<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking a resource by domain name in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199134#M37305</link>
    <description>&lt;P&gt;Hello Team!&lt;/P&gt;&lt;P&gt;There is a need to block traffic from and to a resource by domain name.&lt;BR /&gt;We have created an access control rule with the FQDN object&lt;BR /&gt;The problem is that the resource is resolved to many ip addresses, and while Check Point sends a DNS query, half of the traffic is partially missed.&lt;/P&gt;&lt;P&gt;There is an option to increase TTL&amp;nbsp; as described here &lt;A href="https://support.checkpoint.com/results/sk/sk181215" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk181215&lt;/A&gt;, but how effective will it be ?&lt;/P&gt;&lt;P&gt;Are there any other ways to completely deny traffic from a certain domain name and preferably with not too high load on the gateway ?&lt;/P&gt;&lt;P&gt;Also, we are interested in blocking by file resolution using blade ips, but I'm afraid that would be very resource intensive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Nov 2023 10:32:58 GMT</pubDate>
    <dc:creator>Nadezhda</dc:creator>
    <dc:date>2023-11-28T10:32:58Z</dc:date>
    <item>
      <title>Blocking a resource by domain name</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199134#M37305</link>
      <description>&lt;P&gt;Hello Team!&lt;/P&gt;&lt;P&gt;There is a need to block traffic from and to a resource by domain name.&lt;BR /&gt;We have created an access control rule with the FQDN object&lt;BR /&gt;The problem is that the resource is resolved to many ip addresses, and while Check Point sends a DNS query, half of the traffic is partially missed.&lt;/P&gt;&lt;P&gt;There is an option to increase TTL&amp;nbsp; as described here &lt;A href="https://support.checkpoint.com/results/sk/sk181215" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk181215&lt;/A&gt;, but how effective will it be ?&lt;/P&gt;&lt;P&gt;Are there any other ways to completely deny traffic from a certain domain name and preferably with not too high load on the gateway ?&lt;/P&gt;&lt;P&gt;Also, we are interested in blocking by file resolution using blade ips, but I'm afraid that would be very resource intensive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 10:32:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199134#M37305</guid>
      <dc:creator>Nadezhda</dc:creator>
      <dc:date>2023-11-28T10:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a resource by domain name</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199142#M37308</link>
      <description>&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk90401" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk90401: How are &lt;STRONG&gt;Domain&lt;/STRONG&gt; Objects enforced by the Security Gateway?&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk181215" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk181215: FQDN &lt;STRONG&gt;domain&lt;/STRONG&gt; object cannot be matched&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 11:19:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199142#M37308</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-11-28T11:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a resource by domain name</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199183#M37313</link>
      <description>&lt;P&gt;The gateway must either see the DNS requests made by the client (Passive DNS Learning in R80.40+) OR use the same DNS servers the client does.&lt;BR /&gt;Otherwise, there will be differences in enforcement, as you are observing.&lt;/P&gt;
&lt;P&gt;What do you mean by "blocking by file resolution using IPS" exactly?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 15:51:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199183#M37313</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-11-28T15:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking a resource by domain name</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199314#M37348</link>
      <description>&lt;P&gt;There were few posts about this in the past and this is not sadly the optimal way of doing it. Should be done with urlf blade, as well as when https inspection is enabled. You can create domain object and use it in the rule, but in my experience, that may work randomly, as the fqdn itself may end up resolving to different IPs and they may change constantly.&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2023 03:50:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-a-resource-by-domain-name/m-p/199314#M37348</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-30T03:50:15Z</dc:date>
    </item>
  </channel>
</rss>

