- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello, Team
I have the following scenario, which I would like to clarify my doubt.
I have a Cluster R81.10
We have a publication of a service, so that from the Internet (From certain public IPs, can access our service pointing to a TCP port 1122)
The problem I see is that the traffic is not doing MATCH with the first explicit rule that I have, which has the #585, but is doing MATCH with a rule that is below with #594, and I do not understand the "why", because the first rule has a "custom" group where we are explicitly declaring the IP that we want to connect to our server, but for some reason, the traffic "ignores" the first rule, and goes to the rule that is below.
Is this a normal behavior? Is it something that can be corrected?
The purpose is that the traffic makes MATCH with the 585.
I hope you can support me with your point of view.
Greetings.
The reason I see is that one has source any.
Buddy,
But rule #585, is much more explicit than rule #594, other than that, it is more "up" in the rulebase.
I don't see the logic in it. 😕
K, so whats the source IP you are coming from and is it included in that group in rule 585?
Andy
Rule #585, has as its origin a general group.
The group is called GRP_SFTP_200.48.202.52.
Within this group, there are several additional "subgroups", 1 of them is the group GRP_RE, in which there are several public IPs to which we are allowing access to our public one.
So, I do not understand why the traffic "ignores" this rule, and goes to the rule that has as origin an ANY.
Maybe try disable,re-enable rule,push policy and test. Otherwise, try below example
Andy
That's like a Cisco Packet-Tracert, isn't it?
To validate the rule for certain traffic?
Sort of...
I got almost the same result as what can be seen by the SmartConsole.
As I interpret it, it first "matches" rule #585.
Thats what it shows, right...BUT, as I said, if it fails, I would try what I found to be easy fix in the past. Disable rule 585, push policy, re-enable, push policy. If that fails, disable rule 594, push policy and test. Does traffic get dropped?
Andy
We have not observed "traffic down", but for auditing purposes, the traffic should match the rule that has been defined for it (Rule #585).
I agree bro, you are 100% right. I cant see why its not catching that rule, UNLESS there is some sort of nat or something causing it. If not, then I would get in touch with TAC to solve it via remote session. Before that, try my suggestion and see what happens.
This is probably going to require the TAC to investigate.
https://help.checkpoint.com
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
14 | |
12 | |
11 | |
9 | |
8 | |
7 | |
5 | |
5 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY