?
Solved

How do you define an External Zone in Check Point?

Posted on 2014-01-01
2
Medium Priority
?
1,024 Views
Last Modified: 2014-01-27
I'm doing a small, new Firewall installation.  Rather than rely on the predefined CheckPoint objects meaning anything on the public side of the Firewall, I would like to define my own.  Does anyone have a suggestion on how best to do this?

Thanks,

Peter
0
Comment
Question by:Peter023
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 21

Accepted Solution

by:
netcmh earned 2000 total points
ID: 39751825
Is there a specific product you have in mind? Have you looked at the product documentation at https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92703.htm?
0
 
LVL 21

Expert Comment

by:netcmh
ID: 39811893
Thanks for the grade. Good luck.
0

Featured Post

Turn your laptop into a mobile console!

The CV211 Laptop USB Console Adapter provides a direct Laptop-to-Computer connection for fast and easy remote desktop access with no software to install.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question