- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello!
Gateway version 80.40 (Model 15600)
Can you please explain why this is passing with this implied rule? I observe similar behavior in a log that someone attack with ssh from outside to inside.
thank you
One of your cluster member is connecting to Akamai based Check Point update servers. Absolutely normal.
look at this too.
What exactly you do expect me to see here? Please phrase your question in a way it can be understood.
Sorry. I am allowing ssh anywhere so how it is passed (as you can see in the log)?
I can see the rule is matched on Network policy and Application control policy. Apparently you have two layers or more. You allow SSH anywhere, it passes, what is the question? What are you trying to figure our, actually?
I am not allowing ssh, i have 2 ordered layers network and application.
Check your policy once more. There are rules matching. What is looking fishy is that your Implicit Cleanup rule says "Accept".
You must configured Implicit action to be accept for Network, which is super bad. Change it to drop.
Also make sure you read and understand you admin manual and sk112249
I can see an accepted connection from Internal to External on Sync Interface that was accepted by Network Layer Rule 29. Second, Application layer implied rule is listed - what is wrong with that ?
On the application layer why is this automatically accepted? where is this rule 0 and how can i change this?
You do not want disallowing FWs to open outgoing connections. Lots of thinks will break.
My question here is how ssh passed with the rule implicied clean up at network layer? i have no rule that allows ssh and at the end of my rules i have the block all enabled.
Already answered above. You have implied clean rule set to accept. That should not happen. Basically, you are wide open for any traffic which is not matched to your explicit rules.
Where this rule located ? The implicit cleanup rule 0
See the screenshot above. Click on Layer/Advanced
thank you very much, so the scenario everything is denied except allowance rule, in application and network layer the implicit cleanup rule must be at deny.
Right?
Yes. Never ever change implied action on Network layer.
It is okay to have it Allow for Application Control though, because otherwise all non-categorized traffic will be dropped.
My last network rule is any any block all. So you mean that this implied cleanup that we are taking about it accepts before the last rule ?
Block or drop?
drop all
This is very odd. It seems it does not match those SHH connections you are trying to drop. In any case, change implicit action to Drop as soon as possible, and then check again
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
11 | |
9 | |
7 | |
6 | |
6 | |
6 | |
5 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY