<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FILTERING URL with CAPTIVE PORTAL on a GUEST network. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80084#M11444</link>
    <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Gateway/Management Version = R80.10 (take 259)&lt;BR /&gt;Is Categorize HTTPS Sites enabled = No&lt;BR /&gt;Is HTTPS Inspection enabled at all (in general, not for guest VLAN)? = No&lt;/P&gt;&lt;P&gt;In that case it would be enough to enable CATEGORIZE HTTPS WEBSITES and enable HTTPS INSPECTION by creating a simple BYPASS rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 29 Mar 2020 01:34:30 GMT</pubDate>
    <dc:creator>wislley</dc:creator>
    <dc:date>2020-03-29T01:34:30Z</dc:date>
    <item>
      <title>FILTERING URL with CAPTIVE PORTAL on a GUEST network.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/79726#M11442</link>
      <description>&lt;P&gt;Hello. I would like help with best practices in using the URL FILTERING blade using CAPTIVE PORTAL on a GUEST network.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;My goal is to create a GUEST network for internet access, but using the URL FILTERING blade to block pornographic sites for example.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Visitors' machines will participate in VLAN 13 (172.16.13.0/24).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In the rule called VLAN 13&amp;gt; INTERNET i created an ACCESS ROLE with permission for UNAUTHENTICATED GUEST.&amp;nbsp;Internet access is normal and YOUTUBE blocking is normal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem is occurring only in rule 28.3 called PROXY VLAN 13.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I created the rules according to the image but the rule called PROXY VLAN 13 does not work. For some reason the package does not MATCH the rule. The rule called TEST YOUTUBE that uses the APPLICATION CONTROL blade is working normally.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.jpg" style="width: 864px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5147i4D8212876CC395CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.jpg" alt="1.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 20:32:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/79726#M11442</guid>
      <dc:creator>wislley</dc:creator>
      <dc:date>2020-03-25T20:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: FILTERING URL with CAPTIVE PORTAL on a GUEST network.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/79736#M11443</link>
      <description>Gateway/Management Version?&lt;BR /&gt;Is Categorize HTTPS Sites enabled?&lt;BR /&gt;Is HTTPS Inspection enabled at all (in general, not for guest VLAN)?&lt;BR /&gt;&lt;BR /&gt;To properly see a lot of HTTPS sites without full HTTPS Inspection, you really need to be on a release with SNI support (in addition to having Categorize HTTPS Websites enabled).&lt;BR /&gt;This would include R80.20 with most recent GA JHF, R80.30 with most recent GA JHF, or R80.40.&lt;BR /&gt;In addition, HTTPS Inspection must be enabled (can be just an "any any bypass" rule) for Verified SNI to work prior to R80.40.</description>
      <pubDate>Thu, 26 Mar 2020 00:32:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/79736#M11443</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-26T00:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: FILTERING URL with CAPTIVE PORTAL on a GUEST network.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80084#M11444</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Gateway/Management Version = R80.10 (take 259)&lt;BR /&gt;Is Categorize HTTPS Sites enabled = No&lt;BR /&gt;Is HTTPS Inspection enabled at all (in general, not for guest VLAN)? = No&lt;/P&gt;&lt;P&gt;In that case it would be enough to enable CATEGORIZE HTTPS WEBSITES and enable HTTPS INSPECTION by creating a simple BYPASS rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2020 01:34:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80084#M11444</guid>
      <dc:creator>wislley</dc:creator>
      <dc:date>2020-03-29T01:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: FILTERING URL with CAPTIVE PORTAL on a GUEST network.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80085#M11445</link>
      <description>First, you need to enable Categorize HTTPS Sites.&lt;BR /&gt;That will definitely help.&lt;BR /&gt;For Categorize HTTPS Sites to work better, you will need to upgrade to one of the releases I mentioned previously.&lt;BR /&gt;If not R80.40, then you will also need to enable HTTPS Inspection.</description>
      <pubDate>Sun, 29 Mar 2020 01:48:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80085#M11445</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-29T01:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: FILTERING URL with CAPTIVE PORTAL on a GUEST network.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80200#M11446</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/42582"&gt;@wislley&lt;/a&gt;&amp;nbsp;&amp;nbsp;Put &lt;STRONG&gt;Internet&lt;/STRONG&gt; object in the Destination column!&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 15:05:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80200#M11446</guid>
      <dc:creator>Dilian_Chernev</dc:creator>
      <dc:date>2020-03-30T15:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: FILTERING URL with CAPTIVE PORTAL on a GUEST network.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80837#M11447</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;, thank you very much for your help. When i enabled only CATEGORIZE HTTPS WEBSITES the URL FILTERING rule worked perfectly, however the USER CHECK screen was not being displayed. So i disabled the CATEGORIZE HTTPS WEBSITES and enabled the HTTPS INSPECTION with a general rule making BYPASS on everything. Again the FILTERING URL rule stopped working. So i removed the general BYPASS rule by adding a BYPASS rule for only one public IP of a given website and now the URL FILTERING rule is working fine and the USER CHECK screen is displayed. I will only search for a certificate error when the USER CHECK screen is displayed. Thank you again.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="10.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5385iC32DC539FCE60446/image-size/large?v=v2&amp;amp;px=999" role="button" title="10.jpg" alt="10.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 20:48:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80837#M11447</guid>
      <dc:creator>wislley</dc:creator>
      <dc:date>2020-04-04T20:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: FILTERING URL with CAPTIVE PORTAL on a GUEST network.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80838#M11448</link>
      <description>Block pages cannot display for HTTPS sites unless HTTPS Inspection is enabled.&lt;BR /&gt;No version of the R80.10 JHF has improved support for SNI, you need to upgrade to a later release for that.&lt;BR /&gt;R80.30 is considered the widely recommended release at this point.</description>
      <pubDate>Sat, 04 Apr 2020 23:14:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FILTERING-URL-with-CAPTIVE-PORTAL-on-a-GUEST-network/m-p/80838#M11448</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-04T23:14:44Z</dc:date>
    </item>
  </channel>
</rss>

