Chapter 8: Introduction to Policies, Layers, and Rules
In this chapter, we will learn about policy packages, blades used in Access Control policies, and their use in layers. We will look at the possible policy organization methods, rules' structure and capabilities, and their placement based on the packet flows and use of acceleration technology.
In this chapter, we are going to cover the following main topics:
- Access Control policies, layers, and rules
- Packet flows and acceleration
- Best practices for Access Control rules
- Application Control and URL Filtering layer structure
- Logs, tracking depth, and oddities
Access Control policies, layers, and rules
In the previous chapters, we learned how to navigate SmartConsole. Now, let's take a look ...
Get Check Point Firewall Administration R81.10+ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.