sk101606 SMB/CIFS traffic by Anti-Virus blade or Threat Emulation blade.
I am talking about restricting access for a specific path
the topology is:
APP server on DMZ ----> Check Point R80.10 cluster ----> File Server
The connection between the APP Server on the DMZ to the file server is via SMB. the App is accessing a specific directory on the file server and pulling files.
we tested it with CIFS resource but:
1. CIFS Resource doesn't work in R80.10 (sk110519 - When configuring a rule with CIFS resource, policy enforcement does not work as expected and is denied to access all the permitted CIFS shares. As a result, all CIFS traffic is dropped.PRHF-612,
PMTR-12889, PMTR-17086, PMTR-17087 )
2. CIFS resources disable SecureXL accept templates
Any other idea on how to restrict SMB access to a specific path on the file server via Check Point gateway will be very helpful