- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
I have just combined the Firewall and Applications & URL Filtering Blades into one policy and I have a question about a rule and where I should place it.
With my old split policies, I had a "Recommended Categories to Block" on the Application policy as the last rule before my "Default Allow All" Rule and I am wondering the best place on where to add this for my combined rule base now.
I have decided at the moment to place it in my "Clean up rules" section and was seeing if anyone had any thoughts on this?
Thanks
You missed completely the rule 12 from the old policy. New policy will not allow any application connectivity to internet.
It would be better to create an inline layer for internet access with copy/paste of your older APC policy as sub-rules there
At the moment then Rule 3 would allow access through to the Internet without filtering. Is it actually blocking access at Rule 4 at all?
I am here with @mdjmcnally , rule 3 basically shadows 4. I would like to repeat my suggestion of creating a sub-layer which will filter out unwanted applications and allow the rest.
The way your new rulebase is build now, it is not the case.
So I understand then that the source on the IronPort rule 3 is an actual host, with it being blurred out then looks the same as the destination, hence our confusion as looks like is an Any, Any, Any rule
So Traffic flow is
If using proxy then then Source at the Firewall is seen as the IronPort Proxy and matches Rule 3 and relies on the IronPort/Proxy to do the filtering. So any traffic from the IronPort is seen as OK by the Firewall and not filtered.
If not using the Proxy then won't match Rule 3 so moves through to Rule 4. If matches that then the user gets a Block Page and you get a seperate log entry specific so can see against specific rule.
If doesn't match the Rule 4 then moves through to Rule 6 where gets dropped but the User gets no Block Page and obviously the log is jsut showing as Drop Rule so not as easy to distinguish in the logs.
Rule 4 won't block anything in this case that wouldn't get dropped at Rule 6 anyway but you will see logged seperately to the generic block all and the user a block page.
If you want to ensure that drop access to those then want it high on the rulebase as otherwise other rules potentially can allow access to them. These are categories that you don't want access to under any circumstances.
You can then use other rules or potentially an inline layer to control what can access.
inline layer is useful as can then delegate admin of the inline layer so that if use a rule that permits say a dept access to the Internet then call an inline layer, you can delegate admin of that layer for the dept to the dept head. Also means that they can control what there dept has.
I would suggest hit counts for changing rule order...
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY