- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
I have found in logs that Check Point doesn't include all public ip addresses when using "Internet" object in policy.
Can you give me explanation about this behaviour.
Instead of using "Internet" object I have made a workaround using public IP address ranges:
1.0.0.0 - 9.255.255.255
11.0.0.0 - 126.255.255.255
128.0.0.0 - 169.253.255.255
169.255.0.0 - 172.15.255.255
172.32.0.0 - 192.167.255.255
192.169.0.0 - 223.255.255.255
Exactly, one quirk with object Internet is that traffic entering a VPN tunnel will not match it, even if the traffic is leaving on the External interface.
How are you using this object in your policy and what is the topology of the gateway defined like?
More information will assist us in clarifying the behavior for you, further to the resource provided by @Tal_Paz-Fridman
As @Tal_Paz-Fridman already mentioned, the "Internet" object is a function of your GW topology.
I have attached to you "Topology" and "Policy" picture for better understanding. When I used "Internet" object as destination in Internet inline layer instead of public IP ranges (on picture red rectangle) some ntp services were dropped although rule 6.4 says "Permit all" so I have to create rule id 7 and permit ntp service.
Where is mistake?
It works before but not for all public ip addresses.
The various ways to describe the Internet are discussed in this thread: https://community.checkpoint.com/t5/Management/Properly-defining-the-Internet-within-a-security-poli...
The object "Internet" can only be used with App Control/URL Filtering rules.
The rules you showed in the screenshots below can all be matched on simple TCP/UDP services.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 19 | |
| 8 | |
| 7 | |
| 7 | |
| 4 | |
| 4 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY