The purpose of a Stealth Rule is to drop any traffic destined for the firewall that is not otherwise explicitly allowed1, p. 32. A Stealth Rule is usually placed at the top of the rule base, before any other rule that allows traffic to the Security Gateway2, p. 13. A Stealth Rule is not used to hide a server’s IP address, to allow administrators to access SmartDashboard, or to drop any traffic that is not explicitly allowed. References: Check Point CCSA - R81: Practice Test & Explanation, 156-315.81 Checkpoint Exam Info and Free Practice Test
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit