Rule Matching in the Access Control Policy

The Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. determines the ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. to apply to a connection. This is called matching a connection. Understanding how the Security Gateway matches connections will help you: