<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wildcard fqdn not matching R80.40 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99111#M7744</link>
    <description>&lt;P&gt;So i gather that domain Objects are not the way to got with this.&lt;/P&gt;&lt;P&gt;i'm glad you mentioned App Control definition for TeamViewer, i was going to make a separate post for this. As using this results in a permit any for all ports matched in the App Control definition for TeamViewer. Including http and https.&lt;/P&gt;&lt;P&gt;Connections are permitted with this reason:&lt;/P&gt;&lt;P&gt;Connection terminated before detection: Insufficient data passed.&lt;BR /&gt;To learn more see sk113479.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've atached some screenshots.&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Oct 2020 14:20:07 GMT</pubDate>
    <dc:creator>nw-team01</dc:creator>
    <dc:date>2020-10-14T14:20:07Z</dc:date>
    <item>
      <title>Wildcard fqdn not matching R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99101#M7742</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a problem using wildcard fqdn's in R80.40, here is the exact issue:&lt;/P&gt;&lt;P&gt;DE-FRA-ANX-P002.teamviewer.com&lt;/P&gt;&lt;P&gt;will not match to: .*.teamviewer.com&amp;nbsp; or .*teamviewer.com or .teamviewer.com&amp;nbsp;&lt;/P&gt;&lt;P&gt;No matter what combination i try, all traffic towards teamviewer.com ends up in the cleanup rule.&lt;/P&gt;&lt;P&gt;Similar issues with other domains also: .*citrixonline\.*, .*gotomeeting\.*...&lt;/P&gt;&lt;P&gt;Can anyone help me with this?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 13:54:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99101#M7742</guid>
      <dc:creator>nw-team01</dc:creator>
      <dc:date>2020-10-14T13:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard fqdn not matching R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99104#M7743</link>
      <description>&lt;P&gt;What precise object type are you using to create this?&lt;BR /&gt;Perhaps a screenshot would help.&lt;/P&gt;
&lt;P&gt;If it’s a Domain object, this won’t work at all since that relies on reverse DNS which is almost never going to resolve to the correct name.&lt;BR /&gt;If it’s a Custom Application/Site, then it will only work for HTTP/HTTPS traffic.&lt;/P&gt;
&lt;P&gt;I’m also pretty sure we have an App Control definition for TeamViewer which I recommend instead.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 14:04:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99104#M7743</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-14T14:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard fqdn not matching R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99111#M7744</link>
      <description>&lt;P&gt;So i gather that domain Objects are not the way to got with this.&lt;/P&gt;&lt;P&gt;i'm glad you mentioned App Control definition for TeamViewer, i was going to make a separate post for this. As using this results in a permit any for all ports matched in the App Control definition for TeamViewer. Including http and https.&lt;/P&gt;&lt;P&gt;Connections are permitted with this reason:&lt;/P&gt;&lt;P&gt;Connection terminated before detection: Insufficient data passed.&lt;BR /&gt;To learn more see sk113479.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've atached some screenshots.&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 14:20:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99111#M7744</guid>
      <dc:creator>nw-team01</dc:creator>
      <dc:date>2020-10-14T14:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard fqdn not matching R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99144#M7749</link>
      <description>&lt;P&gt;That’s the way App Control works: some traffic has to be allowed on the relevant ports for TeamViewer in order to determine it’s actually TeamViewer.&lt;BR /&gt;If the connection terminates before we’ve made a determination, which usually requires a few packets, then yes, that connection will be allowed.&lt;/P&gt;
&lt;P&gt;What is your precise goal here?&lt;BR /&gt;Is it to allow access to TeamViewer’s website, using the TeamViewer application, or?&lt;BR /&gt;The TeamViewer website may require a different rule than the Application Signature, which is more for the TeamViewer application itself.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 03:33:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99144#M7749</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-15T03:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard fqdn not matching R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99158#M7751</link>
      <description>&lt;P&gt;FQDN is not a wildcard, is it?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 06:53:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99158#M7751</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-10-15T06:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: Wildcard fqdn not matching R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99171#M7752</link>
      <description>&lt;P&gt;Yes, i have now learned that wildcard fqdn's dont work.&lt;/P&gt;&lt;P&gt;My goal is to get teamviewer working again. Something on the end user PC's changed and the proxy settings are ignored, of course no one knows why. And only our Sites in Romania are affected.&lt;/P&gt;&lt;P&gt;I've just tested again using the App Control definition for TeamViewer, that works fine for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Slightly off topic here, but regarding fqdn's. I use the ip block tool described in sk103154 and beside some dynamic feeds i also feed a list (attached) of fqdn's and IP's that i manually edit. That should be fine i hope when not using wildcards..?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 07:41:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wildcard-fqdn-not-matching-R80-40/m-p/99171#M7752</guid>
      <dc:creator>nw-team01</dc:creator>
      <dc:date>2020-10-15T07:41:46Z</dc:date>
    </item>
  </channel>
</rss>

