Tuesday, 23 January 2018

Inspection module flow chart?

Packets are not processed by higher protocol-stack layers, unless the Security Gateway verifies that they comply with Security Policies.


               Packet Flow Through the INSPECT Engine If packets pass inspection, the Security Gateway passes the packets through the TCP/IP stack and to their destination. Packets pass through the NIC, to the Inspection Module, and up through the network stack. Some packets are destined for an operating system’s local processes. In this case, the Inspection Module inspects the packets and passes them through the TCP/IP stack. If packets do not pass inspection, they are rejected or dropped and logged, according to rules set in the Check Point Rule Base. (The Rule Base is a collection of individual rules that determine your Security Policy.)


1 comment:

  1. This is an excellent blog. To buy a Remote Configuration Services for VPN Client installation in Checkpoint firewall, must visit https://www.sancuro.com/services/check-point-firewall-vpn-client-installation and get affordable remote configuration services easily.

    ReplyDelete