- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
I've read that it's not best practice to have multiple service objects defined for the same port/protocol here. And it got me thinking.
What is the best practice in case we need to create rules with overlapping port ranges with the same protocol?
For example, let's assume that
The first thing that comes to my mind is to create different service objects for these different ranges and use them where needed. But if I understand it correctly, it's not the best practice and probably will give me "Services port conflict" warning when installing the policy.
How do we do this in this kinds of situations?
Cheers!
Create the service ranges as required for your rules, but under the Advanced options for those objects, make sure 'Match for Any' is not selected. That way you'll have no warnings on policy install.
Thank you!
What if I also have rules that have 'Any' in service column? How does unchecking 'Match for Any' affect those rules?
It doesn't affect them at all, it just means that the service ranges you create are not considered when matching services for traffic that hits the rules with 'Any' service in them.
So if I, say, unclick the 'Match for Any' in FTP port 21, and allow TCP traffic over port 21 on a rule, the firewall will allow the traffic but won't treat is as FTP protocol anymore. Do I understand it correctly?
Then what would happen if I turned it off on all the services in a 5000 rule Policy Package? I mean, why is it needed then?
You can't "just" allow traffic on port 21 without a service object for port 21. You can create a new TCP service object, give it port 21, do as EmmaP said, and don't assign the protocol type. You can use this custom service in the rule which the firewall will treat with no further deep packet inspection.
The "match for Any" checkbox is a complex process:
1. For any rules whose Service column is "Any",
2. Find all service objects whose checkboxes are "match for Any",
3. If the port number in the packet matches that object's port number,
4. Apply the deep packet inspection protocol handler.
This means if you have a rule where Service column is "Any", and try something "clever" like "SSH over TCP port 80", the firewall will know this is not an HTTP protocol in the packet payload, so the packet will be blocked. Similar will apply if you have Service column "http".
So "Any" does not strictly mean "Any".
Now I understand better, thank you.
And a similar principle goes for higher custom ports, am I correct?
Yes, but any port. 1-65535. Firewall doesn't care about what a "privileged" vs. "non-privileged" port is; that's only meaningful on the host where the port is created.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 21 | |
| 15 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY