<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: URLF, does not block in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252980#M49568</link>
    <description>&lt;P&gt;The option to log something Detailed/Extended is just like any option in a rule: it'll stay configured that way until you change it.&lt;BR /&gt;Extended logging only makes sense if the traffic is subject to HTTPS Inspection, which is the only way to see the full URL.&lt;BR /&gt;Otherwise, thinking about it, not sure Extended logging makes any sense here.&lt;/P&gt;
&lt;P&gt;However, there are some improvements to HTTPS Inspection logging (relevant here, even if you're not actually using it) in later JHFs that might be worth considering.&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jul 2025 17:32:16 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-07-10T17:32:16Z</dc:date>
    <item>
      <title>URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252780#M49491</link>
      <description>&lt;P&gt;Hello, community.&lt;/P&gt;
&lt;P&gt;I have URLF and APPC blades active in my FW CP.&lt;/P&gt;
&lt;P&gt;The detail is that certain traffics are not blocked, when in fact they should be blocked, according to the explicit rule created in the FW.&lt;/P&gt;
&lt;P&gt;For example, the domains thisisgore.com and bestgore.fun, are inside an "Application/Site" added in the URL List part, as independent entries, here I put the example.&lt;/P&gt;
&lt;P&gt;*.bestgore.fun&lt;BR /&gt;bestgore.fun&lt;BR /&gt;thisisgore.com&lt;BR /&gt;*.thisisgore.com&lt;/P&gt;
&lt;P&gt;The detail is that my rule says, that the segment x.x.132.0/24 when it tries to reach that destination, it must be "blocked", but really it is not blocked, because the segment can reach those resources.&lt;/P&gt;
&lt;P&gt;Below I have an almost free rule, that allows that same segment to reach the Internet in general, but this should not happen.&lt;/P&gt;
&lt;P&gt;I don't have HTTPS Inspection enabled in FW, and I have a rule at the top of my rule base, where I block QUIC for all my private segments.&lt;/P&gt;
&lt;P&gt;Is there any way to debug for web traffic?&lt;BR /&gt;Is it necessary to enable HTTPS Inspection when working with URLF and APPC?&lt;/P&gt;
&lt;P&gt;Thanks for your comments.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 16:08:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252780#M49491</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-07-08T16:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252781#M49492</link>
      <description>&lt;P&gt;It's not strictly necessary, but it is becoming increasingly more difficult to see where HTTPS traffic is going without using HTTPS Inspection.&lt;/P&gt;
&lt;P&gt;What version/JHF are we talking about here?&lt;BR /&gt;Using Extended logging on the relevant rules is a good starting point for debugging, which will help determine how the gateway "sees" the traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 17:40:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252781#M49492</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-07-08T17:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252786#M49494</link>
      <description>&lt;P&gt;I have the R82 version with JHF Take 19.&lt;/P&gt;
&lt;P&gt;Is it normal that when in the log browser you put the domain “thisisgore.com” nothing appears in the logs, but if I search by the IP that resolves that domain, if I find traffic related to that IP?&lt;/P&gt;
&lt;P&gt;This is because of a bad definition in the FW rule with the URL Filtering profile?&lt;/P&gt;
&lt;P&gt;Thanks for your comments&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 18:57:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252786#M49494</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-07-08T18:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252789#M49496</link>
      <description>&lt;P&gt;Not every field in the logs is indexed (meaning, you cannot find it by search), so that may be expected.&lt;BR /&gt;Seeing the actual rules used to "allow" the traffic and the actual log entries generated (full log cards) will help.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:24:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252789#M49496</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-07-08T19:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252790#M49497</link>
      <description>&lt;P&gt;You dont have to enable ssl inspection, but without it, you might be limited as far as things you can do with url filtering.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:25:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252790#M49497</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-08T19:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252791#M49498</link>
      <description>&lt;P&gt;Is&amp;nbsp;Categorized HTTPS Sites option enabled in Smart Console?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This the bare minimum that should be enabled.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182318" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182318&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 19:33:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252791#M49498</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-07-08T19:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252795#M49500</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;Is this option necessary to enable it?&lt;/P&gt;
&lt;P&gt;I have made an additional block, where I focus on blocking the category to which the domain thisisgore.com belongs (Tasteless, Low Risk), but the traffic is still allowed and should not be so&lt;/P&gt;
&lt;P&gt;I have one rule explicitly blocking the domain, and the other new rule blocking the category but the traffic does not match these rules and goes to my most allowable rule which is almost at the end of my rule base&lt;/P&gt;
&lt;P&gt;We don't have control over all users so enabling HTTPS Inspection is not a viable option now.&lt;/P&gt;
&lt;P&gt;Thanks for the feedback&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 20:09:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252795#M49500</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-07-08T20:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252797#M49501</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;It might help, but again, without ssl inspection, you will not get all the benefits.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 20:59:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252797#M49501</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-08T20:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252813#M49502</link>
      <description>&lt;P&gt;What level of logging is set in the track field for the matching rule is it detailed or extended?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk120536" target="_self"&gt;sk120536: Application Control or URL Filtering does not produce logs in Logs &amp;amp; Monitor view&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 06:49:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252813#M49502</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-07-09T06:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252828#M49505</link>
      <description>&lt;P&gt;Great point Chris, extended logging definitely helps.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 12:40:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252828#M49505</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-09T12:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252829#M49506</link>
      <description>&lt;P&gt;Yes, you either pick full HTTPS inspection OR&amp;nbsp;&lt;SPAN&gt;Categorized HTTPS Sites option&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Or you enable both&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Start to enable&amp;nbsp;&lt;SPAN&gt;Categorized HTTPS Sites option , no changes are needed on users for this. It checks the certificate without full decryption&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 12:48:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252829#M49506</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-07-09T12:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252848#M49516</link>
      <description>&lt;P&gt;Currently I have the logs related to URL in Detailed mode.&lt;/P&gt;
&lt;P&gt;If I put it in ‘Extended’ mode, can it stay this way permanently? Or is there any risk of high resource consumption?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 09 Jul 2025 13:34:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252848#M49516</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-07-09T13:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: URLF, does not block</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252980#M49568</link>
      <description>&lt;P&gt;The option to log something Detailed/Extended is just like any option in a rule: it'll stay configured that way until you change it.&lt;BR /&gt;Extended logging only makes sense if the traffic is subject to HTTPS Inspection, which is the only way to see the full URL.&lt;BR /&gt;Otherwise, thinking about it, not sure Extended logging makes any sense here.&lt;/P&gt;
&lt;P&gt;However, there are some improvements to HTTPS Inspection logging (relevant here, even if you're not actually using it) in later JHFs that might be worth considering.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 17:32:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-does-not-block/m-p/252980#M49568</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-07-10T17:32:16Z</dc:date>
    </item>
  </channel>
</rss>

