Using Firewall Rules
172
Check Point ZoneAlarm User Guide
Using Firewall Rules
The ZoneAlarm router checks the protocol used, the ports range, and the destination IP
address, when deciding whether to allow or block traffic.
User-defined rules have priority over the default security policy rules and provide you with
greater flexibility in defining and customizing your security policy.
For example, if your company computers are located on the LAN network, and guests are
allowed to use the WLAN network, then as a result of the default security policy rules,
employees on the LAN will be able to connect to guest computers, while guests will not be
able to access any sensitive information on the company computers. You can override the
default security policy rules, by creating firewall rules that allow specific WLAN
computers (such a employee's laptop) to connect to the LAN network and company
resources.
The ZoneAlarm router processes user-defined rules in the order they appear in the
Rules
table, so that rule 1 is applied before rule 2, and so on. This enables you to define
exceptions to rules, by placing the exceptions higher up in the
Rules
table.