- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi CheckMates,
I’d like to introduce a concept that could simplify and streamline security policy management in environments with multiple Check Point clusters, particularly those that currently rely on dedicated policies for each cluster. The idea is to leverage a single global security policy with inline layers for different clusters, effectively recreating the functionalities of an MDS (Multi-Domain Security Management, e.g. global rules, global objects) setup without the complexity of managing multiple policies.
Concept
Imagine using a single, centralized SmartCenter policy to define your global security framework, while still enabling distinct security configurations for each of your clusters. This is done by applying Inline Layer Rules that target specific gateways or groups of gateways as needed, all under the umbrella of a global policy.
Here’s an example breakdown of how it might work:
Global firewall section
These rules apply globally across all gateways in the infrastructure.
Inline Section
Each parent rule here essentially represents an “Inline Layer” that links to specific configurations for the individual clusters or gateway types in your infrastructure. Note: You cannot have multiple inline layers like these for the same installation targets, i.e. your global section (see rule #4) must be ordered within your normal rulebase and cannot be an inline layer.
How to verify the rulebase installed on each gateway
Simply run db_tool -p $FWDIR/state/local/FW1 get_rules to verify the installed rulebase on your gateway.
Why this matters
This approach can be especially useful when you are working with multiple clusters but want to minimize the overhead of managing several, potentially lengthy security policies. Instead of managing one policy per cluster, you can consolidate these policies into a single global policy, then layer your specific configurations (firewall, VPN, etc.) on top of that, all while continuing to manage individual gateway-specific settings in the inline layers.
By doing this, you can:
Ease migration: You can migrate from multiple security policies to a unified model incrementally, all while keeping your network fully operational.
What I'm looking for
I’d love to hear feedback from the community. Have you tried similar approaches in your environments? What challenges have you faced with consolidating multiple security policies of several clusters or gateways? Do you see any potential roadblocks with the approach I’ve outlined? And are there any specific use cases where this would be particularly beneficial—or maybe not the best fit?
Looking forward to hearing your thoughts, ideas, and any suggestions you might have!
@mroethlein
I always thought an excellent use for an inline layer is an Internet Access Policy.
You can restrict the outgoing ports this way, too.
You can also use inline layers as a form of policy optimization for services that force slowpath.
That's just my own vision, though I am interested in seeing how others are leveraging these features.
One thing to be aware of here is the total number of layers allowed (251, I think).
I would be slightly concerned someone might try to add an inline layer in the "Global" section, then would be confused by why tons of other lower rules are suddenly not being hit. As long as people who implement this make sure everybody understands that all changes to the top-level rules need expert review, it seems good.
I'm sure you know, too, but you can also delegate administrative permissions to a layer. Assign specific admins permissions to the whole policy, but then delegate "lesser" admins to just their own layer, etc. Great way to limit the blast radius of mistakes by others (and limits your liability!). double-plus-bonus win? 😆
Global policys are great, core feature of MDS 🙂
i would say an important thing when working with multiple firewalls is to decide early where to place the rules in case there are several firewalls that the traffic passes thru.
In regards to inline layer, make sure to use it where u have dynamic objects such as geo blocking.
ie.. use inline layer with source external interface if wanting to block a specific country.
This as, if the GW is loose its DB of the dynamic objects it translate to an "any" object.
During a some upgrades we done this meant outages for alot of traffic before using inline layers in that case.
Personally i would also be careful on what GW you do combine in the same policy.
ie if you have 10 GW that all are acting as "office firewalls" to reach internet, by all means use one policy.
But i would avoid putting datacenter firewalls and office firewalls together in the same policy are rely on install on.
It all looks great in concepts, but datacenter firewalls tends to end up in several hundred lines of policy.
The only issue I can think of is that per-policy package settings, which can normally be set separately for a single gateway, may not be available. For example, whether Autonomous Threat Prevention is enabled on a gateway is controlled at the object level, but the Autonomous profile selection is set per policy package, and all gateways in that policy package must use the same one. There may be other examples of this, but I can't think of any right now.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 15 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsThu 08 Jan 2026 @ 05:00 PM (CET)
AI Security Masters Session 1: How AI is Reshaping Our WorldAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY