Smart Dashboard ngx r60

Looking for some suggestions  I have a Smart Dashboard ngx r60 (build 418)-Checkpoint Firewall. I am looking for some rules, ideas, suggestions possible looking to use checkpoint vpn application...I really would like to know configurations also...
whtupdoc001Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

DooglaveCommented:
That's a really broad question!

There are really only three standard rules.
1. Stealth Rule
2. NetBios Rule
<--Accept Rules-->
3. Cleanup Rule

Stealth Rule is to make your GW invisible, it comes before any other rule except VPN Rules and Direct Access Rules like SSH and User Auth:
Source: Any | Dest: GW Object | Service: Any | Action: Drop | Log: No

Netbios Rule is an example of how to weed out unwanted logs:
Source: Any | Dest: Any | Service: NBT | Action: Drop | Log: No

<--This is where  you would put you allowed access rules, like LAN Subnet can access any over http, https, and dns-->

Cleanup Rule is the last rule and is used to drop anything not explicitly allowed, it's also used for troubleshooting.
Source: Any | Dest: Any | Service: Any | Action: Drop | Log: Yes

0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
whtupdoc001Author Commented:
Yeh i know that question is very broad. Any good sites or links that discuss this type of stuff?
0
DooglaveCommented:
A good site:
http://www.cpug.org/

There is a ton of information on Check Point's site, They have a bizillion features documented and 10 bizillion NOT documented.
http://www.checkpoint.com/support/technical/documents/docs_r60.html

Just create a free account and you can download these docs.

Focus on the NGX Getting Started first.
Then NGX FireWall and SmartDefense User Guide
Then NGX VPN Guide
0
shridhar76Commented:
Hi ,

Basically ther are two rules , cleanup rule , when you are installing checkpoint the first rule is clean up rule means from any source to any destinatin packets are sent has been dropped and logged and anotherone is stealth rule means someone want to touch you firewall forcefully.

The first rule is Stealth Rule and Last rule is Cleanup rule now you can make custom rules in above of them.

Thanks
shridhar
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software Firewalls

From novice to tech pro — start learning today.