Solved

Smart Dashboard ngx r60

Posted on 2007-03-20
4
3,086 Views
Last Modified: 2013-11-16
Looking for some suggestions  I have a Smart Dashboard ngx r60 (build 418)-Checkpoint Firewall. I am looking for some rules, ideas, suggestions possible looking to use checkpoint vpn application...I really would like to know configurations also...
0
Comment
Question by:whtupdoc001
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
Dooglave earned 500 total points
Comment Utility
That's a really broad question!

There are really only three standard rules.
1. Stealth Rule
2. NetBios Rule
<--Accept Rules-->
3. Cleanup Rule

Stealth Rule is to make your GW invisible, it comes before any other rule except VPN Rules and Direct Access Rules like SSH and User Auth:
Source: Any | Dest: GW Object | Service: Any | Action: Drop | Log: No

Netbios Rule is an example of how to weed out unwanted logs:
Source: Any | Dest: Any | Service: NBT | Action: Drop | Log: No

<--This is where  you would put you allowed access rules, like LAN Subnet can access any over http, https, and dns-->

Cleanup Rule is the last rule and is used to drop anything not explicitly allowed, it's also used for troubleshooting.
Source: Any | Dest: Any | Service: Any | Action: Drop | Log: Yes

0
 

Author Comment

by:whtupdoc001
Comment Utility
Yeh i know that question is very broad. Any good sites or links that discuss this type of stuff?
0
 
LVL 6

Expert Comment

by:Dooglave
Comment Utility
A good site:
http://www.cpug.org/

There is a ton of information on Check Point's site, They have a bizillion features documented and 10 bizillion NOT documented.
http://www.checkpoint.com/support/technical/documents/docs_r60.html

Just create a free account and you can download these docs.

Focus on the NGX Getting Started first.
Then NGX FireWall and SmartDefense User Guide
Then NGX VPN Guide
0
 

Expert Comment

by:shridhar76
Comment Utility
Hi ,

Basically ther are two rules , cleanup rule , when you are installing checkpoint the first rule is clean up rule means from any source to any destinatin packets are sent has been dropped and logged and anotherone is stealth rule means someone want to touch you firewall forcefully.

The first rule is Stealth Rule and Last rule is Cleanup rule now you can make custom rules in above of them.

Thanks
shridhar
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now