- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Re: Quarantine / UnQuarantine Policy for hosts
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Quarantine / UnQuarantine Policy for hosts
Is there any default quarantine(block all incoming/outgoing traffic for the host) policy present in the checkpoint? or should i need to manually create two rules 1st to block incoming traffic and 2nd to block outgoing traffic?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you talking about this in the context of Remote Access or something else?
A screenshot would probably be helpful.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@PhoneBoy
Quarantine / Unquarantine is in terms of network access to limit or deny endpoint access to the network.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Via Remote Access or when connected to the LAN?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When connected to the LAN
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The firewall generally operates on an "implicit deny."
Meaning: that which is not expressly permitted by the access policy is denied by default.
So unless you have explicit rules allowing a given host to traverse the gateway, it won't.
Obviously that won't work for stuff that doesn't traverse the gateway.
We have a firewall that can also live on the endpoint (as part of Harmony Endpoint), which with Endpoint Compliance can restrict the client from connecting to anything on the local LAN as well.
However, that's not related to the gateway at all.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You mean in the firewall by default all the connected device block by default? I want quarantine/unquarantine flow similar to what cisco and fortigate do with endpoint.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Like I said: nothing is allowed through the gateway unless there's an explicit rule allowing it.
However, if you're talking about the Endpoint, we do have a Host Isolation feature as part of Harmony Endpoint.
See: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
And: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Every traffic that is not allowed by explicit rules (i.e. rules you've created) or implied rules ( show via security policies in smart dashboard -> actions -> implied rules) will be dropped
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you're talking about a quick way to block suspicious traffic during an ongoing event/investigation the recommended approach is the Suspicious Activity Monitor features. It's not a gui policy, but simple cli way to block the traffic for a given time.
Read more about it in the documentation:
If you're looking at permanently blocking the traffic, inbound and outbound, an easy way would be to create two drop rules at the top of the policy, and then create a network group that you stick in source on one rule and destination on the other.
Any objects in that group would then be blocked, and the group can easily by updated by API's or manually.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
do i need to install the policy every time after updating the network group?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Any updates to the access policy (including objects in existing rules) require a policy install.
There are certain object types that do not require a policy install to update (Dynamic Objects, Generic Data Center Objects, Access Roles).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yea, like Dameon said, changes to policy will in most cases require installation. You can automate this and trigger it with the API's though.
Or you could use dynamic objects and update those instead.
The approach with SAM doesn't require a policy installation either.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It really depends on the scenario itself...if its just regular traffic, then you might need 2 rules, but if you are referring to say multiple specific hosts/networks, then you can define them same in both source and destination and then action block.
