- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi
Under any interface topology settings we have the option This network (internal), IP addresses behind this interface: Not defined.
According to the admin guide:
"
Not Defined - All IP addresses behind this interface are considered a part of the internal network that connects to this interface
"
But if i choose that and try to install the policy i get:
What do i miss here?
In what case should you use that (no defined) option in production networks?
Hey mate,
I just worked with TAC on another endpoint issue and mentioned this to the lady I spoke with and she checked with her colleague and indeed confirmed this is expected behavior and they will request documentation be updated, as it does give an impression it should work, but since it expects some some sort of correct topology defined, wording "not defined" would implicate for that not to happen, though it states it would be everything behind that interface.
Can you send a screenshot of how its defined?
Just tried in the lab, no matter what options I test with non defined, it always fails. I assume must be expected behavior, but not 100% sure.
Hey mate,
I just worked with TAC on another endpoint issue and mentioned this to the lady I spoke with and she checked with her colleague and indeed confirmed this is expected behavior and they will request documentation be updated, as it does give an impression it should work, but since it expects some some sort of correct topology defined, wording "not defined" would implicate for that not to happen, though it states it would be everything behind that interface.
That answer will suffice for now, as I mainly wanted to understand why it behaves that way (failing to install the policy).
The documentation should be updated as well, because it’s the foundation of our knowledge, my friend.
and that leave me wonder what is the usage of "not defined", i mean what use case in production or in lab?
To me, suppose no real use, honestly.
I think there just needs to be a default setting, and picking one of the other options could compromise security as it wouldn't be a default deny configuration.
Makes total sense to me , Emma. It would be cool if there was a pop up if customers picked the less secure option warning them about it. Maybe too much to ask for, but just an idea.
The other options aren't necessarily less secure, there's not really anything that needs popping up so much as it just needs configuring properly. If anti-spoofing is disabled then it's less secure, and in that case a warning is added to the policy install outcome.
Personally, and I also advise customers to do the same, I find defined by routes the best option, because if topology does change, no need to update anything manually for given interface.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 28 | |
| 13 | |
| 12 | |
| 8 | |
| 7 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY