<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow a star dot domain in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214633#M40981</link>
    <description>&lt;P&gt;R81.20 and Network Feeds.&lt;BR /&gt;Make sure you can leverage Passive DNS learning also:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk161612" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk161612&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 May 2024 02:42:23 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-05-17T02:42:23Z</dc:date>
    <item>
      <title>Allow a star dot domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214603#M40968</link>
      <description>&lt;P&gt;Quick question, what is the best way to allow a *.domain in Check Point?&amp;nbsp; I know you can create a Domain Object, and if you check the box for FQDN mode, then the gateway queries the FQDN hostname you enter for the object, and whatever IP Addresses it returns, it caches those and treats traffic to/from those IPs as matching the Domain Object.&amp;nbsp; If you leave FQN unchecked, you can enter a whole domain, but what the Gateway does is reverse lookup the IP Address of the traffic, and if the PTR record from the reverse lookup matches the domain name you specify in the object, then the traffic is treated as matching that object.&lt;/P&gt;&lt;P&gt;The problem with that is, most orgs don't populate PTR records.&amp;nbsp; Also anything hosted in Azure, AWS, or other public clouds will usually have a PTR record associated with the cloud provider, and not of the customer domain.&lt;/P&gt;&lt;P&gt;In other words, using the Domain Object without FQDN toggled is not really a good way to allow a *.domain.&lt;/P&gt;&lt;P&gt;You can do a Custom Site URL list, but my understanding is this is used by the URL filtering blade, requires SSL inspection, and may not work in a security rule, such as "allow port 1234 to *.domain" as the customer is requesting.&lt;/P&gt;&lt;P&gt;What other best practices or recommendations exist to accomplish the above?&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 01:19:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214603#M40968</guid>
      <dc:creator>Cypress</dc:creator>
      <dc:date>2024-05-17T01:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a star dot domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214605#M40970</link>
      <description>&lt;P&gt;I made it work before without ssl inspection. Just make sure urlf blade is on, appc as well preferable, and enable url blade in policy layer editor. I always follow this logic...say you want to block anything tiktok, I just create custom app site and add *tiktok*&lt;/P&gt;
&lt;P&gt;Install policy, test. Only downside is that obviously without ssl inspection, there is no further checking if page is blocked, plus block page is non-existant, which can confuse users.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 01:30:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214605#M40970</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-17T01:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a star dot domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214633#M40981</link>
      <description>&lt;P&gt;R81.20 and Network Feeds.&lt;BR /&gt;Make sure you can leverage Passive DNS learning also:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk161612" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk161612&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 02:42:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214633#M40981</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-17T02:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Allow a star dot domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214677#M40986</link>
      <description>&lt;P&gt;Custom Application/Site objects do require the firewall have URL Filtering enabled, but they don't require HTTPS Inspection to be enabled. Instead, go to Manage &amp;amp; Settings &amp;gt; Blades &amp;gt; Application Control &amp;amp; URL Filtering &amp;gt; Advanced Settings &amp;gt; General &amp;gt; URL Filtering and make sure "Categorize HTTPS websites" is checked. That allows matching HTTPS connections without HTTPS Inspection.&lt;/P&gt;
&lt;P&gt;From there, you just need to make an object to match the site. I spent some time about a year ago figuring out how Check Point's matching expressions work and &lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Custom-Application-Site-Findings/m-p/179606#M32883" target="_self"&gt;posted my findings here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 13:51:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-a-star-dot-domain/m-p/214677#M40986</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-05-17T13:51:03Z</dc:date>
    </item>
  </channel>
</rss>

