Best practices for Access Control rules
Now, with what we have learned in the previous section, let's combine Check Point's own best practices for Access Control rules as printed in their user guide, with a few additional suggestions:
- When a new policy is created, a single explicit cleanup rule is automatically included. Change its Track settings to Log.
- On top of the policy, create a rule allowing https and ssh_version_2 access to the gateways and cluster members from the IPs of your Check Point administrators' PCs. This rule, together with the next, the stealth rule, will limit the exposure of your gateways if Gaia's System Management | Host Access | Allowed Hosts contains default settings allowing connectivity from any IP address.
- The second rule from the top should be created, named the stealth rule, and configured to deny direct access to the gateways from Any source.
- Create section titles above these three rules describing their purpose...