- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
No, it is even more interesting for accept action 🙂
Imagine you have a layer with the main rule
Rule number | Source | Destination | Services and Applications | Content | Action |
1 | Internal Networks | Internet | Web Services | Any | Inline Layer |
1.1 | Any | Any | Gambling Category | Any | Drop |
1.2 | Any | Any | Any | Excel Files | Drop |
1.3 | Any | Any | Streaming Services | Accept | Log and Accounting |
1.4 | Any | Any | Any | Accept | Log |
Rule 1.4 is the cleanup for the section.
With the first package, if we cannot guess at once that it is either 1.1 or 1.3 (depends on application), all rules 1.1 to 1.4 will be conditionally matched. As at least one of them saying "Accept", we let traffic through, because we cannot make a final match on the first packet for most of it.
Now, when the data start flowing, we can make a final match. If I am trying to upload an Excel file, it will be blocked by 1.2. If it is a regular web, we will not change final match, which is 1.4. IF we suddenly detect video service, we will re-match to 1.3.
Did I confuse you yet?
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY