- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi All,
I want to follow best practices for enabling blades on perimeter and data center firewalls, given that Sandblast license has been acquired. what is the best practice to be enabled on Data center and Perimeter security gateway.
Thanks,
Depends on the blades, what blades you want to enable? Are you going to https inspection? What will the dc firewall protect? Servers, shares etc? And perimeter, only internet access or servers in DMZ? What licenses you have know purchased? What hardware we are talking about, is it maybe Maestro or VSX?
DC Firewall Protects the server farm while the perimeter gateway will protect the external facing servers and Internet. HA mode SG hardware appliance.
And this? Depends on the blades, what blades you want to enable? Are you going to https inspection? What licenses you have now purchased?
Sandblast License. I want to know which blades should be enabled based on best practices for perimeter and data center security gateways.
If you have all licenses and powerfull appliances you can enable all blades. Maybe you need some features only on one of the firewalls you can disable these, meaning as an example MobileAccessBlade only on perimeter firewall.
The answer is like a lot of other questions…. It depends 😉
Really depends on the network. For example if you do not have mail servers in dc or on perimeter then there is no point checking for the Anti-spam blade or the MTA setup. Or if you do not have SMB shares then you can skip that in the inspection for AV blade(and other blades) Same for FTP.
I don't think there is a general advice like 'if you must protect DC enable the following blades' Because you can have anything or almost nothing in a DC. Personally, I would go for all the threat prevention blades in combi with app and URL filtering. (Of course HTTS inspection, very important)
Exploring Autonomous Threat Prevention (sk163593) is also an option to help manage the configuration.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 14 | |
| 10 | |
| 9 | |
| 7 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY