This is the White Rhino Security blog, an IT technical blog about configs and topics related to the Network and Security Engineer working with Cisco, Brocade, Check Point, and Palo Alto and Sonicwall. I hope this blog serves you well. -- May The Lord bless you and keep you. May He shine His face upon you, and bring you peace.
I had stated a problem and solution, but I didn't really know why the solution was what it was. Well, I happen to have a pretty good SE in my area now (one I actually have confidence in), and he explained to me why I had the problem that I had. This below is what he wrote to me, and I thought Id put this out there for anyone interested. Here is his explanation, which I happen to think is a very good one.
I can tell you why this worked. Most likely, the H.323 service was not defined as a "Match for Any" service. When you said you had a rule allowing "ANY" traffic, it's not really allowing *everything*. It's allowing a class of services that are allowed to "Match Any".
So if you go to the Service properties for H.323 in R75.20 you'll see that the Match for Any is selected. This means it will match the "Any" service designation. I'm betting in your case it wasn't selected.
There is a reason Check Point does this and it has to do with it's protocol inspection. End Quote.
Well, he was right on this. I didnt have that service as a "Match Any".