- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Good day all;
I have a question I have an internal server that is initiating a HTTPS connection to AWS via the internet, the connection fails and when I check it is being dropped by the clean up rule. I thought that since this is a statefull firewall and the connection is initialed internally I wouldn't need to apply a policy to allow this connection. What am I doing wrong?
Thank you in advance!!!
Warren
Looks like you don't have a firewall rule for this traffic.
Should be something like:
src: internal IP
dst: aws
port:443
allow
You don't have to make a rule for src;AWS, dst: internal IP. That is the statefull part
There needs to be a rule allowing the initiator of the connection, then the reply traffic will be statefully matched.
Do you have rules allowing the internal zone or subnets outbound?
As Chris said, you need a rule to allow initial connection, not the other way around, as it would be stateful.
Best,
Andy
Looks like you don't have a firewall rule for this traffic.
Should be something like:
src: internal IP
dst: aws
port:443
allow
You don't have to make a rule for src;AWS, dst: internal IP. That is the statefull part
Thanks guys yeah I don't have a rule in place yet, I got caught up because I tried to ping 8.8.8.8 and when it didn't work I started focusing on that. I thought all outbound connectivity was allowed by default but thank you for your help I will put in a rule for aws.
Thank you guys!!!
Warren
As long as its fixed mate, now you know for next time 🙂
Best,
Andy
Yes that is true, thank you again for your help!!
Thank you, sir!!
Warren
No worries. Put it this way...regardless of what fw you use, Cisco, Sonicwall, CP, FGT, PAN...makes no difference, you just need to know that when you place a rule for OUTBOUND connection to the Internet, no need for return rule, its stateful at that point, unless obviously you need to allow someone to access your host on the LAN from the Internet, you need to do NAT, port forwarding, what have you...you get the idea 🙂
Best,
Andy
If this HTTPS traffic is subject to NAT, make sure you are using the "original" pre-NAT IP addresses for matching in your Access Control policy. It won't match properly against the post-NAT addresses and will fall to the cleanup rule.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY