Hello, world.
This question, maybe it is very "silly", but I want to understand more about the operation of the Checkpoint Firewall.
My doubt is based on the security rules that are created in the SmartConsole.
For example, an administrator defines a security rule:
Source: 192.168.50.64
Destination: 172.17.20.30
HTTP Service
Action: Allow(Accept)
In other manufacturers such as Fortinet, Palo Alto (to name a few brands), in their rules, they usually "call" either the interface or zone, where the traffic arrives and leaves, but in Checkpoint this is not usually common (at least in my experience, I mean, when working security policies based on zones).
So, when an administrator defines a rule, as I put it above, like Checkpoint, he "identifies" the origin where the packet will enter and where it will be taken out????
Is there a flow to understand this?
I hope you can understand my doubt, and help to clarify it.
Thank you.