<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Content awareness issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156111#M26703</link>
    <description>&lt;P&gt;We tried, but no luck...:- (&lt;/P&gt;</description>
    <pubDate>Wed, 31 Aug 2022 16:25:22 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2022-08-31T16:25:22Z</dc:date>
    <item>
      <title>Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/155984#M26653</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;
&lt;P&gt;I hope someone can clarify this for me, though Im pretty sure how it works, but need to see if there is any way around it. So, to make long story short, customer has https inspection enabled, vpn, url and app control, as well as IA and monitoring.&lt;/P&gt;
&lt;P&gt;They want to block certain machines from being able to download any exe file off the Internet. Now, this does work, but ONLY if source in content awareness ordered layer is set to any, not if you use specific PC or subnet. Also, if that specific machine is set to bypass google services in https inspection policy, then content awareness does not take place at all.&lt;/P&gt;
&lt;P&gt;I replicated this in the lab and its exact same issue and we even have TAC case as well for this. Here are my questions:&lt;/P&gt;
&lt;P&gt;1) Considering https inspection takes place before regular policy, does this mean once this traffic is bypassed it wont check anything else after?&lt;/P&gt;
&lt;P&gt;2) If 1 is indeed true, is there ANY way to get around this?&lt;/P&gt;
&lt;P&gt;Also, I attached 2 screenshots from my lab. If I disable bypass rule for inspection policy, then all exe files are blocked on windows 10 I use behind the fw.&lt;/P&gt;
&lt;P&gt;Tx as always!&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 17:42:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/155984#M26653</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-08-30T17:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156026#M26668</link>
      <description>&lt;P&gt;Issue solved after working with TAC escalations. Key is to NOT have specific updatable objects bypassed in https inspection, but rather allow in ordered url / app control layer. If they are bypassed in https inspection, then it will never hit last ordered layer, in our case content awareness, since https traffic would have already been processed.&lt;/P&gt;
&lt;P&gt;Update from TAC:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Inspection allows the firewall to go inside the packet and view the unencrypted data thereby classifying the file type, file name etc which is downloaded/uploaded. More on content awareness, after these attributes are identified the usermode processes verify if such content is allowed or blocked. The decision/verdict is provided to the rule base execution engine and the final enforcement block/accept is enforced accordingly.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The reason why this is not in the document is due to the fact that this is only relevant for HTTPS service and not other services like FTP.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I understand their is a concern with the Google Services which will be more clear after discussion with the customer, however until that point please feel free to test the content awareness for&amp;nbsp; HTTPS connections with inspection enabled and let us know if their are any issues.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS...I thought this was the solution until I had to reboot my mgmt server and then it did not work at all...makes no logical sense. Then when I rebooted gw and windows lab machine, it worked for maybe 30 mins and stopped again. I will update once I talk to escalations again.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 12:28:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156026#M26668</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-09-01T12:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156110#M26702</link>
      <description>&lt;P&gt;hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you get the expected behavior if you had combine the Content Awareness with Firewall blade, and with App &amp;amp; URL Filtering ?&lt;/P&gt;
&lt;P&gt;That way your packets would have hit the Firewall policy and then the Content Awareness part...&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17618iC91B82639775121B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Capture.JPG" alt="Capture.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 16:22:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156110#M26702</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-08-31T16:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156111#M26703</link>
      <description>&lt;P&gt;We tried, but no luck...:- (&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 16:25:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156111#M26703</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-08-31T16:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156192#M26727</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16983"&gt;@Sorin_Gogean&lt;/a&gt;&amp;nbsp;...just to add something else...and I will speak today to same escalation person in TAC about it. What I find super odd is that google chrome behaves totally inconsistent with this content awareness feature. So, say if I reboot my lab gateway where windows lab test pc sits behind doing https inspection, exe files will NOT be blocked, but they WILL be blocked in IE and mozilla. I dont get it...maybe its related to below CP sk, but already did that and still same issue&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111754" target="_blank"&gt;HTTPS traffic to Google services (over QUIC) from Chrome cannot be inspected by HTTPS inspection rules (checkpoint.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But, even with IE and mozilla, thats not consistent all the time. I really have a feeling this blade does not work right at all when it comes to CP. If I cant have it working right in simple lab, I have no confidence to ask the customer to implement it fully in production.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 12:06:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156192#M26727</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-09-01T12:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156212#M26735</link>
      <description>&lt;P&gt;Have you checked the HTTPS Inspection settings regarding Background/Hold Mode:&lt;/P&gt;
&lt;DIV id="tinyMceEditor_d0066bb150548fMarcel_Gramalla_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;And we also block QUIC (udp/443) in order to achieve what we want. And after a lot of tweaking we are pretty happy with Content Awareness etc.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 13:35:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156212#M26735</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2022-09-01T13:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156216#M26736</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11764"&gt;@Marcel_Gramalla&lt;/a&gt;&amp;nbsp;...we did implement below, but no luck&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111754" target="_blank"&gt;HTTPS traffic to Google services (over QUIC) from Chrome cannot be inspected by HTTPS inspection rules (checkpoint.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you are referring to setting under blades -&amp;gt; app control and urlf -&amp;gt; advanced settings -&amp;gt; its set to background, but I tried other ones too, same issue.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 13:47:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156216#M26736</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-09-01T13:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156218#M26737</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Unbenannt.PNG" style="width: 418px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17636i40CBC8FA9CA785F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Unbenannt.PNG" alt="Unbenannt.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Huh..the screenshot got lost. I mean this setting above in the good old HTTPS Inspection Dashboard.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 13:53:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156218#M26737</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2022-09-01T13:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156220#M26739</link>
      <description>&lt;P&gt;O yea, tried that before, no change.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 14:00:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156220#M26739</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-09-01T14:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156236#M26744</link>
      <description>&lt;P&gt;Had call with escalations and here is what DOES work. So, we disabled bypass rule to updatable objects in https inspection policy and then added rule to ALLLOW them in app / urlf ordered layer and that works fine, as it allows content awareness layer to work, since inspection happens. Otherwise, when bypass is there, then content awareness wont take effect.&lt;/P&gt;
&lt;P&gt;Please see below:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/17638iE72C2C9095C70A00/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 15:20:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness-issue/m-p/156236#M26744</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-09-01T15:20:36Z</dc:date>
    </item>
  </channel>
</rss>

