Implied Rules

The Check Point Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. and its managed objects (Security Gateways, ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. Members, Log Servers, and so on) communicate with each other through the Check Point protocols. By default, each Access Control policy contains predefined implied rules that allow the required internal Check Point communication.

To view the implied rules in SmartConsole:

  1. From the left navigation panel, click Security Policies.

  2. In the top left panel, click Access Control > Policy.

  3. From the top toolbar, click Actions > Implied Rules.

To configure the implied rules in SmartConsole:

  1. In the top left corner, click Menu > Global properties.

  2. In the Firewall page, select the applicable options and configure the order of the implied rules.

  3. Click OK

  4. Install the Access Control policy on each managed Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / Cluster / Virtual System.

For more information, see sk179346.