- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Good day all;
I have a question I have an internal server that is initiating a HTTPS connection to AWS via the internet, the connection fails and when I check it is being dropped by the clean up rule. I thought that since this is a statefull firewall and the connection is initialed internally I wouldn't need to apply a policy to allow this connection. What am I doing wrong?
Thank you in advance!!!
Warren
Looks like you don't have a firewall rule for this traffic.
Should be something like:
src: internal IP
dst: aws
port:443
allow
You don't have to make a rule for src;AWS, dst: internal IP. That is the statefull part
There needs to be a rule allowing the initiator of the connection, then the reply traffic will be statefully matched.
Do you have rules allowing the internal zone or subnets outbound?
As Chris said, you need a rule to allow initial connection, not the other way around, as it would be stateful.
Best,
Andy
Looks like you don't have a firewall rule for this traffic.
Should be something like:
src: internal IP
dst: aws
port:443
allow
You don't have to make a rule for src;AWS, dst: internal IP. That is the statefull part
Thanks guys yeah I don't have a rule in place yet, I got caught up because I tried to ping 8.8.8.8 and when it didn't work I started focusing on that. I thought all outbound connectivity was allowed by default but thank you for your help I will put in a rule for aws.
Thank you guys!!!
Warren
As long as its fixed mate, now you know for next time 🙂
Best,
Andy
Yes that is true, thank you again for your help!!
Thank you, sir!!
Warren
No worries. Put it this way...regardless of what fw you use, Cisco, Sonicwall, CP, FGT, PAN...makes no difference, you just need to know that when you place a rule for OUTBOUND connection to the Internet, no need for return rule, its stateful at that point, unless obviously you need to allow someone to access your host on the LAN from the Internet, you need to do NAT, port forwarding, what have you...you get the idea 🙂
Best,
Andy
If this HTTPS traffic is subject to NAT, make sure you are using the "original" pre-NAT IP addresses for matching in your Access Control policy. It won't match properly against the post-NAT addresses and will fall to the cleanup rule.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 33 | |
| 18 | |
| 7 | |
| 7 | |
| 6 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY