EasyManua.ls Logo

Check Point UTM-1 Edge - Setting the Firewall Security Level

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Setting the Firewall Security Level
328 Check Point UTM-1 Edge User Guide
HTTPS access to the UTM-1 Portal (my.firewall, my.hotspot, and my.vpn) is
allowed from all internal networks.
HTTP access to the UTM-1 Portal (my.firewall, my.hotspot, and my.vpn) is
allowed from all internal networks except the WLAN and VAPs. You can allow
HTTP access from the primary WLAN and VAPs by creating a specific user-
defined firewall rule.
When using the print server function (see Using Network Printers on page
629),
access from internal networks to connected network printers is allowed.
Access from the WAN to network printers is blocked.
These rules are independent of the firewall security level.
You can easily override the default security policy, by creating user-defined firewall rules.
For further information, see Using Rules on page
334.
Setting the Firewall Security Level
The firewall security level can be controlled using a simple lever available on the Firewall
page. You can set the lever to the following states.
Table 59: Firewall Security Levels
This
level…
Does this… Further Details
Low Enforces basic control on
incoming connections,
while permitting all
outgoing connections.
All inbound traffic is blocked to the external UTM-1
appliance IP address, except for ICMP echoes
("pings").
All outbound connections are allowed.

Table of Contents

Related product manuals