-weight: inherit; text-decoration: none; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;How to create a stealth rule&lt;/A&gt;)&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #f08ca2; border: 0px; font-weight: inherit;"&gt;9.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Stateful inspection or IP address spoofing is disabled&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; color: #3d3d3d; font-weight: normal;"&gt;&lt;STRONG&gt;We are actively improving Compliance blade in order to include other potentials of misconfigurations.&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="border: 0px; color: #3d3d3d; font-weight: normal;"&gt;&lt;STRONG&gt;This community is a great resource for helping us to improve!&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Aug 2017 13:32:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5832#M682</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2017-08-31T13:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point configuration mistakes - Top 10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5833#M683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;May be this is a good place to drop an advertisement for Check Point Compliance blade!&amp;nbsp;&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/cool.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I know compliance blade can help to avoid some of the above mistakes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Oct 2018 11:16:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5833#M683</guid>
      <dc:creator>Sven_Glock</dc:creator>
      <dc:date>2018-10-23T11:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point configuration mistakes - Top 10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5834#M684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold;"&gt;Missing segmentation of firewall management (SmartCenter) to secure the firewall infrastructure&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Segmentation is not enough as the implied rules will allow traffic from everybody when not setting the&amp;nbsp;"GUI Clients" correctly in cpconfig.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've seen customers with firewall configured rule for access to Smartcenter, but not a single hit due to implied rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So : not configuring "GUI Clients" is for me a top 10 mistake.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2018 14:14:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5834#M684</guid>
      <dc:creator>Kristof_Vermael</dc:creator>
      <dc:date>2018-11-26T14:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point configuration mistakes - Top 10</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5835#M685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are some more typical mistakes:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Not using the external (public) IP as the general IP in the VPN Gateway object&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Defining 3rd-party VPN Gateways as "externally managed Check Point Gateways"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Defining bi-directional NAT-rules for unidirectional traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Performing NAT where NOT required&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;(especially with automatic NAT rules)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Mixing up encryption domains with security rules&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;(e.g. define an encryption domain as a set of hosts which appear in security rule)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Inconsistent routing tables in clusters &lt;/STRONG&gt;(Gaia Level)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Definining bidirectional traffic for "many to one" and "one to many" in same rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;(enables undesired "many to many")&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2019 07:46:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-configuration-mistakes-Top-10/m-p/5835#M685</guid>
      <dc:creator>peter_schumache</dc:creator>
      <dc:date>2019-03-08T07:46:23Z</dc:date>
    </item>
  </channel>
</rss>

