- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Rule 1 conflict with Rule 2 for Services & Application https when installing policy
Rule 1 is stealth rule - SRC: Any, DST: GWs, Services: Any, Action:Drop
Rule 2 is under mobile access rule(layer) - SRC: IPs, DST: GW, Services: https, Action: Drop
tell me why the rules conflict and what needs to be changed in order for the policy to be established
I do not understand what you are trying to achieve - Rule 1 Any GWs Any Drop is the big brother of IPs GWs https Drop and will always shadow Rule 2 ! So just leave out Rule2...
I made a mistake with the description, in the second rule Accept.
According to Mobile Access R80.30 Administration Guide in Mobile Access and the Unified Access Policy - Best Practices for Rules:
Do not use a gateway as the Destination in a Mobile Access rule. The rules authorize a user's access to an internal resource. Use Any or the internal hosts of relevant applications in the Destination column.
We set the portal address in Destination (the portal address is the external virtual interface of the cluster), after that our traffic is dropped implied rules - dropped by multiportal infrastructure
Sorry, i can not understand you. You have two conflicting rules in your first post, both with Dest GW, and now you tell us: Do not use a gateway as the Destination in a Mobile Access rule.
I know lots of people may disagree with what I will say, but I always found stealth rule in the policy not that useful. If you think about it, implicit clean up rule would block any unwanted traffic, but its true that at the end of the day stealth rule does serve the purpose of blocking communication to the firewall itself.
Anyway, back to your issue...Im also little confused like @G_W_Albrecht . Can you send a screenshot? I think it would help...happy to do remote if you like and help you out.
I would suggest that you better ask TAC for a solution...
when trying to install a policy with rules 15, 16 enabled and rule 9 disabled, it fails.
after we set the portal address to rule 16 instead of the gateway object in destination, our traffic began to be blocked by implied rules
Can you send screenshot of how currently rules are set?
Andy
We moved the Mobile Access rule above the Stealth rule, but now we have third-party users, when they receive an address from our pool, they lose their local network.
All traffic begins to wrap itself in the tunnel. Can you tell me where to set it up?
Why not contact TAC to get this resolved once and for all ?
I agree 100% with @G_W_Albrecht . Just work with TAC and have this resolved.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 10 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY