<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: to allow URLs with wildcard destiations on non web browsing ports in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218815#M41787</link>
    <description>&lt;P&gt;I double checked with R&amp;amp;D and confirmed that wildcards can be used in entries listed there (provided it’s something like *.example.com and not www.*.com, I.e. the wildcard is first).&lt;BR /&gt;This also requires Passive DNS Learning to be enabled, which requires the gateway to see all the DNS requests from the clients:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk161612" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk161612&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jun 2024 13:38:59 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-06-26T13:38:59Z</dc:date>
    <item>
      <title>to allow URLs with wildcard destiations on non web browsing ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218452#M41781</link>
      <description>Hello Checkmates! Anyone can help out how to allow following wildcard URLs on non web browsing traffic on R81.10? Can't use Non-FQDN object due to reverse DNS is not working and updatable object also not available. Destination *.bam.nr-data.net *.apse2.pure.cloud Ports/Services TCP/UDP: 3478 (STUN) TCP/UDP: 19302 (STUN) UDP 16384-32768 (SRTP/TURN) TCP: 8191 (HTTPS)</description>
      <pubDate>Mon, 24 Jun 2024 09:11:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218452#M41781</guid>
      <dc:creator>Gil_Lim</dc:creator>
      <dc:date>2024-06-24T09:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: to allow URLs with wildcard destiations on non web browsing ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218551#M41782</link>
      <description>&lt;P&gt;For things that are actually HTTPS, you need to ensure the ports are configured here:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26417i60E41A0ECBE4F651/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;However, you list several things that aren't HTTPS.&lt;BR /&gt;If the gateway is in the path between the client and their configured DNS server, Passive DNS Learning can help with non-FQDN Domain Objects.&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk161612" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk161612&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the vendor in question provides a list of IPs in JSON or a flat file form, upgrade to R81.20 and use a Network Feed object.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2024 19:40:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218551#M41782</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-24T19:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: to allow URLs with wildcard destiations on non web browsing ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218566#M41783</link>
      <description>&lt;P&gt;100% you can do that. Just add more services where Phoneboy mentioned and you can do what I always do...so say you wish to block anything youtube, just add *youtube*&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 01:28:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218566#M41783</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-25T01:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: to allow URLs with wildcard destiations on non web browsing ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218570#M41784</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="New_application-Site.png" style="width: 639px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26419i98A4B99E7106854F/image-size/large?v=v2&amp;amp;px=999" role="button" title="New_application-Site.png" alt="New_application-Site.png" /&gt;&lt;/span&gt;Thanks for the updates.&lt;/P&gt;&lt;P&gt;we do use many Custom Application/site allowing Web Browsing Servers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we add more ports under Application Control Web Browsing Services, the other Custom Applications/Sites will be affected by this and it end up allow extra ports for other&amp;nbsp;&amp;nbsp;Custom Applications/Sites which we don't want to.&lt;/P&gt;&lt;P&gt;Hope that if there is an option to choose other then Web Browsing under New Application/Site.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 01:46:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218570#M41784</guid>
      <dc:creator>Gil_Lim</dc:creator>
      <dc:date>2024-06-25T01:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: to allow URLs with wildcard destiations on non web browsing ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218573#M41785</link>
      <description>&lt;P&gt;If it's not actually web browsing then you should be using an FQDN object as the destination and then the services as normal.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 02:31:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218573#M41785</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-06-25T02:31:23Z</dc:date>
    </item>
    <item>
      <title>Re: to allow URLs with wildcard destiations on non web browsing ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218641#M41786</link>
      <description>&lt;P&gt;Yes, this is a global setting that affects all such Custom Application/Sites, which are primarily for applications that use HTTP/HTTPS.&lt;BR /&gt;For application that speak other protocols, you will need to use either a Domain Object or possibly a Network Feed (in R81.20), though I'm double checking it will work for this use case (e.g. including *.example.com).&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 15:16:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218641#M41786</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-25T15:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: to allow URLs with wildcard destiations on non web browsing ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218815#M41787</link>
      <description>&lt;P&gt;I double checked with R&amp;amp;D and confirmed that wildcards can be used in entries listed there (provided it’s something like *.example.com and not www.*.com, I.e. the wildcard is first).&lt;BR /&gt;This also requires Passive DNS Learning to be enabled, which requires the gateway to see all the DNS requests from the clients:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk161612" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk161612&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 13:38:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/to-allow-URLs-with-wildcard-destiations-on-non-web-browsing/m-p/218815#M41787</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-26T13:38:59Z</dc:date>
    </item>
  </channel>
</rss>

