<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Filter on Internal Traffic for 1570R in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151446#M6991</link>
    <description>&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102296&amp;amp;partition=Basic&amp;amp;product=Quantum" target="_blank"&gt;sk102296: How to activate inspection on internal traffic on Quantum Spark appliances&lt;/A&gt;&lt;/P&gt;
&lt;TABLE id="gridview-1827-record-2366" class="x-grid-item x-grid-item-alt" role="presentation" cellspacing="0" cellpadding="0" data-boundview="gridview-1827" data-recordid="2366" data-recordindex="11"&gt;
&lt;TBODY&gt;
&lt;TR class="  x-grid-row" role="row"&gt;
&lt;TD width="710.9926147460938px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1823 x-grid-cell-first" data-qtip="Stateful Inspection - Perform deep packet inspection on LAN to LAN traffic" data-columnid="gridcolumn-1823"&gt;
&lt;DIV id="ext-element-2358" class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;Statef&lt;/SPAN&gt;ul Inspection - Perform deep packet inspection on LAN to LAN traffic&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="42.463233947753906px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1824" data-columnid="gridcolumn-1824"&gt;
&lt;DIV id="ext-element-2360" class="x-grid-cell-inner "&gt;bool&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="46.50735092163086px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1825" data-qtip="" data-columnid="gridcolumn-1825"&gt;
&lt;DIV id="ext-element-2362" class="x-grid-cell-inner "&gt;false&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="40px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1826 x-grid-cell-last" data-qtip="" data-columnid="gridcolumn-1826"&gt;
&lt;DIV id="ext-element-2364" class="x-grid-cell-inner "&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE id="gridview-1827-record-2354" class="x-grid-item x-grid-item-selected" role="presentation" cellspacing="0" cellpadding="0" data-boundview="gridview-1827" data-recordid="2354" data-recordindex="12"&gt;
&lt;TBODY&gt;
&lt;TR class="  x-grid-row" role="row" aria-selected="true"&gt;
&lt;TD width="710px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1823 x-grid-cell-first" data-qtip="Stateful Inspection - Perform deep packet inspection on traffic between LAN and DMZ networks" data-columnid="gridcolumn-1823"&gt;
&lt;DIV id="ext-element-2366" class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;Statef&lt;/SPAN&gt;ul Inspection - Perform deep packet inspection on traffic between LAN and DMZ networks&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="42.463233947753906px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1824" data-columnid="gridcolumn-1824"&gt;
&lt;DIV id="ext-element-2368" class="x-grid-cell-inner "&gt;bool&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="46.50735092163086px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1825" data-qtip="" data-columnid="gridcolumn-1825"&gt;
&lt;DIV id="ext-element-2370" class="x-grid-cell-inner "&gt;&lt;SPAN&gt;false&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="40px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1826 x-grid-cell-last x-grid-item-focused" data-qtip="" data-columnid="gridcolumn-1826"&gt;
&lt;DIV id="ext-element-2372" class="x-grid-cell-inner "&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Wed, 22 Jun 2022 11:08:03 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2022-06-22T11:08:03Z</dc:date>
    <item>
      <title>Application Filter on Internal Traffic for 1570R</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151431#M6990</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;New here. Working on 1570R and SMB&amp;nbsp;&lt;SPAN&gt;R80.20.30.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;We would like to leverage some of this "OT intelligence" in the 1570R for tighter control of the traffic in an OT environment. For that I'm trying to make application filtering work between two hosts, but it looks like the functionality is locked to the "Outgoing access to the Internet" policy. To circumvent that I have tried making one the LAN interfaces an "Internet" interface, and the policy kicks in, but only in the outgoing direction. NAT is disabled.&lt;/P&gt;&lt;P&gt;How to use application filtering on internal traffic in general? Is that not possible?&lt;/P&gt;&lt;P&gt;Would it work with another model?&amp;nbsp; I'm under the impression that 1570R is currently the only model you can buy that has "OT intelligence" regarding SCADA protocols etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Schnell&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 08:59:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151431#M6990</guid>
      <dc:creator>Schnell</dc:creator>
      <dc:date>2022-06-22T08:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Application Filter on Internal Traffic for 1570R</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151446#M6991</link>
      <description>&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102296&amp;amp;partition=Basic&amp;amp;product=Quantum" target="_blank"&gt;sk102296: How to activate inspection on internal traffic on Quantum Spark appliances&lt;/A&gt;&lt;/P&gt;
&lt;TABLE id="gridview-1827-record-2366" class="x-grid-item x-grid-item-alt" role="presentation" cellspacing="0" cellpadding="0" data-boundview="gridview-1827" data-recordid="2366" data-recordindex="11"&gt;
&lt;TBODY&gt;
&lt;TR class="  x-grid-row" role="row"&gt;
&lt;TD width="710.9926147460938px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1823 x-grid-cell-first" data-qtip="Stateful Inspection - Perform deep packet inspection on LAN to LAN traffic" data-columnid="gridcolumn-1823"&gt;
&lt;DIV id="ext-element-2358" class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;Statef&lt;/SPAN&gt;ul Inspection - Perform deep packet inspection on LAN to LAN traffic&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="42.463233947753906px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1824" data-columnid="gridcolumn-1824"&gt;
&lt;DIV id="ext-element-2360" class="x-grid-cell-inner "&gt;bool&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="46.50735092163086px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1825" data-qtip="" data-columnid="gridcolumn-1825"&gt;
&lt;DIV id="ext-element-2362" class="x-grid-cell-inner "&gt;false&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="40px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1826 x-grid-cell-last" data-qtip="" data-columnid="gridcolumn-1826"&gt;
&lt;DIV id="ext-element-2364" class="x-grid-cell-inner "&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE id="gridview-1827-record-2354" class="x-grid-item x-grid-item-selected" role="presentation" cellspacing="0" cellpadding="0" data-boundview="gridview-1827" data-recordid="2354" data-recordindex="12"&gt;
&lt;TBODY&gt;
&lt;TR class="  x-grid-row" role="row" aria-selected="true"&gt;
&lt;TD width="710px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1823 x-grid-cell-first" data-qtip="Stateful Inspection - Perform deep packet inspection on traffic between LAN and DMZ networks" data-columnid="gridcolumn-1823"&gt;
&lt;DIV id="ext-element-2366" class="x-grid-cell-inner "&gt;&lt;SPAN class="x-livesearch-match"&gt;Statef&lt;/SPAN&gt;ul Inspection - Perform deep packet inspection on traffic between LAN and DMZ networks&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="42.463233947753906px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1824" data-columnid="gridcolumn-1824"&gt;
&lt;DIV id="ext-element-2368" class="x-grid-cell-inner "&gt;bool&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="46.50735092163086px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1825" data-qtip="" data-columnid="gridcolumn-1825"&gt;
&lt;DIV id="ext-element-2370" class="x-grid-cell-inner "&gt;&lt;SPAN&gt;false&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD width="40px" class="x-grid-cell x-grid-td x-grid-cell-gridcolumn-1826 x-grid-cell-last x-grid-item-focused" data-qtip="" data-columnid="gridcolumn-1826"&gt;
&lt;DIV id="ext-element-2372" class="x-grid-cell-inner "&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 22 Jun 2022 11:08:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151446#M6991</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-06-22T11:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: Application Filter on Internal Traffic for 1570R</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151460#M6994</link>
      <description>&lt;P&gt;See&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk177203&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk177203: Quantum IoT Controller [IoT Protect] Security Best Practices&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 12:18:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151460#M6994</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-06-22T12:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: Application Filter on Internal Traffic for 1570R</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151508#M6997</link>
      <description>&lt;P&gt;Thank you.&lt;BR /&gt;&lt;BR /&gt;I have changed both to "true", rebooted and done some testing. It seems to be the same as before. I can still only choose applications in "&lt;SPAN&gt;Outgoing access to the Internet" policy, however that policy does not seem to apply for internal traffic.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In "Firewall" -&amp;gt; "Blade Control" I have tried enabling and editing the "Block o&lt;SPAN class=""&gt;ther undesired applications". I used every version of Internet Explorer as a test. However when I do a HTTP request in IE on either host it simply just allows the traffic. It uses the "Any Any HTTP Allow" test rule which is currently first on the list in "&lt;SPAN&gt;Incoming, Internal and VPN traffic" policy.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;In either case, a black list like "Block other undesired applications" was not the intended solution, we were looking for a white list functionality like it seems to be possible with "Outgoing access to the Internet" policy.&lt;BR /&gt;&lt;BR /&gt;Am I missing something?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 15:17:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Application-Filter-on-Internal-Traffic-for-1570R/m-p/151508#M6997</guid>
      <dc:creator>Schnell</dc:creator>
      <dc:date>2022-06-22T15:17:26Z</dc:date>
    </item>
  </channel>
</rss>

