CPUG: The Check Point User Group

Resources for the Check Point Community, by the Check Point Community.


First, I hope you're all well and staying safe.
Second, I want to give a "heads up" that you should see more activity here shortly, and maybe a few cosmetic changes.
I'll post more details to the "Announcements" forum soon, so be on the lookout. -E

 

Results 1 to 4 of 4

Thread: Rule or not to rule ?

  1. #1
    Join Date
    2014-10-10
    Posts
    250
    Rep Power
    9

    Default Rule or not to rule ?

    I posted discussion here regarding security policy strategy. Basically I would like to know your opinion on whether to use granular, 'one off' rules or just intrusion and malware inspection. I think that security policy could basically have granular rules ('one offs' per host/port) only for inbound dmz and allow all internal traffic to flow between specific subnets/zones (avoid single hosts and ports listed) under inspection. Let me know.

  2. #2
    Join Date
    2011-08-02
    Location
    http://spikefishsolutions.com
    Posts
    1,668
    Rep Power
    13

    Default Re: Rule or not to rule ?

    Quote Originally Posted by Irek_Romaniuk View Post
    I posted discussion here regarding security policy strategy. Basically I would like to know your opinion on whether to use granular, 'one off' rules or just intrusion and malware inspection. I think that security policy could basically have granular rules ('one offs' per host/port) only for inbound dmz and allow all internal traffic to flow between specific subnets/zones (avoid single hosts and ports listed) under inspection. Let me know.
    I think its hard to say anything besides it depends. I'd say a DMZ shouldn't have unrestricted access in, but it gets really grey when you're talking about internal firewalls. It all starts with knowing what you're protecting. I think in general if you have a source with a lot of places located chances are you need a IA rule. Captive portal is great for this if you can do AD Query. This will make the policies more secure but also much easier to manage.

    Worst thing you can have is a giant policy. At that point it becomes a major chore to figure out if things at matching your security policy or not. In addition you end up requiring more and more people to support poking holes in the firewall. This can turn into a major problem if you start having a constant flood of firewall change requests. If nothing more than for the change of human element making a mistake.

    A good firewall policy shouldn't need much fiddling with.

  3. #3
    Join Date
    2014-10-10
    Posts
    250
    Rep Power
    9

    Default Re: Rule or not to rule ?

    I agree, depends but I think direction is to use inspection and identity awareness like access. I was never able to answer simple question of who have access to what based on any policies I've seen in the past (older than few months). It's like network use static routes instead of dynamic.

  4. #4
    Join Date
    2011-08-02
    Location
    http://spikefishsolutions.com
    Posts
    1,668
    Rep Power
    13

    Default Re: Rule or not to rule ?

    Quote Originally Posted by Irek_Romaniuk View Post
    I agree, depends but I think direction is to use inspection and identity awareness like access. I was never able to answer simple question of who have access to what based on any policies I've seen in the past (older than few months). It's like network use static routes instead of dynamic.
    For sure, that's a main pain point. Assuming we're talking about having AD auth backend, you could use a AI rule that basically allows any valid user in the AD domain to authenticate. Of course you would need to make a list of devices and possible applications that would affect and business would need to understand there could be some interruption, but you already have a quick way to mitigate (just auth to the firewall). You could also do some Identity sharing to the firewall they auth to (again assuming AD Query isn't an option).

    Of course static server to server info wouldn't be fixed with this, that would require a static accept rule. It would take a little while but once you have it to where only authenticated users are allowed in then your logs will start painting a picture for you that you can then say is valid or not and then you can start breaking down access by ad group or what not.

    All of this assumes heavy buy in from management. The goal is to have as limited business interruption as possible.

Similar Threads

  1. SecureXL shows disabled From Rule #113 but rule does not exist
    By blason in forum Feedback To Check Point: Suggestions And Requests
    Replies: 12
    Last Post: 2015-10-28, 18:00
  2. Fetch rule numbers and rule ids
    By steuk in forum Miscellaneous
    Replies: 1
    Last Post: 2012-12-04, 05:03
  3. Client Auth Rule vs Access Rule
    By nachieket in forum Authentication
    Replies: 2
    Last Post: 2010-10-27, 13:54
  4. Tracker Rule/Current Rule Number
    By switzer in forum SmartView Tracker
    Replies: 5
    Last Post: 2008-01-09, 14:57
  5. Cannot install a rule with resources on one of its sources in Rule n
    By roadrunner in forum Content Security/Security Servers/CVP/UFP
    Replies: 0
    Last Post: 2005-08-14, 12:25

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •