<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic URLF / APCL Whitelisting in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38693#M59080</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A customer wanted to allow his clients access to all sites needed by whitelisting (R77.30). He uses URLF / APCL blade, but no https inspection, so all he can do is let the blade categorize https sites. But he does not want to Allow any URLF Categories!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using Custom Categories for overriding URLF category to create exception does not work, because Custom Categories only can be used in URLF / APCL rulebase and is not available for "Overriding URLF category" that only shows the pre-defined categories. Otherwise, it would be possible to first create a new category and then overide the URLF categorization with this category for the sites to be whitelisted. Then he could allow the sites by allowing the new category (=RFE).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So he had to follow this procedure for site exceptions suggested by CP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Create one custom application with all the URLs that you need allow or different custom applications for each needed URL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Add the created application to "allow" rule on top of rule base&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Add "DNS protocol" and "SSL protocol"&amp;nbsp;services to the same rule (we have to allow them in case a custom application is used).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Install policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This solution will work even if HTTPS inspection is disabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Feb 2018 15:57:09 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2018-02-08T15:57:09Z</dc:date>
    <item>
      <title>URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38693#M59080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A customer wanted to allow his clients access to all sites needed by whitelisting (R77.30). He uses URLF / APCL blade, but no https inspection, so all he can do is let the blade categorize https sites. But he does not want to Allow any URLF Categories!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using Custom Categories for overriding URLF category to create exception does not work, because Custom Categories only can be used in URLF / APCL rulebase and is not available for "Overriding URLF category" that only shows the pre-defined categories. Otherwise, it would be possible to first create a new category and then overide the URLF categorization with this category for the sites to be whitelisted. Then he could allow the sites by allowing the new category (=RFE).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So he had to follow this procedure for site exceptions suggested by CP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Create one custom application with all the URLs that you need allow or different custom applications for each needed URL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Add the created application to "allow" rule on top of rule base&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Add "DNS protocol" and "SSL protocol"&amp;nbsp;services to the same rule (we have to allow them in case a custom application is used).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Install policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This solution will work even if HTTPS inspection is disabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Feb 2018 15:57:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38693#M59080</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-02-08T15:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38694#M59081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guenther,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you expand on the "3 different&amp;nbsp;custom applications&amp;nbsp;for each&amp;nbsp;URL"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Feb 2018 16:10:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38694#M59081</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-08T16:10:13Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38695#M59082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;why not using a regex for those site and assign to a custom categorie and put the categorie in an allow rule at the top? probably I am missing something&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2018 08:04:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38695#M59082</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2018-02-09T08:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38696#M59083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;call it a typo &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; Here, customer has two URLs that could have been whitelisted by IP address and one that had to use DNS resolving (collaboration site). That gave three...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2018 08:11:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38696#M59083</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-02-09T08:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38697#M59084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;regex is good if you are &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; I have seen strange side effects with regex created by people without very much experience and in analysis learned that pattern matching is not really that easy. So this seems much more appropriate as the customer can add more URLs if needed without risk of bad regex &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/cool.png" /&gt; .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2018 08:18:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38697#M59084</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-02-09T08:18:46Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38698#M59085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Günther,&lt;BR /&gt;I am searching for a solution of allowing specific youtube videos but blocking youtube and found this post.&lt;BR /&gt;Can you please explain in more details step 3 - "Add "DNS protocol" and "SSL protocol" apps to the same rule"?&lt;BR /&gt;My current situation: Mgmt &amp;amp; gateway in R80.20, I have a rule with:&lt;BR /&gt;- source: some IP addresses&lt;BR /&gt;- destination: any&lt;BR /&gt;- app &amp;amp; services: a list of youtube videos that I want to allow.&lt;/P&gt;&lt;P&gt;When I tried to go to a youtube video in the allowed list, it doesnot match with my rule but blocked by the next rule that blocks Youtube.&lt;BR /&gt;thanks,&lt;BR /&gt;Hiep.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 07:46:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38698#M59085</guid>
      <dc:creator>Hiep_Bui</dc:creator>
      <dc:date>2019-01-18T07:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38699#M59086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, i have corrected that to services&amp;nbsp;&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/wink.png" /&gt;&amp;nbsp;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 08:30:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38699#M59086</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-01-18T08:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38700#M59087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gunther,&lt;/P&gt;&lt;P&gt;I understood that you meant "services". I was actually asking you how the rules looked like.&lt;/P&gt;&lt;P&gt;(my current issue is I am not able to allow some specific youtube videos but block all others; or similarly, block a category of a site but allow other categories of the same site, for example: block &lt;A class="link-titled" href="https://www.bbc.com/sport" title="https://www.bbc.com/sport"&gt;https://www.bbc.com/sport&lt;/A&gt;&amp;nbsp; but allow &lt;A class="unlinked"&gt;https://www.bbc.com as well as other categories of bbc.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Hiep.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2019 07:54:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38700#M59087</guid>
      <dc:creator>Hiep_Bui</dc:creator>
      <dc:date>2019-01-21T07:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38701#M59088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest to create custom apps for the URLs&amp;nbsp;and add them to the rulebase, but this will need to have https inspection enabled - else it will be impossible to block&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://www.bbc.com/sport" rel="nofollow" style="color: #e45785; background-color: #ffffff; border: 0px; text-decoration: underline; font-size: 14px; padding: 0px calc(12px + 0.35ex) 0px 0px;"&gt;https://www.bbc.com/sport&lt;/A&gt;but not&amp;nbsp;&amp;nbsp;&lt;A style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;https://www.bbc.com.&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jan 2019 10:10:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/38701#M59088</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-01-21T10:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183286#M59089</link>
      <description>&lt;P&gt;Hello! Sorry to bring up such an old topic, but I am curious as to how this is working. In theory, without HTTPS inspection, the only time the URL is "seen" is during DNS resolution. Is this getting blocked at the DNS resolutions stage, much like a DNS query filter would work?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ask because I have a similar demand to block specific URLs without HTTPS inspection, however with the additional challenge that some domains user the same wildcard certificate and have the same destination IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;RK&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 20:03:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183286#M59089</guid>
      <dc:creator>RKinsp</dc:creator>
      <dc:date>2023-06-05T20:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183294#M59090</link>
      <description>&lt;P&gt;No the site name (SNI) is included in the Client Hello sent by the browser and that happens in the clear.&amp;nbsp; There is also a site name (subject) as part of the web server's certificate which is also sent before encryption starts.&amp;nbsp; However if these values are not truly indicative of where the user will end up, once encryption starts there is no way to see what happens after that without HTTPS Inspection.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 20:57:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183294#M59090</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-06-05T20:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183295#M59091</link>
      <description>&lt;P&gt;Thanks Timothy! BTW, big fan of your book.&lt;/P&gt;&lt;P&gt;In this case, if the SNI will does not help, is there any way to block the DNS query?&lt;/P&gt;&lt;P&gt;I realize it does not provide security, since a user could simply type the direct IP, but this is more of a control issue than security.&lt;/P&gt;&lt;P&gt;I figured the Custom Application Tool would be a way however I can no longer find the download for it (link in the SK is dead). I'm guessing it has been discontinued.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 21:02:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183295#M59091</guid>
      <dc:creator>RKinsp</dc:creator>
      <dc:date>2023-06-05T21:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: URLF / APCL Whitelisting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183296#M59092</link>
      <description>&lt;P&gt;You could just define a domain object matching the undesirable site then use it in a Drop rule, however this wouldn't affect the DNS lookup traffic:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk120633" target="_blank" rel="noopener"&gt;sk120633: Domain Objects in R8x.&lt;/A&gt;&amp;nbsp; Although I still am hesitant about recommending the use of domain objects due to some bad prior experiences, even though domain objects were revamped in R80.&lt;/P&gt;
&lt;P&gt;From the DNS end you could define a custom Threat Prevention Indicator for the Anti-virus or Anti-bot blades to match that site name, and block it that way.&amp;nbsp; If you do the Indicator for Anti-bot, I'm not completely sure if the offender would get caught by the Malware DNS trap in that instance or not.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 21:36:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/URLF-APCL-Whitelisting/m-p/183296#M59092</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-06-05T21:36:44Z</dc:date>
    </item>
  </channel>
</rss>

