<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URL Filtering Troubleshooting Help in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107575#M14399</link>
    <description>&lt;P&gt;I took a look at the two SK articles and the comments on trusted CA’s.&amp;nbsp; It doesn’t look like our list of trusted CA’s is being updated (and hasn’t been for a long time).&amp;nbsp; Looking at the certificate returned by the IP address in the block log entry, it looks like the root certificate of the URL is newer that the newest root cert we have in our store (so it can't possible be in there).&amp;nbsp; We’re going to look to add just that root cert to see if the traffic gets allowed.&amp;nbsp; I think we'll look to enable automatic updating in the comeing weeks too.&lt;/P&gt;&lt;P&gt;I’m not clear on whether we need to add the intermediate signing cert to the Checkpoint’s CA list too?&amp;nbsp; I’m thinking without the intermediate cert, if the Checkpoint is checking the whole cert chain it won’t be able to do it without the intermediate cert?&amp;nbsp; Or does it only check the root (this wouldn't make sense to me though in case of intermediate cert revocation)?&lt;/P&gt;&lt;P&gt;I’m still keen to find somewhere in Checkpoint that explains in more detail why traffic was blocked by the application blade, but this might allow the functionality we require in the meantime.&lt;/P&gt;&lt;P&gt;Thanks for everyone’s help on this so far.&amp;nbsp; Very much appreciated and I’m learning lots.&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
    <pubDate>Tue, 12 Jan 2021 09:18:42 GMT</pubDate>
    <dc:creator>VooDooChris</dc:creator>
    <dc:date>2021-01-12T09:18:42Z</dc:date>
    <item>
      <title>URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106711#M14259</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We’re currently looking to set up a set of rules that allow a server to access a very specific set of URL’s. Web Application and Web category filtering aren’t an option as they’re too broad a control and neither is just using a security blade rule as the URL’s are cloud hosted and so the underlying IP addresses are likely to be fluid.&lt;/P&gt;&lt;P&gt;By (simplified) example, we want to limit the server to be able to access a.site.com &amp;amp; b.site.com but not c.site.com, etc. We’ve set up a Security blade rule for the server to allow https out to “all” and have set up an Application blade URL filtering rule to allow the server access to a.site.com &amp;amp; b.site.com. Directly underneath that in the ruleset we’ve set up a block “all” rule for the server which I believe should result in the desired control.&lt;/P&gt;&lt;P&gt;The problem is that some of the traffic we expect to get through the allow rule get's blocked by the block rule and when we look at the firewall log entry for the blocked traffic there appears to be no rational given for the block e.g. it would be great to see something like “Blocked due to requested URL = c.site.com” or “Blocked due to cert CN = z.site.com” . We can see from examination of the server’s DNS client logs that sometime when the traffic is blocked it’s because the server is sometimes being redirected to other URL’s, but it would be good to understand the exact reason why the firewall has blocked the traffic and not have to deduce it from other sources of evidence. We’ve tried setting up extended logging on the rules but this hasn’t given us any more detailed information.&lt;/P&gt;&lt;P&gt;So, my question is, does anyone know if it’s possible to see more detailed information for traffic blocked by the application blade?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2020 09:41:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106711#M14259</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2020-12-31T09:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106713#M14260</link>
      <description>&lt;P&gt;Sorry, should have mentioned, we're on R80.30.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2020 10:34:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106713#M14260</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2020-12-31T10:34:15Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106806#M14284</link>
      <description>&lt;P&gt;On the drop rule, what precisely does it say in the track field?&lt;BR /&gt;If you want to see the precise URL accessed it should be Extended Logging.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jan 2021 23:09:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106806#M14284</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-01T23:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106869#M14300</link>
      <description>&lt;P&gt;I can confirm that rule is set to "Extended Log" but I can't see a "Track" field on the "Details" tab when I double click the log entry in SmartConsole.&amp;nbsp; There is a "Description" field that states "https Traffic Dropped from x.x.x.x to y.y.y.y".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I fear I might be looking in the wrong place or don't have something required enabled?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 09:34:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106869#M14300</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-04T09:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106915#M14306</link>
      <description>&lt;P&gt;I meant the Track field in the rulebase.&lt;BR /&gt;Is the "Service/Application" in the drop rule any or something generic like Web Browsing?&lt;BR /&gt;I would have a separate drop rule for non-web traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 16:54:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106915#M14306</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-04T16:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106918#M14307</link>
      <description>&lt;P&gt;Ah, sorry.&amp;nbsp; In the drop rule, the Track field is configured with "Extended Log" and "Accounting".&amp;nbsp; The allow rule just above it is configured in the same way.&lt;/P&gt;&lt;P&gt;The Services &amp;amp; Application field on the block rule is configured with "Any" and on the Allow rule just above it there is a custom object that lists the URL's and service we want to allow throught the firewall.&lt;/P&gt;&lt;P&gt;All traffic generated by the source server should be HTTP/HTTPS.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 17:29:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106918#M14307</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-04T17:29:38Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106929#M14311</link>
      <description>&lt;P&gt;"Any" doesn't force traffic identification, but I believe "Web Browsing" will.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 20:26:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/106929#M14311</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-04T20:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107118#M14336</link>
      <description>&lt;P&gt;To test out the “Web Browsing” category, we set up the following rules in the app blade:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;gt;&amp;nbsp; Rule 4 – Src: Test server&amp;nbsp; Dst: Internet (not RFC1918) &amp;nbsp;Srvs&amp;amp;App: &amp;nbsp;Custom URL list and TCP 80/442/8080 &amp;nbsp;Act: ALLOW&amp;nbsp; Log: ExtLog &amp;amp; Acc&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;gt;&amp;nbsp; Rule 5 – Src: Test server&amp;nbsp; Dst: Internet (not RFC1918) &amp;nbsp;Srvs&amp;amp;App: &amp;nbsp;Web Browsing &amp;nbsp;&amp;nbsp;Act: DROP&amp;nbsp; Log: ExtLog &amp;amp; Acc&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;gt; Rule 6 – Src: Test server&amp;nbsp; Dst: Internet (not RFC1918) &amp;nbsp;Srvs&amp;amp;App: &amp;nbsp;Any &amp;nbsp;&amp;nbsp;Act: DROP&amp;nbsp; Log: Log &amp;amp; Acc&lt;/P&gt;&lt;P&gt;Rule 4 is allowing some of the traffic (as it always has been) but some is still hitting Rule 6.&amp;nbsp; When I examine the log for the rule 6 DROP, it states that the traffic was “Service: https (TCP/443)” and Description “https Traffic Dropped from x.x.x.x to y.y.y.y”.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As the FW is recognising that the traffic dropped by rule 6 is TCP/443, I don’t understand why rule 5 isn’t doing the Drop instead of rule 6?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 10:52:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107118#M14336</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-06T10:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107171#M14352</link>
      <description>&lt;P&gt;Any reason you can't make Rule 6 Extended Logs as well?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 01:48:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107171#M14352</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-07T01:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107191#M14356</link>
      <description>&lt;P&gt;Not that I can think of.&amp;nbsp; I'll ask for it to be changed.&amp;nbsp; That said, it's the same rule that wan't showing the failed URL earlier in the week anyway, so is it likely to show any more detail now?&lt;/P&gt;&lt;P&gt;The thing I need to understand is why rule 5 isn't blocking the TCP/443 traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 08:52:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107191#M14356</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-07T08:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107206#M14357</link>
      <description>&lt;P&gt;Just curios... Are you using HTTPS Inspection Blade (and your inspection policy doesn't say bypass for this blocked traffic) or are you just leveraging HTTPS Inspection Lite (by enabling "Categorize HTTPS websites" in URL-Filtering blade settings)?&lt;/P&gt;&lt;P&gt;It would be interesting if you can catch the drops (and see new details) with this new block rule to create between rule 5 and rule 6 looking like this:&lt;/P&gt;&lt;P&gt;&amp;gt; Rule x – Src: Test server Dst: Internet (not RFC1918) Srvs&amp;amp;App: Web_Browsing_Encrypted Act: DROP Log: ExtLog &amp;amp; Acc&lt;/P&gt;&lt;P&gt;For the object Web_Browsing_Encrypted, I would create it this way:&lt;/P&gt;&lt;P&gt;Type: TCP&lt;/P&gt;&lt;P&gt;Protocol: HTTPS&lt;/P&gt;&lt;P&gt;Port: Standard (443)&lt;/P&gt;&lt;P&gt;Advanced -&amp;gt; Protocol signature: Enabled&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 10:53:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107206#M14357</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-01-07T10:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107301#M14364</link>
      <description>&lt;P&gt;We're using the "Catagorize HTTPS websites" option.&amp;nbsp; No HTTPS inspection at the moment.&lt;/P&gt;&lt;P&gt;We've set up the additional rule as suggested.&amp;nbsp; Policy will get pushed after hours, so will post results after the weekend.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 14:39:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107301#M14364</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-08T14:39:39Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107447#M14387</link>
      <description>&lt;P&gt;Update: We created the rule as suggested, so now this section of our ruleset looks like this:&lt;/P&gt;&lt;P&gt;&amp;gt; Rule 4 – Src: Test server Dst: Internet (not RFC1918) Srvs&amp;amp;App: Custom URL list and TCP 80/443/8080 Act: ALLOW Log: ExtLog &amp;amp; Acc&lt;BR /&gt;&amp;gt; Rule 5 – Src: Test server Dst: Internet (not RFC1918) Srvs&amp;amp;App: Web Browsing Act: DROP Log: ExtLog &amp;amp; Acc&lt;BR /&gt;&amp;gt; Rule 6 – Src: Test server Dst: Internet (not RFC1918) Srvs&amp;amp;App: Web Browsing Encrypted Act: DROP Log: ExtLog &amp;amp; Acc&lt;BR /&gt;&amp;gt; Rule 7 – Src: Test server Dst: Internet (not RFC1918) Srvs&amp;amp;App: Any Act: DROP Log: ExtLog &amp;amp; Acc&lt;/P&gt;&lt;P&gt;The new rule 6 is now blocking the TCP/443 traffic that is slipping past rules 4 &amp;amp; 5. It’s also started showing catagorisation for the traffic i.e the Application Name Checkpoint assigns to the traffic and Primary Category too,&amp;nbsp; which is great, but sadly it’s still not showing the URL that the server attempted to access when it was blocked or a reason why the firewall blocked it.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Is it actually possible to get this information out of the FW?&amp;nbsp; Maybe it's not available in SmartConsole and I need to drop to Gaia to get this level of information?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 09:55:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107447#M14387</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-11T09:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107457#M14389</link>
      <description>&lt;P&gt;Great, that you get now hits on this new rule &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;While I cannot answer your question how to get more details from this deny log entries in R80.30 (I hope someone other jumps in here), I want to point to you sk64521 where you can learn, that the HTTPS Inspection Lite Feature (HTTPS Inspection blade disabled but "Categorize HTTPS websites" enabled in URL-Filtering blade settings)&amp;nbsp; you are using really needs trusted certificates from the perspective of the gateway. Do you have this in mind? If not: Please take care, that your Trusted Domain List is up to date and contains your private CAs, if you are using such. I saw environments, were the Trusted Domain List was not updated automatically when no gateway ever had HTTPS inspection blade installed. But this is needed for HTTPS Inspection Lite to work properly. You also may need to restart wstld after updating the Trusted Domain List even if you did a policy install while the sk says its not needed. I had a support ticket, were this was needed.&lt;/P&gt;&lt;P&gt;I also want to point you to sk159872. Maybe you can get what you want only after upgrading to R80.40 (appi_urlf_ssl_certificate_validation_log_enabled).&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2021 10:34:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107457#M14389</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-01-11T10:34:29Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107551#M14394</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2480"&gt;@Meital_Natanson&lt;/a&gt;&amp;nbsp;any thoughts on this one?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 01:30:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107551#M14394</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-12T01:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107575#M14399</link>
      <description>&lt;P&gt;I took a look at the two SK articles and the comments on trusted CA’s.&amp;nbsp; It doesn’t look like our list of trusted CA’s is being updated (and hasn’t been for a long time).&amp;nbsp; Looking at the certificate returned by the IP address in the block log entry, it looks like the root certificate of the URL is newer that the newest root cert we have in our store (so it can't possible be in there).&amp;nbsp; We’re going to look to add just that root cert to see if the traffic gets allowed.&amp;nbsp; I think we'll look to enable automatic updating in the comeing weeks too.&lt;/P&gt;&lt;P&gt;I’m not clear on whether we need to add the intermediate signing cert to the Checkpoint’s CA list too?&amp;nbsp; I’m thinking without the intermediate cert, if the Checkpoint is checking the whole cert chain it won’t be able to do it without the intermediate cert?&amp;nbsp; Or does it only check the root (this wouldn't make sense to me though in case of intermediate cert revocation)?&lt;/P&gt;&lt;P&gt;I’m still keen to find somewhere in Checkpoint that explains in more detail why traffic was blocked by the application blade, but this might allow the functionality we require in the meantime.&lt;/P&gt;&lt;P&gt;Thanks for everyone’s help on this so far.&amp;nbsp; Very much appreciated and I’m learning lots.&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 09:18:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107575#M14399</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-12T09:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107579#M14400</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;&lt;EM&gt;I’m thinking without the intermediate cert, if the Checkpoint is checking the whole cert chain it won’t be able to do it without the intermediate cert?&lt;/EM&gt; " - thinking about this a bit more, I think the Checkpoint would expect the endpoint to supply the intermediate certificate along with the URL's certifcate, thus allowing the chain to be validated.&amp;nbsp; If this works as I think, then only the root cert will be needed on the Checkpoint.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 10:02:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107579#M14400</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-12T10:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107581#M14401</link>
      <description>&lt;P&gt;Regarding Update of Trusted CA List: You can check $CPDIR/database/downloads/TRUSTED_CA/2.0/ on your managment servers file system. I had a case, where the updates were downloaded successfully to managment servers file system but not imported to Trusted CA List. Current revision should be 2.7 so maybe you can found this file on your host:&lt;/P&gt;&lt;P&gt;$CPDIR/database/downloads/TRUSTED_CA/2.0/2.7/updateFile.zip&lt;BR /&gt;MD5-SUM: 194ed6e321927c55e77ee9648548bb30&lt;/P&gt;&lt;P&gt;If this is the case, you can download it to your workstation and import it in SmartDashboard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding Intermediate CA Cert: You are right, this should work work this way. Every server offering a TLS endpoint should provide intermediate(s) along with its server cert and should not rely on clients knowing it.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jan 2021 10:41:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107581#M14401</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-01-12T10:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107943#M14495</link>
      <description>&lt;P&gt;Update: We've updated the CA list on our Checkpoint.&amp;nbsp; It' hasn't permitted the traffic from the server to flow but it's something we need to start doing anyway.&amp;nbsp; Not sure how often Checkpoint update the CA list?&lt;/P&gt;&lt;P&gt;I also found out that while the SG's are all R80.30, the SMS is R80.20 (not sure why, I'll be asking).&amp;nbsp; I think I remember reading you can set the CA list to automatically update in R80.30, but not in R80.20.&amp;nbsp; We've set up a process to check for update once a month now anyway.&lt;/P&gt;&lt;P&gt;So the CA change hasn't given us visability of the URL that the client is trying to access through the Checkpoint in SmartConsole or SmartView, but something I have found is the &lt;EM&gt;&lt;STRONG&gt;OpenSSL S_client&lt;/STRONG&gt;&lt;/EM&gt; command.&amp;nbsp; If you take the IP address detailed in the blocked traffic and run the OpenSSL S_client on it, if it has connectivity it returns the the certificate details:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;C:\OpenSSL\bin&amp;gt;openssl s_client -connect 40.68.232.16:443&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;CONNECTED(00000234)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Can't use SSL_get_servername&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;depth=1 C = US, O = Microsoft Corporation, CN = Microsoft RSA TLS CA 01&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;verify error:num=20:unable to get local issuer certificate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;verify return:1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;depth=0 CN = *.blob.core.windows.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;verify return:1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;---&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Certificate chain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;0 s:CN = *.blob.core.windows.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;i:C = US, O = Microsoft Corporation, CN = Microsoft RSA TLS CA 01&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;1 s:C = US, O = Microsoft Corporation, CN = Microsoft RSA TLS CA 01&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;i:C = IE, O = Baltimore, OU = CyberTrust, CN = Baltimore CyberTrust Root&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;---&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Server certificate&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-----BEGIN CERTIFICATE-----&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;MIINtDCCC5ygAwIBAgITawADvAdmouS5OGrIsAAAAAO8BzANBgkqhkiG9w0BAQsF&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;ADBPMQswCQYDVQQ.......&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt; Truncated to aid visability &amp;gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;...........x0eVaQiIS1MWC+Jtve6K6Oz43KBXLLTwQ6z&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;t5zBnzoYOXc=&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-----END CERTIFICATE-----&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt; Truncated to aid visability &amp;gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;....and if you copy the text between&amp;nbsp;-----BEGIN CERTIFICATE----- and&amp;nbsp;-----END CERTIFICATE----- (inclusive), copy it in to a text file and run &lt;STRONG&gt;&lt;EM&gt;CertUtil -v -dump&lt;/EM&gt; &lt;/STRONG&gt;on it, it will display all the returned certificate's information, even the SAN's detailed in the certificate:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;X509 Certificate:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Version: 3&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Serial Number: 6b0003bc0766a2e4b9386ac8b000000003bc07&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;0000 07 bc 03 00 00 00 b0 c8 6a 38 b9 e4 a2 66 07 bc&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;0010 03 00 6b&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Signature Algorithm:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Algorithm ObjectId: 1.2.840.113549.1.1.11 sha256RSA&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Algorithm Parameters:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;05 00&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Issuer:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;CN=Microsoft RSA TLS CA 01&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;O=Microsoft Corporation&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;C=US&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt; Truncated to aid visability &amp;gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;0003: b0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;2.5.29.17: Flags = 0, Length = 631&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Subject Alternative Name&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.blob.core.windows.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.am5prdstr02a.store.core.windows.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.blob.storage.azure.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.z1.blob.storage.azure.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.z2.blob.storage.azure.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.z3.blob.storage.azure.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.z4.blob.storage.azure.net&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;DNS Name=*.z5.blob.storage.azure.net&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;lt; Truncated to aid visability &amp;gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So while not ideal (ideal would be to easily see this info in one of the SMART consoles) we can now at least see a list of potential destination URL's that the client is trying to get to and is being blocked, but I still don't have visability as to &lt;STRONG&gt;why&lt;/STRONG&gt; the Checkpoint has blocked the traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2021 14:40:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107943#M14495</guid>
      <dc:creator>VooDooChris</dc:creator>
      <dc:date>2021-01-15T14:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: URL Filtering Troubleshooting Help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107946#M14496</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry I did not get to read EVERYTHING in this thread, but I can tell you what I did with one of my customers. We were having lots of challenges with TAC and them giving good suggestions on best way to actually set up url filtering rules, so after testing this for 2 months, we simply decided to set up another ordered layer with any any allow at the bottom (as thats sk recommendation, cant recall sk now, but if you search best recommendation app control, it will pop up). Seems like if you do whitelist for url layer, its problematic, as firewall spends more time on processing those packets and it cant do categorization correctly.&lt;/P&gt;&lt;P&gt;Now, as far as your initial inquiry, about the logs, I can tell you that easiest way I found to get what you need is simply do a search in logs for url filtering blade, it will give you everything you need, or you can even search by specific category under option "other".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2021 14:46:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URL-Filtering-Troubleshooting-Help/m-p/107946#M14496</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-01-15T14:46:00Z</dc:date>
    </item>
  </channel>
</rss>

