- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi all,
When setting up inline layers to setup for instance mobile access rules (unified mode) application/urlf rules, content, etc should the parent be enabled with all the blades I want to use at the inline layer level?
I think it would make sense, not enable at the parent level, example:
parent allowing lan to internet service http/https assign inline layer "urlf"(here I would only enable access control)
at the "urlf" inline layer specify allowed/blocked categories there (here i would enable urlf sb)
Is this proper, best practice?
Regards,
Carlos
Hi, it's not required. If you didn't enable applications at the parent layer or rule but did that in the inline layer, it will inspect applications (or content awareness etc. for that matter).
So if you plan to move your Application Control ordered layer as an inline layer to your outgoing Firewall rules, you don't have to edit the Firewall layer and start enable blades for that.
Hi, it's not required. If you didn't enable applications at the parent layer or rule but did that in the inline layer, it will inspect applications (or content awareness etc. for that matter).
So if you plan to move your Application Control ordered layer as an inline layer to your outgoing Firewall rules, you don't have to edit the Firewall layer and start enable blades for that.
Tomer,
If we have parent layer configured with Firewall blade only and the inline layer with APPC and URLF, can we use "Internet" object in the parent rules or should it only be used in the APPC and URLF layer?
The object "Any" in the destination column is bad because of the column-based rule-matching tehnique in R80.10+ firewalls. Therefore it's better to use "Internet" object in the parent rules.
Enis,
The question was not about use of "Any" object, but if "Internet" object from the layer containing APPC & URLF blade could be used in the parent layer that DOES NOT contain APPC & URLF blade.
Internet objects are only supported for APCL\URLF layers.
You can use security zones instead,
In general it is good practice not to leave columns with any if possible. On APCL\URLF case on most cases applications are actually in the internet, so it is better to use Internet object.
R80.10 rule matching technique is actually not relevant here. Defining internet object (or any other network object) in a rule allows rulebase to filter rules in an earlier stage (e.g: SYN packet) allowing better security and potentially better performance.
e.g:
Src: Any Dst: Any Application: Facebook
Such rule will cause any connection being inspected to determine the application on the connection.
Src: Network_A Dst: Internet Application: Facebook
Such rule will cause only connections originated from Network_A to internet being inspected for application detection. For all other connections this rule will be filtered out on the first packet of the connection (pending other rules, this connection will be further inspected or not).
Tal, thank you for concise explanation.
Can you tell me how the user defined applications for Mobile Access are being treated? I.e. do we need to have APCL URLF blade enabled on the layer containing MAB, or are those apps recognized and treated differently?
Hey Vladimir,
For MAB blade inline layer you don't need to have APP/URLF blade active.
Best regards,
Carlos Santos
I think it should be fine. Search for.other threads that we talked about using zone on the rulebase.
👍
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
19 | |
6 | |
6 | |
5 | |
4 | |
4 | |
3 | |
2 | |
2 | |
2 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY