Who rated this post

cancel
Showing results for 
Search instead for 
Did you mean: 
Henrik_Noerr1
Advisor

Welcome to 'implied rules' and 'control connections' from Check Point that noone can explain or understand. 🙂

We have multiple MDS setups with global domain and VSX used in all these - and trying to decipher what is opened automatically and with NAT in mind is impossible. In light of these issues, We have access lists and/or 3rd party vendor firewalls in front of Check Point firewalls to actually know what our exposure is. I also have shodan scans running against out public ip address range to discover these issues.

Regards,

Henrik

(1)
Who rated this post