Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 

Tip of the Week - Configuring Explicit Rules Instead of Implied Rules

_Val_
Admin
Admin
0 0 368

The Check Point Management Server and its managed objects (Security Gateways, Cluster Members, Log Servers, and so on) communicate with each other using Check Point protocols.

By default, each Access Control policy contains predefined strict Implied Rules that allow the required internal Check Point communication. 

If it is necessary to disable the Implied Rules in your environment, then you must configure the required Explicit Rules in your Access Control policy as described in this SecureKnowledge article.