Who rated this post

cancel
Showing results for 
Search instead for 
Did you mean: 
AkosBakos
Leader Leader
Leader

Hi @Cypress 

What was the sk what you read?

Here are two:

https://support.checkpoint.com/results/sk/sk106597

https://support.checkpoint.com/results/sk/sk102812

  • The Stealth rule should be located as early as possible in the policy, typically placed immediately after the management rules.
    The purpose of the Stealth rule is to drop unauthorized connections destined to the firewall; protecting the firewall from being scanned and attacked.
    The rulebase is likely to be constantly evolving so the effectiveness of the Stealth rule should be periodically tested; it may need to be re-positioned to maintain effectiveness.

image.png

Akos

----------------
\m/_(>_<)_\m/
(1)
Who rated this post