- Products
- Learn
- Local User Groups
- Partners
- More
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
Join our TechTalk: Malware 2021 to Present Day
Building a Preventative Cyber Program
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
Be a CloudMate!
Check out our cloud security exclusive space!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
When having a access role only consisting of a network group, is it worth the same as the network group itself when applying each of them in a rule?
NG-A consists of the network 192.168.0.0/24
AR-B consists of NG-A and has users, machines, and remote access clients set to any.
Is there a difference when using AR-B in a rule, than directly the NG-A?
I've never actually tried that to be honest, but lets think about it:
This means that there is a difference between a network group and an access-role filled with the same network group and set all other filters to any: The access-role will only match, wenn there is a identity acquired for the ip address. It does not matter which identity or identity type and what group memberships this identity may have or which account unit it may belong to. But is has to be a learned identity for that ip adress.
When using a network group, matching is only done by ip address.
Also you are introducing additional layer of Identity Awareness blade. Don't get me wrong, I like IA, however when you get nasty bug and identities are not fetched properly then your rule would intermittently stop working. That's not much of the fun
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY