CPUG: The Check Point User Group | |
Resources for the Check Point Community, by the Check Point Community.
| |
Tim Hall has done it again! He has just released the 2nd edition of "Max Power". | |
|
Generally, traffic is processed by the firewall rules first, then by threat prevention (IPS, antivirus, and so on). These can generate separate logs. The firewall actions include accept, drop, and reject. The threat prevention actions include allow, detect, and deny.
Even if something is accepted by the firewall rules, threat prevention can drop it later. If something is dropped by the firewall rules, it never hits threat prevention.
Zimmie
Zimmie
Bookmarks