<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.30 URL filtering blocking allowed categories in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67476#M12055</link>
    <description>&lt;P&gt;oh, I see... But OP mentioned that rule 9 was matching, which has exactly the same access role as rule 8...&lt;/P&gt;</description>
    <pubDate>Thu, 14 Nov 2019 19:56:28 GMT</pubDate>
    <dc:creator>abihsot__</dc:creator>
    <dc:date>2019-11-14T19:56:28Z</dc:date>
    <item>
      <title>R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67271#M12044</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I recently rolled out a pair of small appliances to two sites.&lt;/P&gt;&lt;P&gt;The web filtering policy for a particular user group is layered, and it has an allow list and the next rule is a drop all, with block message. HTTPS scanning is enabled with the cert rolled out. (I have also tried breaking the layers and having the standalone accept rule and then the standalone drop all rule after it)&lt;/P&gt;&lt;P&gt;On one site this works perfectly.&lt;/P&gt;&lt;P&gt;On another site, regularly (Every day or at least every other day) from early in the morning the firewall starts blocking all requests to anything categorised 'Computers/Internet' (Which is an allowed category) and a lot of things stop working. There are no failed category updates in the system log (Before the upgrade this same behaviour occurred, but we had updates failed and then database failed to reload so i suspected this initially). It's like the allow rule is being completely ignored. User auth is working, as the user name is logged in the log entry with the message the site was blocked as it belongs to the computers/internet category.&lt;/P&gt;&lt;P&gt;The only way to stop this is to remove the drop rule after the allow for this user group, Once you re-enable it and install the policy it will be fine again until the next time it happens out of the blue.&lt;/P&gt;&lt;P&gt;I previously upgraded the appliance from R80.20, as they were getting an HTTPS inspection error around certificate length (&amp;gt;1000) that the fix seemed to be upgrade to R80.30.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 10:27:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67271#M12044</guid>
      <dc:creator>mark239</dc:creator>
      <dc:date>2019-11-13T10:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67361#M12045</link>
      <description>There is no downloaded database for URL categorization, all lookups are done via the cloud.&lt;BR /&gt;What is the exact rule that is supposed to  allow the traffic?&lt;BR /&gt;When the traffic is blocked, what rule is it hitting?&lt;BR /&gt;What are examples of the site(s) in question?&lt;BR /&gt;Also, maybe the issue isn't the URL categorization, but the gateway is failing to do LDAP lookups on users for some reason?</description>
      <pubDate>Thu, 14 Nov 2019 02:43:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67361#M12045</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-14T02:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67394#M12046</link>
      <description>&lt;P&gt;Ah, I assumed there was a DB due to the system events about installing application/url filtering database versions (And the old errors about failing to update and failing to reload DB)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 761px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3118iBD708B4C3DA64736/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The exact rule is basic. Its from a user group, to internet and allow certain categories.&lt;/P&gt;&lt;P&gt;The rule immediately below is block everything else. Block rule is currently disabled.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3119i0AFE205650B03D36/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LDAP I assume to be ok - as a username is listed with every log.&lt;/P&gt;&lt;P&gt;Examples of sites being blocked are&amp;nbsp;&lt;/P&gt;&lt;P&gt;entrust.net (blocked as business/economy) - an allowed category&lt;/P&gt;&lt;P&gt;google.com - blocked as search engines (allowed category)&lt;/P&gt;&lt;P&gt;etc etc.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 10:42:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67394#M12046</guid>
      <dc:creator>mark239</dc:creator>
      <dc:date>2019-11-14T10:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67396#M12047</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;what is the setting for "fail mode"&amp;nbsp; - blades -&amp;gt; appl/URLF &amp;gt; general &amp;gt; fail mode ?&lt;/P&gt;&lt;P&gt;When traffic is blocked, in the logs if you check "matched rule" tab, what is the number of rule?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 11:03:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67396#M12047</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2019-11-14T11:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67397#M12048</link>
      <description>&lt;P&gt;The matched rule is the block rule, immediately below the allow rule.&lt;/P&gt;&lt;P&gt;I have already set fail-mode to open at the start of the problems, hoping that would fix it (It didnt)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 11:06:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67397#M12048</guid>
      <dc:creator>mark239</dc:creator>
      <dc:date>2019-11-14T11:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67399#M12049</link>
      <description>&lt;P&gt;So there are two options, you don't hit allow rule because of source not matched access role or not matching category.&lt;/P&gt;&lt;P&gt;From one ticket with TAC, I was advised to put categories directly to the policy instead of creating custom application group and using it. I wasn't convinced at that time and for me it was just stupid, however it is working fine now. If your custom application group is not super lengthy, maybe you can try that.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 11:19:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67399#M12049</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2019-11-14T11:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67468#M12050</link>
      <description>The user is communicated via AD Query, Identity Collector, etc.&lt;BR /&gt;LDAP is done from the gateway specifically to look up groups for the given user.&lt;BR /&gt;If LDAP is failing for some reason, then you would not be matching the Access Role in your allow rule.&lt;BR /&gt;It would explain why you're seeing the behavior you're seeing.&lt;BR /&gt;</description>
      <pubDate>Thu, 14 Nov 2019 19:33:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67468#M12050</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-14T19:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67471#M12051</link>
      <description>&lt;P&gt;In fact on a second look, I think LDAP is working fine, because exactly the same access role is used in rule 9, so there is something wrong with matching app/urlf category.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 19:43:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67471#M12051</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2019-11-14T19:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67472#M12052</link>
      <description>The original poster is experiencing issues on one gateway, but not other.&lt;BR /&gt;The categorization should be the same and we can confirm this by looking at the log card of the dropped connection.&lt;BR /&gt;That pretty much leaves LDAP (or something with the lookup process) as the only culprit.</description>
      <pubDate>Thu, 14 Nov 2019 19:45:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67472#M12052</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-14T19:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67474#M12053</link>
      <description>&lt;P&gt;Where do you see log card of dropped connection? I fail to find this screenshot...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 19:51:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67474#M12053</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2019-11-14T19:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67475#M12054</link>
      <description>It wasn't provided, but I surmise, based on the original poster's description, that's what we'd find.</description>
      <pubDate>Thu, 14 Nov 2019 19:53:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67475#M12054</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-14T19:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67476#M12055</link>
      <description>&lt;P&gt;oh, I see... But OP mentioned that rule 9 was matching, which has exactly the same access role as rule 8...&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 19:56:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67476#M12055</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2019-11-14T19:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: R80.30 URL filtering blocking allowed categories</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67511#M12056</link>
      <description>&lt;P&gt;I'll upload a few examples later - thanks so far guys for the time/consideration&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 09:23:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-30-URL-filtering-blocking-allowed-categories/m-p/67511#M12056</guid>
      <dc:creator>mark239</dc:creator>
      <dc:date>2019-11-15T09:23:48Z</dc:date>
    </item>
  </channel>
</rss>

