Use Layers to add structure and hierarchy of rules in the Rule Base All rules configured in a given Security Policy. that prevents direct access to the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.Ĭleanup rule that drops all traffic that is not allowed by the earlier rules in the policy. Stealth rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session.