al Message-
From: Mailing list for discussion of Firewall-1
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Clive Luk
Sent: Tuesday, January 29, 2013 16:29
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] CP UTM-1 R70.5 policy question
thanks! what if I only
-
From: Mailing list for discussion of Firewall-1
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Clive Luk
Sent: Tuesday, January 29, 2013 16:29
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] CP UTM-1 R70.5 policy question
thanks! what if I only want publ
thanks! what if I only want public internal to access internet on http
and https but not the web servers on dmz or staff internal.
I can't really define a group for internet right?
So does that mean I need to have a bunch of drop rules setting at the
very beginning?
Thanks!
On 30/01/13 01:1
Indirectly, you can accomplish this. Create a group with the relevant
wireless nets, then define a single rule as follows:
Source: {wireless nets}
Destination: NOT {Internal nets}
Service: HTTP, HTTPS
Action: Allow
Bear in mind that you're talking about fundamental differences in
architecture be
Hi all,
I am just wondering if I can define a policy restricted by zone. As I
can see on the CP tracker there is inzone, outzone.
I have UTM-1 with multiple interfaces.
1 x Internet
1 x DMZ
1 x Staff internal
1 x Wireless
1 x Public internal
I am wondering if I can have a policy define to al