<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blades bypass on subnet in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Blades-bypass-on-subnet/m-p/91508#M3876</link>
    <description>&lt;P&gt;I will be using one of the available LAN ports (6) and create a separate network IP schema. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Jul 2020 16:11:32 GMT</pubDate>
    <dc:creator>Naftali_Oziel</dc:creator>
    <dc:date>2020-07-14T16:11:32Z</dc:date>
    <item>
      <title>Blades bypass on subnet</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Blades-bypass-on-subnet/m-p/91334#M3868</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have the 1490 local manage standalone.&amp;nbsp;&amp;nbsp; I will utilizing port 6 to do a separate network 10.x.x.x to use for my provider IPTV service and connect a switch.&amp;nbsp;&amp;nbsp; I have my security policy set to standard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;setting up the following inbound rules&lt;/P&gt;&lt;P&gt;IPTV network any any deny -&amp;nbsp; (blocking from this subnet talking to my LAN or DMZ)&lt;/P&gt;&lt;P&gt;IPTV to IPTV network any any allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;outbound is default allow which is fine it needs that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;1. is there a way I can exclude the IPTV network from getting inspection from IPS, Anti-bot and URL/APP?&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Have anyone used the option to bypass IPS on load?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2020 11:12:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Blades-bypass-on-subnet/m-p/91334#M3868</guid>
      <dc:creator>Naftali_Oziel</dc:creator>
      <dc:date>2020-07-14T11:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: Blades bypass on subnet</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Blades-bypass-on-subnet/m-p/91505#M3875</link>
      <description>&lt;P&gt;Where is the IPTV network located in relation to your LAN or DMZ? Internet?&lt;BR /&gt;In general, you can set this network as an Exception in the different Threat Prevention options.&lt;BR /&gt;Also, if you have a rule that says "any" for that destination at the top of the rulebase, it should not activate App Control/URL Filtering.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2020 16:05:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Blades-bypass-on-subnet/m-p/91505#M3875</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-14T16:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Blades bypass on subnet</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Blades-bypass-on-subnet/m-p/91508#M3876</link>
      <description>&lt;P&gt;I will be using one of the available LAN ports (6) and create a separate network IP schema. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2020 16:11:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Blades-bypass-on-subnet/m-p/91508#M3876</guid>
      <dc:creator>Naftali_Oziel</dc:creator>
      <dc:date>2020-07-14T16:11:32Z</dc:date>
    </item>
  </channel>
</rss>

