- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
while testing ordered layers for a customer, i ran over a behaviour i cannot explain to myself - perhaps someone else can (?):
at top layer:
Accept communication "any to any with any service" but "tracking: none"
(cleanup rule of a small policy to block traffic from/to defined ips)
subordinated layer:
communication is allowed with tracking enabled (log)
my understanding is now, that in logs i get rulename and number of the access rule hit at the subordinated layer.. instead i get the cleanup allow rule of the top layer with tracking set to "none"
Looking into SmartTracker no informations regarding the matched rule is being given
Setup:
Virtual Management Server, virtual Check Point Gateway (GAiA) and physical smb device. all updated to las recent versions. behaviour can be seen with logs of both gateways
Someone has an idea what is wrong? or is this kind of an expected behaviour?
It says "cleanup rule", and I assume, it is a clean-up rule of your sublayer. How does that sublayer look?
Hi Val,
"Cleanup rule" of first ordered layer is set to Accept Any any Tracking: none
("Cleanup Rule of "lyr_block")
There are two layers in this policy package
subordinated layer is meaning the "normal" policy rule set (pol_xyz) - where the communication is allowed (or not) with Tracking set to "log"
for instance https://community.checkpoint.com/t5/image/serverpage/image-id/21986i7BAB34C1DF1DF157/image-size/medi...
Hmm, this is a bit odd. Do I see correctly that you have two network policy layers in this security policy package? Why is that?
this is to address a requirement in being able to rapidly block communication to/from several networks if needed. if used in the same network policy layer you would run into policy verification errors, because those objects are used somewhere else in the policy. resolving these errors is not possible within the term "rapid"
Using an inline layer would workaround the policy verification error too, but is not possible here for now. so i went towards ordered layers
I observed exactly this behaviour with the same layered policy approach for the same reason (block unwanted traffic) and opened a support ticket.
Support have advised this is expected behaviour, although I think it is a bug.
If you select the rule in the lower layer that the traffic hits and look at 'logs' at the bottom of the console window, it shows the traffic as hitting the rule on the upper layer. The 'logs' view in smartconsole has a predefined filter which is supposed to match 'current rule' but in this scenario it matches a different rule in a different layer...
EDIT: I forgot to add, the reason we decided to use a layered policy is that is how Playblocks are implemented, so if they display the same behaviour that will be a problem
I think the behaviour may be different in R81.20 also
Hi Scott,
i am afraid not - i am on 81.20
an additional layer is also added, when using IOT Protect...
nevertheless, if with or without it (IOT Protect / PlayBlocks), the behaviour is the same - logging shows the wrong rule. (which has logging disabled)
...when deleting the cleanup rule (policy is set to implicit accept), the only thing that changed is, logs are now shown with "implicit cleanup" as matched rule.
SmartTracker does not show a matched rule, so SmartLog inserts the first matching rule for a communication? Someone knows a possibility, so SmartLog adds the "last matching" rule instead of "first"?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 21 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY