Use Cases for the Unified Rule Base
Here are some use cases that show examples of rules that you can define for the Access Control Policy.
This use case shows an example unified Access Control Policy. It controls applications and content in one Ordered Layer.
No. |
Name |
Source |
Destination |
VPN |
Services & Applications |
Content |
Action |
Track |
---|---|---|---|---|---|---|---|---|
General compliance (1) |
||||||||
1 |
Block categories |
Any |
Internet |
Any |
Anonymizer Critical Risk |
Any |
Drop Block Message |
Log |
Block risky executables (2) |
||||||||
2 |
Block download of executable files from uncategorized and high risk sites |
InternalZone |
Internet |
Any |
Uncategorized High Risk |
Download Traffic Executable File |
Drop |
Log |
Credit card data (3-4) |
||||||||
3 |
Allow uploading of credit cards numbers, by finance, and only over HTTPS |
Finance (Access Role) |
Web Servers |
Any |
https |
Upload Traffic PCI - Credit Card Numbers |
Accept |
Log |
4 |
Block other credit cards from company Web servers |
Any |
Web Servers |
Any |
Any |
Any Direction PCI - Credit Card Numbers |
Drop |
Log |
Inform about sensitive data over VPN (5) |
||||||||
5 |
Inform the user about sensitive data from VPN sites |
Any |
Any |
RemoteAccess |
Any |
Any Direction Salary Survey Report |
Inform |
Log |
Cleanup (6) |
||||||||
6 |
Any |
Any |
Any |
Any |
Any |
Accept |
Log |
Explanations for rules:
Rule |
Explanation |
---|---|
1 |
General Compliance section - Block access to unacceptable Web sites and applications. |
2 |
Block risky executables section - Block downloading of high risk executable files. |
3-4 |
Credit card data section - Allow uploading of credit cards numbers only by the finance department, and only over HTTPS. Block other credit cards. |
5 |
Block sensitive data over VPN section - A remote user that connects over the organization's VPN sees an informational message. |
6 |
cleanup rule - Accept all traffic that does not match one of the earlier rules. |
This use case shows an example Access Control Policy that controls Web traffic. The Web server rules are in an Inline Layer Set of rules used in another rule in Security Policy..
No |
Name |
Source |
Destination |
Services & |
Content |
Action |
Track |
---|---|---|---|---|---|---|---|
1 |
Headquarter WEB traffic - via proxy |
HQ |
Proxy |
Web Proxy |
Any |
Ask Web Access Policy |
Log |
2 |
Allow Proxy to the Internet |
Proxy |
Internet |
Web |
Any |
Accept |
None |
3 |
Allow local branch to access the internet directly |
Local Branch |
Internet |
Web |
Any |
Ask Web Access Policy |
Log |
4 |
Web Servers |
InternalZone |
Web Servers |
Web |
Any |
Web Servers protection |
N/A |
4.1 |
Block browsing with unapproved browsers |
Any |
Any |
NEGATED Google Chrome |
Any |
Drop |
Log |
4.2 |
Inform user when uploading Credit Cards only over HTTPS |
Any |
Any |
https |
Upload Traffic PCI - Credit Card Numbers |
Inform Access Noti... |
Log |
4.3 |
Block Credit Cards |
Any |
Any |
Any |
Any Direction PCI - Credit Card Numbers |
Drop Block Message |
Log |
4.4 |
Block downloading of sensitive content |
Any |
Any |
Any |
Download Traffic HIPAA - Medical Record Headers |
Drop |
Log |
4.5 |
Cleanup rule |
Any |
Any |
Any |
Any |
Accept |
None |
5 |
Ask user when sending credit cards to PayPal |
InternalZone |
Internet |
PayPal |
Any Direction PCI - Credit Card Numbers |
Ask Company Policy |
Log |
6 |
Cleanup rule |
Any |
Any |
Any |
Any |
Drop |
Log |
Explanations for rules:
Rule |
Explanation |
---|---|
4 |
This is the parent rule of the Inline Layer. The Action is the name of the Inline Layer. If a packet matches on the parent rule, the matching continues to rule 4.1 of the Inline Layer. If a packet does not match on the parent rule, the matching continues to rule 5. |
4.1 |
If a packet matches on rule 4.1, the rule action is done on the packet, and no more rule matching is done. If a packet does not match on rule 4.1, continue to rule 4.2. The same logic applies to the remaining rules in the Inline Layer. |
4.5 |
If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup Rule is applied. The Cleanup rule is a default explicit rule. You can change or delete it. We recommend that you have an explicit cleanup rule as the last rule in each Inline Layer and Ordered Layer. |
This use case shows a Policy that controls the upload and download of data from and to the organization.
There is an explanation of some of the rules below the Rule Base All rules configured in a given Security Policy. Synonym: Rulebase..
No |
Name |
Source |
Destination |
Services & Applications |
Content |
Action |
Track |
---|---|---|---|---|---|---|---|
Regulatory compliance |
|||||||
1 |
Block the download of executable files |
InternalZone |
Internet |
Any |
Download Traffic Executable file |
Drop |
Log |
2 |
Allow uploading of credit cards numbers by finance users, only over HTTPS |
Finance (Access Role) |
Web Servers |
https |
Upload Traffic PCI - Credit Card Numbers |
Accept |
Log |
3 |
Block other credit cards from company Web servers |
InternalZone |
Web Servers |
Any |
Any Direction PCI - Credit Card Numbers |
Drop Block Message |
Log |
Personally Identifiable Information |
|||||||
4 |
Matches U.S. Social Security Numbers (SSN) allocated by the U.S. Social Security Administration (SSA). |
InternalZone |
Internet |
Any |
Upload Traffic U.S. Social Security Numbers - According to SSA |
Inform Access Notifi... |
Log |
5 |
Block downloading of sensitive medical information |
InternalZone |
Internet |
Any |
Download Traffic HIPAA - Medical Records Headers |
Drop Block Message |
Log |
Human Resources |
|||||||
6 |
Ask user when uploading documents containing salary survey reports. |
InternalZone |
Internet |
Any |
Upload Traffic Salary Survey Report |
Ask Company Policy |
Log |
Intellectual Property |
|||||||
7 |
Matches data containing source code |
InternalZone |
Internet |
Any |
Any Direction Source Code |
Restrict source code |
N/A |
7.1 |
|
Any |
Any |
Any |
Download Traffic Source Code |
Accept |
Log |
7.2 |
|
Any |
Any |
Any |
Upload Traffic Source Code |
Ask Company Policy |
Log |
7.3 |
Cleanup Inline Layer |
Any |
Any |
Any |
Any |
Drop Block Message |
Log |
Explanations for rules:
Rule |
Explanation |
---|---|
1-3 |
Regulatory Compliance section - Controls the upload and download of executable files and credit cards. You can set the direction of the Content. In rule 1 it is Download Traffic, in rule 2 it is Upload Traffic, and in rule 3 it is Any Direction. Rule 1 controls executable files, which are File Types. The File Type rule is higher in the Rule Base than rules with Content Types (Rules 2 to 7). This improves the efficiency of the Rule Base, because File Types are matched sooner than Content Types. |
4-5 |
Personally Identifiable Information section - Controls the upload and download of social security number and medical records. The rule Action for rule 4 is Inform. When an internal user uploads a file with a social security number, the user sees a message. |
6 |
Human resources section - Controls the sending of salary survey information outside of the organization. The rule action is Ask. If sensitive content is detected, the user must confirm that the upload complies with the organization's policy. |
7 |
Intellectual Property section - A group of rules that control how source code leaves the organization. Rule 7 is the parent rule of an Inline Layer (see Ordered Layers and Inline Layers). The Action is the name of the Inline Layer. If a packet matches on rule 7.1, matching stops. If a packet does not match on rule 7.1, continue to rule 7.2. In a similar way, if there is no match, continue to 7.3. The matching stops on the last rule of the Inline Layer. We recommend that you have an explicit cleanup rule as the last rule in each Inline Layer |
This use case shows some examples of URL Filtering Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. and Application Control Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI. rules for a typical policy that monitors and controls Internet browsing. (The Hits, VPN and Install On columns are not shown.)
No. |
Name |
Source |
Destination |
Services & Applications |
Action |
Track |
Time |
---|---|---|---|---|---|---|---|
1 |
Liability sites |
Any |
Internet |
Potential |
Drop Blocked Message |
Log |
Any |
2 |
High risk applications |
Any |
Internet |
High Risk iTunes Anonymizer (category) |
Drop Blocked Message |
Log |
Any |
3 |
Allow IT department Remote Admin |
IT (Access Role) |
Any |
Radmin |
Allow |
Log |
Work- |
4 |
Allow Facebook for HR |
HR(Access Role) |
Internet |
|
Allow Download_1Gbps |
Log |
Any |
5 |
Block these categories |
Any |
Internet |
Streaming Media Protocols Social Networking P2P File Sharing Remote Administration |
Drop Blocked Message |
Log |
Any |
6 |
Log all applications |
Any |
Internet |
Any |
Allow |
Log |
Any |
Explanations for rules:
Rule |
Explanation |
||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 |
Liability sites - Blocks traffic to sites and applications in the custom Potential_liability group. The UserCheck Blocked Message is shown to users and explains why their traffic is blocked. See Blocking Sites. Scenario: I want to block sites that are associated with categories that can cause liability issues. Most of these categories exist in the Application Database but there is also a custom defined site that must be included. How can I do this? You can do this by creating a custom group and adding all applicable categories and the site to it. If you enable Identity Awareness Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. on a Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources., you can use it together with URL Filtering to make rules that apply to an access role. Use access role objects to define users, machines, and network locations as one object. In this example:
To create a custom group:
You can now use the Liability_Sites group in the Access Control Rule Base. In the Rule Base, add a rule similar to this: In the Security Policies Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. view of SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., go to the Access Control Policy.
|
||||||||||||||
2 |
High risk applications - Blocks traffic to sites and applications in the High Risk category and blocks the iTunes application. The UserCheck Block Message is shown to users and explains why their traffic is blocked. |
||||||||||||||
3 |
Allow IT department Remote Admin - Allows the computers in the |
||||||||||||||
4 |
Allow Facebook for HR - Allows computers in the |
||||||||||||||
5 |
Block these categories - Blocks traffic to these categories: Streaming Media, Social Networking, P2P File Sharing, and Remote Administration. The UserCheck Blocked Message is shown to users and explains why their traffic is blocked.
|
||||||||||||||
6 |
Log all applications - Logs all traffic that matches any of the URL Filtering and Application Control categories. |