- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I have an r80.40 cluster where a risk has been detected i.e. "Outgoing packets from Gateway towards any destination is enabled"
I did a little digging in and it seems this alert is being created as option "Accept outgoing packets originating from Gateway" in Global properties is enabled.
My query is : is it recommended to disable this option ? i read a few R80.40 documents and it seems i can use an updatable object for Checkpoint update services by creating a rule in ACL. is this a recommended approach ? any chance i break something if i disable this option from global properties.
Thanks
It is the easy option NOT to disable this - all CP services can be contacted by the GW. To see this as a risk points to severe restraints, but yes, you can disable the default and use sk131852 for the settings from sk106251.
It is the easy option NOT to disable this - all CP services can be contacted by the GW. To see this as a risk points to severe restraints, but yes, you can disable the default and use sk131852 for the settings from sk106251.
Thanks for the reply..i went through these SKs and i m comfortable with enabling Checkpoint updatable object for GWs.. my only worry is what other traffic this will impact..i mean i don't want to enable access to checkpoint cloud but in the process break anything else like stop control connection traffic which could break the cluster or connection with mgmt server
This is a valid concern. Implied rule allowing GW to send any outgoing traffic it needs to send out. This option is enabled by default, and is it fact recommended by Check Point. This rule covers all outgoingGW connectivity, not only for Check Point services, but for other needs: DNS, certificate validation in case of HTTPSi, and more.
For the management connections specifically, there is another implied rule "Allow control connections", this is also enabled by default and recommended.
i guess i will go back and leave it as it is as it is a recommendation..any document i can present to support this statement ?
thanks
sk43401 discourages disabling implied rules.
I totally agree with @G_W_Albrecht . Also, if you actually read what it says in the help section, it pretty much boils down to the same thing he said.
Accepts all packets from connections that originate at the Check Point Security Gateway.
Allow Security Gateways to access Check Point online services.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 8 | |
| 6 | |
| 6 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 |
Thu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY