Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Smart Dashboard ngx r60

Posted on 2007-03-20
4
Medium Priority
?
3,109 Views
Last Modified: 2013-11-16
Looking for some suggestions  I have a Smart Dashboard ngx r60 (build 418)-Checkpoint Firewall. I am looking for some rules, ideas, suggestions possible looking to use checkpoint vpn application...I really would like to know configurations also...
0
Comment
Question by:whtupdoc001
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
Dooglave earned 2000 total points
ID: 18760747
That's a really broad question!

There are really only three standard rules.
1. Stealth Rule
2. NetBios Rule
<--Accept Rules-->
3. Cleanup Rule

Stealth Rule is to make your GW invisible, it comes before any other rule except VPN Rules and Direct Access Rules like SSH and User Auth:
Source: Any | Dest: GW Object | Service: Any | Action: Drop | Log: No

Netbios Rule is an example of how to weed out unwanted logs:
Source: Any | Dest: Any | Service: NBT | Action: Drop | Log: No

<--This is where  you would put you allowed access rules, like LAN Subnet can access any over http, https, and dns-->

Cleanup Rule is the last rule and is used to drop anything not explicitly allowed, it's also used for troubleshooting.
Source: Any | Dest: Any | Service: Any | Action: Drop | Log: Yes

0
 

Author Comment

by:whtupdoc001
ID: 18761171
Yeh i know that question is very broad. Any good sites or links that discuss this type of stuff?
0
 
LVL 6

Expert Comment

by:Dooglave
ID: 18761221
A good site:
http://www.cpug.org/

There is a ton of information on Check Point's site, They have a bizillion features documented and 10 bizillion NOT documented.
http://www.checkpoint.com/support/technical/documents/docs_r60.html

Just create a free account and you can download these docs.

Focus on the NGX Getting Started first.
Then NGX FireWall and SmartDefense User Guide
Then NGX VPN Guide
0
 

Expert Comment

by:shridhar76
ID: 20349071
Hi ,

Basically ther are two rules , cleanup rule , when you are installing checkpoint the first rule is clean up rule means from any source to any destinatin packets are sent has been dropped and logged and anotherone is stealth rule means someone want to touch you firewall forcefully.

The first rule is Stealth Rule and Last rule is Cleanup rule now you can make custom rules in above of them.

Thanks
shridhar
0

Featured Post

Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question