The Check Point Management Server and its managed objects (Security Gateways, Cluster Members, Log Servers, and so on) communicate with each other using Check Point protocols.
By default, each Access Control policy contains predefined strict Implied Rules that allow the required internal Check Point communication.
If it is necessary to disable the Implied Rules in your environment, then you must configure the required Explicit Rules in your Access Control policy as described in this SecureKnowledge article.