CCSA study guide p 119: To prevent any users from connecting directly to the Security Gateway, add a Stealth rule to your Rule Base. The Security Gateway becomes invisible to users.
on the network.
Stealth Rule — A stealth rule is a rule that should be located as early in your policy as possible, typically immediately after any Management rules. The purpose of this is to drop any traffic destined for the Firewall that is not otherwise explicitly allowed. https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102812
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
BigBear
Highly Voted 1 year, 11 months agoWazza_tp
Most Recent 4 months, 1 week agolucacin
1 year, 2 months agohllovet
1 year, 11 months agobulerias
1 year, 10 months ago