Solved

How do you define an External Zone in Check Point?

Posted on 2014-01-01
2
874 Views
Last Modified: 2014-01-27
I'm doing a small, new Firewall installation.  Rather than rely on the predefined CheckPoint objects meaning anything on the public side of the Firewall, I would like to define my own.  Does anyone have a suggestion on how best to do this?

Thanks,

Peter
0
Comment
Question by:Peter023
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 20

Accepted Solution

by:
netcmh earned 500 total points
ID: 39751825
Is there a specific product you have in mind? Have you looked at the product documentation at https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92703.htm?
0
 
LVL 20

Expert Comment

by:netcmh
ID: 39811893
Thanks for the grade. Good luck.
0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network Switch Connections 8 68
forward schedule of change 1 75
SCCM firewall status and security group members 4 65
Rogue RDP Connections 5 65
This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question