Solved

How do you define an External Zone in Check Point?

Posted on 2014-01-01
2
782 Views
Last Modified: 2014-01-27
I'm doing a small, new Firewall installation.  Rather than rely on the predefined CheckPoint objects meaning anything on the public side of the Firewall, I would like to define my own.  Does anyone have a suggestion on how best to do this?

Thanks,

Peter
0
Comment
Question by:Peter023
  • 2
2 Comments
 
LVL 20

Accepted Solution

by:
netcmh earned 500 total points
ID: 39751825
Is there a specific product you have in mind? Have you looked at the product documentation at https://sc1.checkpoint.com/documents/R76/CP_R76_Firewall_WebAdmin/92703.htm?
0
 
LVL 20

Expert Comment

by:netcmh
ID: 39811893
Thanks for the grade. Good luck.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Domain Share problems 5 55
cannot send E-mails to one company 15 92
EXCHANGE: Extended schema in child domain 7 62
Password managers 1 34
Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question