Hi @Cypress
What was the sk what you read?
Here are two:
https://support.checkpoint.com/results/sk/sk106597
https://support.checkpoint.com/results/sk/sk102812
- The Stealth rule should be located as early as possible in the policy, typically placed immediately after the management rules.
The purpose of the Stealth rule is to drop unauthorized connections destined to the firewall; protecting the firewall from being scanned and attacked.
The rulebase is likely to be constantly evolving so the effectiveness of the Stealth rule should be periodically tested; it may need to be re-positioned to maintain effectiveness.

Akos
----------------
\m/_(>_<)_\m/