Important Information about Configuring VoIP Security Rules

You can configure the Security Rule BaseClosed All rules configured in a given Security Policy. Synonym: Rulebase. so that the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. allows MGCP calls.

Best Practice - Configure Anti-Spoofing on the interfaces of the Check Point Security Gateway.

Note - The old policy rules are still intact for calls already in-progress and they will not be dropped.