{"id":82,"date":"2008-09-02T13:53:38","date_gmt":"2008-09-02T13:53:38","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2008\/09\/02\/checkpoint-stealth-drop-rule\/"},"modified":"2021-07-24T19:31:03","modified_gmt":"2021-07-24T19:31:03","slug":"checkpoint-stealth-drop-rule","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Firewalls\/Check-Point\/checkpoint-stealth-drop-rule.html","title":{"rendered":"Check Point – Stealth \/ Drop Rule"},"content":{"rendered":"
The first rule in the rule base which prevents access to the firewall itself.<\/p>\n
This is added by the firewall at the bottom of the rule base. Its role is to drop any traffic that hasn’t been matched to any of the previous rules.<\/p>\n","protected":false},"excerpt":{"rendered":"
Stealth Rule The first rule in the rule base which prevents access to the firewall itself. Implicit Drop \/ Clean Up Rule This is added by the firewall at the bottom of the rule base. Its role is to drop any traffic that hasn’t been matched to any of the previous rules.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"yoast_head":"\n