<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quic protocol in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176301#M32271</link>
    <description>&lt;P&gt;Thanks Chris,&amp;nbsp; that's the advice I received previously, so I blocked Quic on the FW.&amp;nbsp; However, I'm recently getting a lot of complaints that various websites are not loading.&amp;nbsp; When I reenable Quic again, the websites load Ok again.&lt;/P&gt;&lt;P&gt;We have HTTPS enabled and working with no problems.&lt;/P&gt;&lt;P&gt;Something I could be doing wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Mar 2023 13:50:13 GMT</pubDate>
    <dc:creator>PointOfChecking</dc:creator>
    <dc:date>2023-03-27T13:50:13Z</dc:date>
    <item>
      <title>Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158392#M27609</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have cluster active/standby 23800 appliances the version is Gaia R80.40&lt;/P&gt;&lt;P&gt;My problem is that QUIC protocol is not working,&lt;/P&gt;&lt;P&gt;The Checkpoint cluster is perimeter firewall, which means all my Internet traffic goes via the checkpoint.&lt;/P&gt;&lt;P&gt;Google sites work with QUIC ,&lt;/P&gt;&lt;P&gt;The issue is when I'm surfing to Google from my organization I can only see that the connection authentication use TLS 1.3 and not QUIC authentication'&lt;/P&gt;&lt;P&gt;I configured rule with QUIC protocol service but still the connection authentication use TLS 1.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Rafi&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 06:59:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158392#M27609</guid>
      <dc:creator>rafish</dc:creator>
      <dc:date>2022-09-29T06:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158404#M27610</link>
      <description>&lt;P&gt;Do you have HTTPS Inspection enabled?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 07:42:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158404#M27610</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-09-29T07:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158417#M27612</link>
      <description>&lt;P&gt;Sorry forgot to mention,&lt;/P&gt;&lt;P&gt;No, I don't have HTTPS Inspection&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 08:54:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158417#M27612</guid>
      <dc:creator>rafish</dc:creator>
      <dc:date>2022-09-29T08:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158423#M27614</link>
      <description>&lt;P&gt;Without HTTPSi we do not interfere with Quic, it should normally work. Are you sure this is FW that is causing the issues?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 10:04:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158423#M27614</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-09-29T10:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158431#M27616</link>
      <description>&lt;P&gt;I done some tests that lead me to to checkpoint,&lt;/P&gt;&lt;P&gt;I will check again&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 11:03:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158431#M27616</guid>
      <dc:creator>rafish</dc:creator>
      <dc:date>2022-09-29T11:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158432#M27617</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/39009"&gt;@rafish&lt;/a&gt;&amp;nbsp;Just to be sure, if you believe this is a firewall, check for drops of quic traffic on the GW. If you see some, looking at them might help you to understand what to do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 11:10:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158432#M27617</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-09-29T11:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158442#M27619</link>
      <description>&lt;P&gt;I found the problem,&lt;/P&gt;&lt;P&gt;I have application rule that allow "Google Ads" which include service udp 443,&lt;/P&gt;&lt;P&gt;I added to specific application rule "Quic protocol" and when I surf to google site with chrome I can see that the encrypted and authenticated using QUIC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 12:50:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158442#M27619</guid>
      <dc:creator>rafish</dc:creator>
      <dc:date>2022-09-29T12:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158511#M27635</link>
      <description>&lt;P&gt;hey,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;good to know, but if I may ask, why are you looking into allowing quick protocol?&lt;/P&gt;
&lt;P&gt;I'm just asking, because there are some recommendations for dropping that traffic ( not only from CheckPoint side) and currently I don't see many reasons why would you do that.&lt;/P&gt;
&lt;P&gt;Also another one that we're dropping, is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;DNS over HTTPS&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;(&lt;/SPAN&gt;&lt;EM&gt;DoH&lt;/EM&gt;&lt;SPAN&gt;) , as it would overcome DNS security settings that you would have set in your environment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ty,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 08:54:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/158511#M27635</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-09-30T08:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176297#M32268</link>
      <description>&lt;P&gt;Hi _Val_,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is Checkpoint able to inspect Quic traffic now?&amp;nbsp; As another commenter mentioned, I've been advised that Quic should be disabled to force the client to failback to TCP traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Quic is not inspected, so traffic that is normally blocked cannot be blocked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 13:43:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176297#M32268</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2023-03-27T13:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176298#M32269</link>
      <description>&lt;P&gt;QUIC inspection is on the roadmap planned for a future release.&lt;/P&gt;
&lt;P&gt;If a browser cannot talk via QUIC it will generally failback to traditional protocols. Provided Https inspection is enabled then inspection on the subsequent connection is possible.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 14:21:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176298#M32269</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-27T14:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176301#M32271</link>
      <description>&lt;P&gt;Thanks Chris,&amp;nbsp; that's the advice I received previously, so I blocked Quic on the FW.&amp;nbsp; However, I'm recently getting a lot of complaints that various websites are not loading.&amp;nbsp; When I reenable Quic again, the websites load Ok again.&lt;/P&gt;&lt;P&gt;We have HTTPS enabled and working with no problems.&lt;/P&gt;&lt;P&gt;Something I could be doing wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 13:50:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176301#M32271</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2023-03-27T13:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176310#M32274</link>
      <description>&lt;P&gt;Which gateway version and JHF?&lt;/P&gt;
&lt;P&gt;Regarding your Https inspection config is the trusted CAs list updated and are you bypassing known troublesome sites using the updatable objects provided?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 14:20:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176310#M32274</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-27T14:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176317#M32276</link>
      <description>&lt;P&gt;using 4800s on latest R80.40 JHF&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CAs updated automatically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not using updateable objects for troublesome sites.&amp;nbsp; Any guides on this?&lt;/P&gt;&lt;P&gt;Also, if I'm bypassing sites, then it's a lot of sites to bypass.&amp;nbsp; People were calling constantly when it was blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 14:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176317#M32276</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2023-03-27T14:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176321#M32279</link>
      <description>&lt;P&gt;Please see&amp;nbsp;&lt;SPAN&gt;sk163595 for more information on the bypass list objects.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Moreover please ensure OCSP traffic is allowed if not already.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the problem persists please engage with TAC to discuss/diagnose the issue further.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 15:15:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176321#M32279</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-27T15:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176387#M32289</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The original problem is Quic traffic is not inspected.&amp;nbsp; Which is why we block Quic to force it to failback to TCP.&lt;/P&gt;&lt;P&gt;If I bypass inspection of the traffic using updateable objects, I may as well allow Quic traffic?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 05:40:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176387#M32289</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2023-03-28T05:40:36Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176388#M32290</link>
      <description>&lt;P&gt;No this isn't the correct logic, not all HTTPS traffic can be inspected for example pinned certificates and various other factors may require some sites/categories to be bypassed e.g. banking &amp;amp; healthcare sites for privacy reasons.&amp;nbsp;From time to time compatibility and cipher issues may also arise...&lt;/P&gt;
&lt;P&gt;So the idea is to minimize user impact and inspect what you can to provide an appropriate level of security.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 01:08:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176388#M32290</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-29T01:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176389#M32291</link>
      <description>&lt;P&gt;Sorry, let me check if I understand correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Quic traffic CAN be inspected? Just that not all Quic traffic can be inspected?&amp;nbsp; It's those that cannot be inspected that are failing?&lt;/P&gt;&lt;P&gt;I should allow Quic traffic and create updateable objects to bypass inspection of Quic traffic that is failing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 05:48:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176389#M32291</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2023-03-28T05:48:50Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176393#M32294</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/58146"&gt;@PointOfChecking&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;was stating above "&lt;SPAN&gt;QUIC inspection is on the roadmap planned for a future release.&lt;/SPAN&gt;" so it's not inspected right now by HTTPS Inspection.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Another confusion you do, is that you got the recommendation to Block Quick protocol, in order to FORCE traffic to go over TCP/443 as that can be inspected, and in order to respect "GOOD Practice" you're recommended to set HTTPS Inspection rules to bypass "HTTPS services - recommended bypass" and "HTTPS services - optional bypass" (from&amp;nbsp;sk163595) and if you can, use Updatable Objects and not be static here. Still I don't remember those objects being available in R80.40 in old days (like 2-3 years ago).&lt;/P&gt;
&lt;P&gt;Now, on your problem, you say that you blocked Quick protocol, and some of your users are still facing issues, and complain to you. Can you give more details on that, like what are those sites, what were the issues faced by the end-users?&lt;/P&gt;
&lt;P&gt;We have Quick dropped since couple of years, and I don't remember hearing complains.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 06:57:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176393#M32294</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-03-28T06:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176396#M32296</link>
      <description>&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;This is the part that I can't understand.&amp;nbsp; If checkpoint cannot inspect quic and I already dropped quic, why do I need to bypass anything because checkpoint can inspect TCP HTTPS, so no need to bypass?&lt;/P&gt;&lt;P&gt;If I allow quic and checkpoint cannot inspect anyway, again why do I need to bypass?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I allow quic, then the website loads for the users.&lt;/P&gt;&lt;P&gt;When I block quic, then the website fails to load.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many websites failed, but I can't remember which one they were (as this was a few weeks ago).&lt;/P&gt;&lt;P&gt;As soon as I allowed quic, then all sites were working again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 07:21:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176396#M32296</guid>
      <dc:creator>PointOfChecking</dc:creator>
      <dc:date>2023-03-28T07:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Quic protocol</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176400#M32297</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/58146"&gt;@PointOfChecking&lt;/a&gt;&amp;nbsp;HTTPSi enforcement happens before your regular Network Security Policy rulebase filtering. You want to bypass anything you do not wish to enforce, otherwise, your GW will spend (and fail in the case of QUIC) a significant effort to decrypt traffic that will be later dropped anyway.&lt;/P&gt;
&lt;P&gt;I hope this makes more sense to you now.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 07:49:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Quic-protocol/m-p/176400#M32297</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-03-28T07:49:14Z</dc:date>
    </item>
  </channel>
</rss>

