Firewall Policy Rules Tips and Best Practices - Check Point.avi

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 ธ.ค. 2024

ความคิดเห็น • 69

  • @globalqtheartist
    @globalqtheartist 11 ปีที่แล้ว

    very informative. i'm working to become CCNP Security certified but i'm noticing that a lot of the jobs associated with this certification want you to have check point knowledge before they will hire you. Your video was very straight forward and easy to understand. Thank you for taking the time to make this video.

  • @j_owens6208
    @j_owens6208 9 ปีที่แล้ว

    Thank you for taking the time to make the video Jafer. I was researching Check Point firewalls and looking for videos to illustrate the GUI and how easy it is to navigate and create rules...so this was perfect!

  • @TalkMyShiit
    @TalkMyShiit 11 ปีที่แล้ว

    Great video and this has taught me ALOT about CP FWs. I too have a ASA background and CP is in high demand and I appreciate you sharing your knowledge!!

  • @kivikocher8458
    @kivikocher8458 5 ปีที่แล้ว

    Brilliant, short and concise, very very useful indeed.

  • @JaferSabir
    @JaferSabir  11 ปีที่แล้ว

    Thank you. Yes you are right, many jobs require some level of knowledge on Check Point, for two reasons in my opinion.
    First is because Check Point being the leaders in next generation firewalls have a lot of gateways deployed out there.
    Second reason, and this is mainly from a professional services/deployment point of view, you need to have in depth knowledge on Check Point migrations and upgrade, which I have recently mastered myself.
    I may do some videos soon around this area :-)

    • @JaferSabir
      @JaferSabir  3 ปีที่แล้ว

      Thank you and good luck 👍

  • @ratneshwarsingh9007
    @ratneshwarsingh9007 9 ปีที่แล้ว +2

    its awsome dear ... i have downloaded all the video for self study.... realy its a big help

    • @JaferSabir
      @JaferSabir  9 ปีที่แล้ว +1

      +ratneshwar singh Good to hear ratneshwar, thanks for comment :)

  • @JaferSabir
    @JaferSabir  12 ปีที่แล้ว

    I'm glad it was useful, thanks for the comment. :-)

  • @kencheng2929
    @kencheng2929 5 ปีที่แล้ว

    Awesome tutorial. But won’t all those logs kill the cpu?

  • @JaferSabir
    @JaferSabir  12 ปีที่แล้ว

    Hi, the stealth rule will block anything to the gateway itself, any rule created going through the gateway will work fine regardless of the stealth rule, hope that makes sense, thanks. :-)

  • @TechFreak51
    @TechFreak51 9 ปีที่แล้ว +1

    WOW ... Great .. very helpful !

  • @MakoXL
    @MakoXL 12 ปีที่แล้ว

    right jafer, anyone trying to ping, ssh, ftp, sftp, etc to the firewall's physical (or logical) interface address will be denied. This rule should be very high in the rulebase. You're more likely getting dropped by the 'cleanup' rule generally configured at the end of the rulebase. This will happen when you have not configured a rule specifically for the traffic you are being dropped on

  • @fairplaycity
    @fairplaycity 3 ปีที่แล้ว

    Thank you for this video, Great job

  • @2008Swapnil
    @2008Swapnil 8 ปีที่แล้ว

    Very Helpful videos Jafer....Nice work

  • @LogicStandsBeforeGod
    @LogicStandsBeforeGod 11 ปีที่แล้ว

    @jafer125
    I come from Cisco ASA/PIX background. I am trying to make sense out of adding policy.
    When you add a policy, are you adding an ACL to given interface, if so, how do you specify which interface you are adding the ACL ?

  • @catsarehere67
    @catsarehere67 3 ปีที่แล้ว

    yep, but, hmm how to discern from a "normal" firewall W11, if maybe it's been manipulated....so every time I restore default, I restore "others" default and not W11...? the right proper firewall from scratch.. :) is? thanks a lot in advance.

  • @jamalelbouhali7094
    @jamalelbouhali7094 9 ปีที่แล้ว

    I have already instsalled Elastix on the virtual machine box. I also configured the soft phones. I'd like to know how one can securise Elastix against attacks.
    Thanks a lot for your help.

  • @TalkMyShiit
    @TalkMyShiit 11 ปีที่แล้ว

    You are right... I am finding ALOT of Enterprises use CP as stateful FWs. I am from the Cisco side of the house with ASAs and the CPs seem to be the better solution... IMO

  • @Hypersonik
    @Hypersonik 9 ปีที่แล้ว

    Excellent - really useful and a nice refresher!!

  • @ygal
    @ygal 10 ปีที่แล้ว

    Hi Jafer , Great video , really helpful.

    • @JaferSabir
      @JaferSabir  10 ปีที่แล้ว

      Hi Ygal, thank you for the kind words. :)

  • @thang3342
    @thang3342 10 ปีที่แล้ว

    very nice video and useful. This help me a lot. I thank you a lot

  • @cutekids5074
    @cutekids5074 5 ปีที่แล้ว

    I have questions if I deleted the management policy,I will loose the access to firewall,if my firewall is miles away ,what should I do?

  • @darkmatrix80
    @darkmatrix80 10 ปีที่แล้ว

    Nice Video -- seems very intuitive to set up checkpoint FW, instead of looking through the drop down menu, could you not just type the protocol in the search box?

  • @virabhadra007
    @virabhadra007 12 ปีที่แล้ว

    Hi,i have one dote..
    we created stealth rule on above video but below that rule won't work because stealth rule come first and it reject all the request....am i right..

  • @ragimagnet
    @ragimagnet 10 ปีที่แล้ว +1

    Nice video, My thought.... The rule 2 hides the rule 5. Ping from 10.10.X.X is allowed in rule 1. If want to allow ping through it should be motioned inside management label. :)

  • @robertodimas6459
    @robertodimas6459 10 ปีที่แล้ว +1

    Thanks for this illustrative video

  • @rajasekarans8141
    @rajasekarans8141 8 ปีที่แล้ว

    how to download the above mentioned video software?

  • @lucholenny
    @lucholenny 8 ปีที่แล้ว

    Hi Sabir,
    great videos , do you have more videos on R77, Thank you for sharing your knowledge.

  • @billpmcse
    @billpmcse 11 ปีที่แล้ว

    If you have not set the rule to log will you be able to see how many times the rule was hit?

  • @sawsankhizzou8963
    @sawsankhizzou8963 8 ปีที่แล้ว

    please i watched a video of site to site vpn and the ping failed and i don't know what to add from this video for successing the ping sorry for my english please answer me

  • @asuteles201
    @asuteles201 4 ปีที่แล้ว

    Hi sir how to check service that is running at security gateway using smartdashboard thank you

  • @shatrughansingh5718
    @shatrughansingh5718 8 ปีที่แล้ว

    can you give the advise of create access rule and block websites in R77.20.40

  • @khaledashafy2226
    @khaledashafy2226 10 ปีที่แล้ว +1

    Thanks very much, great work.

  • @virabhadra007
    @virabhadra007 12 ปีที่แล้ว

    i got it. thank you.. upload more videos it helpful for all..thank you for replaying.

  • @JaferSabir
    @JaferSabir  11 ปีที่แล้ว +1

    Great, yes will do soon. :-)

  • @ThisMomentIsHeated
    @ThisMomentIsHeated 7 ปีที่แล้ว

    You can just type the object or services into the box when adding to the rules instead of scrolling through the list.

  • @raj862
    @raj862 10 ปีที่แล้ว +2

    Nice video Jafer..really helpful.!! Do u any soft study book for Checkpoint?

    • @JaferSabir
      @JaferSabir  10 ปีที่แล้ว +1

      Thanks Ajay :)The only ones I use are the official manuals from Check Point which are good. The training guides would be useful but quite expensive as well.

  • @davidepalermo7028
    @davidepalermo7028 11 ปีที่แล้ว

    Hi Jafer, your video is very helpful, I'm CCNP, I need to use Checkpoint for my next job, I didn't know it before. Let me know about all material for beginners ( your video, guide etc.. ) Thank you , Davide from Italy

  • @ganesanpakkirisamy3305
    @ganesanpakkirisamy3305 5 ปีที่แล้ว

    Thank you for sharing ❤️🙏 Awesome 💕

  • @puravshah4403
    @puravshah4403 11 ปีที่แล้ว

    your videos are very helpful, please make some videos on Smart reporter and smart event if you get a chance, those are rare to find.
    Thank you very much.

  • @JaferSabir
    @JaferSabir  12 ปีที่แล้ว

    Yes will do soon. :-)

  • @selamawitdegefa4861
    @selamawitdegefa4861 3 ปีที่แล้ว

    Thank you very much it's nice tutorial

  • @futurDaFutur
    @futurDaFutur 11 ปีที่แล้ว

    great stuff, thank you

  • @dreamzz257
    @dreamzz257 9 ปีที่แล้ว

    nice video.....

  • @saqibali143
    @saqibali143 12 ปีที่แล้ว

    Can you make a video on Application and URL Filtering? Thanks

  • @baskaran98
    @baskaran98 12 ปีที่แล้ว

    Great video , i am looking forward your next site to site vpn one ..Thanks

  • @JaferSabir
    @JaferSabir  11 ปีที่แล้ว

    Will do, thanks

  • @hefko
    @hefko 10 ปีที่แล้ว +2

    Nice video, anyway I agree with Martin Z that rule number 3 (number 4 before re-arrengements) is not Internet rule, you have limited only services, but any destination means you can also reach prrivate IP ranges. And my personal tip, please use searchbox for objects like service etc, it will significantly shorten time amount for picikng them. Anyway thanks for posting!

    • @JaferSabir
      @JaferSabir  10 ปีที่แล้ว

      hefko Hi hefko, thanks for the feedback and sharing your knowledge with us, and yes good point on both.

  • @RABWA333
    @RABWA333 12 ปีที่แล้ว

    thanks was useful

  • @itmaster8536
    @itmaster8536 8 ปีที่แล้ว

    I cant block youtube, do the blocking category , but when using google chrome can see youtube.
    with no firefox
    IE no.
    chrome yes

    • @Mrjpisgreat
      @Mrjpisgreat 8 ปีที่แล้ว

      Were you blocking youtube using the app control blade? If so, https inspection would need to be enabled for it to work correctly.

  • @JaferSabir
    @JaferSabir  12 ปีที่แล้ว

    Thanks

  • @Martinz_Place
    @Martinz_Place 10 ปีที่แล้ว +2

    rule number 3 ...... its not an internet access because destination is any

    • @jeffcojd
      @jeffcojd 7 ปีที่แล้ว

      You are correct, when the destination is any that's telling that source it can go anywhere INTERNAL as well as external. I would suggest removing the "Any" as the destination and either add his internal/dmz addresses as the destination and mark it as negate or easier just add all RFC 1918 addresses and mark it negate and that way all the traffic from that source will go to the internet and everything else will be dropped

  • @rajasekarans8141
    @rajasekarans8141 8 ปีที่แล้ว

    pls forward to me that software link

  • @krantichowdaria8853
    @krantichowdaria8853 6 ปีที่แล้ว

    Topic is superb but the video play first then Audio play next so here still confuse

  • @MakoXL
    @MakoXL 12 ปีที่แล้ว

    we actually never look at the comment for a specific rule. It should be logically named....... some people have random custom services masquerading as regular ones. Just name things properly.............. i recommend "Reasonforcustomproto_port#" or something

  • @jeronims3079
    @jeronims3079 8 ปีที่แล้ว

    It is for very begginer 'admins'...:(

  • @elayarajaconqueror6994
    @elayarajaconqueror6994 9 ปีที่แล้ว

    Any one teach to me please

  • @MakoXL
    @MakoXL 12 ปีที่แล้ว

    are you a partner or something, jafer125? What's ur SR # or user center email address :P