Summary
It looks like we accomplished quite a bit in this chapter. We defined the structure of our access control policy and created rules for the firewall/networking layer. We created the APCL/URLF inline layer and rules for categories and applications using different actions. To properly process the application-specific rules, we implemented an HTTPS Inspection policy and performed a number of operations with certificates. To round up this chapter, we implemented Identity Awareness using an external directory service and were able to use access roles to replace static objects in our rules.
In the next chapter, we’ll cover the basics of VPNs on the Check Point platform and build both site-to-site and remote access VPN communities.