<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Limit remote  access connections from specific public IP in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Limit-remote-access-connections-from-specific-public-IP/m-p/158757#M7507</link>
    <description>&lt;P&gt;Yes, you are dealing with implied rules that permit access from anywhere.&lt;BR /&gt;Disabling those rules would involve editing $FWDIR/lib/implied_rules.def on the device and issuing the command fw_configload to regenerate the policy.&lt;BR /&gt;I do not know the precise edits one has to make on this file to achieve the precise objective you're after...or if it will even work.&lt;BR /&gt;In terms of necessary access rules once these are disabled, it should be similar to:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk42815&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk42815&amp;amp;partition=Advanced&amp;amp;product=IPSec&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Oct 2022 15:58:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-10-04T15:58:56Z</dc:date>
    <item>
      <title>Limit remote  access connections from specific public IP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Limit-remote-access-connections-from-specific-public-IP/m-p/158755#M7506</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to ask for advice. Is there a way to limit remote access connections just from specific public IP on locally managed 1590? It seems like if the remote access blade is active there is an "implied" rule to accept connections from any source.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 15:12:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Limit-remote-access-connections-from-specific-public-IP/m-p/158755#M7506</guid>
      <dc:creator>tony1</dc:creator>
      <dc:date>2022-10-04T15:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: Limit remote  access connections from specific public IP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Limit-remote-access-connections-from-specific-public-IP/m-p/158757#M7507</link>
      <description>&lt;P&gt;Yes, you are dealing with implied rules that permit access from anywhere.&lt;BR /&gt;Disabling those rules would involve editing $FWDIR/lib/implied_rules.def on the device and issuing the command fw_configload to regenerate the policy.&lt;BR /&gt;I do not know the precise edits one has to make on this file to achieve the precise objective you're after...or if it will even work.&lt;BR /&gt;In terms of necessary access rules once these are disabled, it should be similar to:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk42815&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk42815&amp;amp;partition=Advanced&amp;amp;product=IPSec&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 15:58:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Limit-remote-access-connections-from-specific-public-IP/m-p/158757#M7507</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-04T15:58:56Z</dc:date>
    </item>
  </channel>
</rss>

