Introducing the Unified Access Control Policy
Define one, unified Access Control Policy. The Access Control Policy lets you create a simple and granular Rule Base All rules configured in a given Security Policy. Synonym: Rulebase. that combines all these Access Control features:
-
Firewall - Control access to and from the internal network.
-
Application & URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. - Block applications and sites.
-
Content Awareness
Check Point Software Blade on a Security Gateway that provides data visibility and enforcement. Acronym: CTNT. - Restrict the Data Types that users can upload or download.
-
IPsec VPN
Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access. and Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. Acronym: MAB. - Configure secure communication with Site-to-Site and Remote Access VPN.
-
Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. - Identify users, computers, and networks.
There is no need to manage separate Rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. Bases. For example, you can define one, intuitive rule that: Allows users in specified networks, to use a specified application, but prevents downloading files larger than a specified size. You can use all these objects in one rule:
- Security Zones
- Services
- Applications and URLs
- Data Types
- Access Roles
Information about these features is collected in one log:
- Network
- Protocol
- Application
- User
- Accessed resources
- Data Types