- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Re: Understanding of policy checking
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Understanding of policy checking
Hey guys,
Kinda new to checkpoint and want to understand the product better.
I know its very basic, but its very crucial for troubleshooting and really understanding the product.
Can someone please refer me to a sk, or give an in-depth explanation of the subject.
I know that in R80 and above, the product works in ordered layers.
When a connection matches a rule in the first layer, it goes on the second layer and so on and so on...
Now my question is, when does the NAT policy and threat prevention policy come in place? When does the firewall examine those policies ? Afer the access control policies, in parellel etc ...
Thank you !
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
And here for policy inst.: R80.x - Policy Installation Flowchart
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
And here for policy inst.: R80.x - Policy Installation Flowchart
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @Nadav_Hellman,
Please see the topics Layers in R80 and How do I create an Access Policy for Pre-R80 GWs? for the list of the supported features or read this PDF: Inline_Policy.pdf
