You can define the internet for your rule, but it's similar to how the firewall 
figures out what IP's are allowed through anti-spoofing for your internet 
interface when you check "external" in your topology configuration - it's 
anything that's NOT your other internal or DMZ segments.  If you want your 
"internal" networks group to only go to the internet, and not allowed into your 
DMZ's, you define the destination in your rule as a negated object, listing 
your DMZ network(s) or groups.  The internet is simply NOT (internal, & DMZ 
groups).

Of course, that all relies on doing decent config and group coding on your 
groups, rules, and topology.  I know nobody ever gets rushed on the initial 
build, defines the internal network as "10.0.0.0/8" to start, and forgets about 
it when you build a DMZ on 10.200.0.0/24, etc, right?  You get the idea - 
keeping the config straight all the time makes a big difference in your ability 
to code stuff like this easily, and get it correct.

That's a common misunderstanding I've run into on other firewalls for the DMZ 
servers as well.  To let the DMZ servers get to the internet for patches, I've 
seen rules that allow the DMZ to go to "any" on 80/443, thinking that was the 
only way to allow internet access, which then allows the DMZ servers to connect 
to the internal network ranges as well, and destroys the security of the DMZ 
being separated from spreading attacks to the inside.  Usually if the admin 
really doesn't know what they're doing, after the auditor sees that, they add a 
drop rule above that one, specifying DMZ to internal for any ports, with an 
action of "drop".  Completely unnecessary, and sloppy.

Do the same thing there, by allowing DMZ servers to go to NOT (internal) as a 
negated destination, or NOT (internal, other DMZ's, etc) depending on your 
interfaces.  Only one rule, and it follows the usual advice of "deny unless 
explicitly allowed" (which by definition, means any "drop" rules you find in 
the policy other than the cleanup rule are proof that you have rules that are 
allowing more than they should, and you're trying to prune that access with a 
few specific drop rules.)  

Does that make sense, or did I explain the concept badly?


-----Original Message-----
From: Mailing list for discussion of Firewall-1 
[mailto:FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM] On Behalf Of Clive Luk
Sent: Tuesday, January 29, 2013 16:29
To: FW-1-MAILINGLIST@AMADEUS.US.CHECKPOINT.COM
Subject: Re: [FW-1] CP UTM-1 R70.5 policy question

thanks! what if I only want public internal to access internet on http and 
https but not the web servers on dmz or staff internal.

I can't really define a group for internet right?

So does that mean I need to have a bunch of drop rules setting at the very 
beginning?

Thanks!

On 30/01/13 01:13, Independent IT Consultant wrote:
> Indirectly, you can accomplish this. Create a group with the relevant 
> wireless nets, then define a single rule as follows:
>
> Source: {wireless nets}
> Destination: NOT {Internal nets}
> Service: HTTP, HTTPS
> Action: Allow
>
>
> Bear in mind that you're talking about fundamental differences in 
> architecture between Juniper (and Cisco, for that matter) and Check Point.
> Juniper and Cisco use interface-centric ACLs, whereas Check Point is 
> an object-oriented firewall.
>
>
>
> On Tue, Jan 29, 2013 at 1:09 AM, Clive Luk <cl...@sl.nsw.gov.au> wrote:
>
>> Hi all,
>>
>> I am just wondering if I can define a policy restricted by zone. As I 
>> can see on the CP tracker there is inzone, outzone.
>>
>> I have UTM-1 with multiple interfaces.
>>
>> 1 x Internet
>> 1 x DMZ
>> 1 x Staff internal
>> 1 x Wireless
>> 1 x Public internal
>>
>> I am wondering if I can have a policy define to allow all wireless to 
>> access internet and DMZ via http and https but not to other interface.
>>
>> I have seen a juniper firewall can define policy base on zone.
>>
>>
>> Cheers,
>> Clive
>>
>> Email secured by Check Point
>>
>> ==============================**===================
>> To set vacation, Out-Of-Office, or away messages, send an email to 
>> lists...@amadeus.us.**checkpoint.com<lists...@amadeus.us.checkpoint.c
>> om>
>> in the BODY of the email add:
>> set fw-1-mailinglist nomail
>> ==============================**===================
>> To unsubscribe from this mailing list, please see the instructions at 
>> http://www.checkpoint.com/**services/mailing.html<http://www.checkpoi
>> nt.com/services/mailing.html> 
>> ==============================**===================
>> If you have any questions on how to change your subscription options, 
>> email fw-1-ow...@ts.checkpoint.com 
>> ==============================**===================
>>
>> Email secured by Check Point
>>
>
> =================================================
> To set vacation, Out-Of-Office, or away messages, send an email to 
> lists...@amadeus.us.checkpoint.com
> in the BODY of the email add:
> set fw-1-mailinglist nomail
> =================================================
> To unsubscribe from this mailing list, please see the instructions at 
> http://www.checkpoint.com/services/mailing.html
> =================================================
> If you have any questions on how to change your subscription options, 
> email fw-1-ow...@ts.checkpoint.com 
> =================================================
>
>

Email secured by Check Point

=================================================
To set vacation, Out-Of-Office, or away messages, send an email to 
lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your subscription options, email 
fw-1-ow...@ts.checkpoint.com =================================================
***************************************************************************
The information contained in this communication is confidential, is
intended only for the use of the recipient named above, and may be legally
privileged.

If the reader of this message is not the intended recipient, you are
hereby notified that any dissemination, distribution or copying of this
communication is strictly prohibited.

If you have received this communication in error, please resend this
communication to the sender and delete the original message or any copy
of it from your computer system.

Thank You.
****************************************************************************

=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to lists...@amadeus.us.checkpoint.com
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
fw-1-ow...@ts.checkpoint.com
=================================================

Reply via email to