Configuring the Firewall Access Policy and Blade

These sections explain how to configure the Firewall Access Policy and Blades in a streamlined workflow. You can set the default Access Policy control level, set the default applications and URLs to block and allow secure browsing, and configure User AwarenessClosed A Check Point software blade designed to associate users to IP addresses for logging and control purposes..

Follow these steps to set up and manage your organization's security policy effectively.

Getting Started with Firewall Access Policy Configuration

The Access Policy defines the security requirements for your firewall. It manages incoming, internal, and outgoing traffic and includes these components:

  • Firewall Policy - Manages packet inspection rules.

  • Application & URL Filtering - Controls Internet browsing and application usage.

Follow these steps to configure and manage your organization's security policy:

  1. Go to the Access Policy view > Firewall section > Blade Control page to configure the Firewall Access Policy.

    This is the interface to define the default policy for incoming, internal, and outgoing traffic to and from your organization. Configurations in the Firewall Blade Control page are shown as automatically generated system rules at the bottom of the Rule BaseClosed All rules configured in a given Security Policy. Synonym: Rulebase..

  2. To define manual rules that are exceptions to the default policy defined in this page, go to the Firewall Policy page. You can also define and view the rule based policy.

  3. On the Firewall Servers page, define the default access policy for specific servers within your organization and manage the automatically generated system rules.

Configuring the Firewall Access Policy

Application & URL Filtering

In the Application & URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. section you can define how to handle applications and URL categories on traffic from your organization to the Internet.

Application & URL Filtering are service based features and require Internet connectivity to download the latest signature package for new applications and to contact the Check Point cloud for URL categorization.

Best Practice - We recommend that you block browsing to security risk categories and applications by default.

You can configure additional applications and categories to block by default according to your company's policy. In addition, you can also select to limit bandwidth consumption by specific applications to improve bandwidth control.

Tracking and Logs

To configure traffic logging:

  1. On the Access Policy Control page, go to Tracking.

  2. Specify the log options:

    • Blocked traffic - Options: All, Outgoing, Incoming and Internal

    • Allowed traffic - Options: All, Outgoing, Incoming and Internal

Notes:

  • These settings apply to all the incoming and outgoing traffic blocked or accepted by the default Firewall and Application & URL Filtering automatically generated rules.

  • These settings do not apply to automatically generated rules for VPN, DMZ, and wireless networks.

User Awareness

Configure the appliance to enforce access control for individual users and groups and show user-based logs instead of IP address based logs.

Updates

To ensure accurate URL categorization and application recognition, make sure your database is updated regularly.

Additional Information

The Check Point Application Database contains more than 4,500 applications and 96 million categorized URLs.

Each application has a description, a category, additional categories, and a risk level. You can include applications and categories in your Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI. and URL Filtering rules. If your appliance is licensed for the Application Control & URL Filtering blades, the database is updated regularly with new applications, categories and social networking widgets. This lets you easily create and maintain an up to date policy.

You can see the Application Database from these links in the WebUI:

  • Block other undesired applications

  • Applications & URLs - This opens the Users & Objects > Applications & URLs page.

  • Check Point AppWiki - Use this tool to search and filter the Application & URL Filtering Database.