<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logical Servers Object easy to manipulate with local host file in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/100144#M7814</link>
    <description>&lt;P&gt;First of all Https Inspection is turned on and activated on the FW.&lt;/P&gt;&lt;P&gt;We are trying to create a Load balancer for our internal Kubernetes Cluster, the Kubernetes Cluster has internal and external DNS.&lt;/P&gt;&lt;P&gt;The FW rule is a follow:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="85"&gt;&lt;P&gt;Source&lt;/P&gt;&lt;/TD&gt;&lt;TD width="274"&gt;&lt;P&gt;Dest&lt;/P&gt;&lt;/TD&gt;&lt;TD width="265"&gt;&lt;P&gt;NAT ip&lt;/P&gt;&lt;/TD&gt;&lt;TD width="151"&gt;&lt;P&gt;service&lt;/P&gt;&lt;/TD&gt;&lt;TD width="161"&gt;&lt;P&gt;Action&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="85"&gt;&lt;P&gt;Any&lt;/P&gt;&lt;/TD&gt;&lt;TD width="274"&gt;&lt;P&gt;Logical SRV Public ip 85.x.x.x DNS:Api.Contoso.Com&lt;/P&gt;&lt;/TD&gt;&lt;TD width="265"&gt;&lt;P&gt;Nat ip internal web servers10.x.x.101-102 DNS inside: Admin.K8s.local.Com&lt;/P&gt;&lt;/TD&gt;&lt;TD width="151"&gt;&lt;P&gt;Https&lt;/P&gt;&lt;/TD&gt;&lt;TD width="161"&gt;&lt;P&gt;Allow&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;As you see, if you from internet know the internal DNS names, (Admin.K8s.local.Com) and from a laptop update the host file like this: 85.241.20.85&amp;nbsp; Admin.K8s.local.Com, this rule above will not stop you, you receive a CA error. The Logical Server Object should had an option to use URL and not public ip only.&lt;/P&gt;&lt;P&gt;The problem is, if you do as described over, you reach out to Kubernetes Admin page,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Oct 2020 12:53:57 GMT</pubDate>
    <dc:creator>geirh</dc:creator>
    <dc:date>2020-10-26T12:53:57Z</dc:date>
    <item>
      <title>Logical Servers Object easy to manipulate with local host file</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/99659#M7788</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have created a&amp;nbsp;Logical Servers objects to Load Balance to our back-end web servers. Everything works fine, however it is easy to&amp;nbsp;manipulate with local host file if you know the internal web servers DNS name.&lt;/P&gt;&lt;P&gt;The Logical server is setup with an public ip and DNS name and do NAT to internal back-end web servers, however if you knew the DNS name for internal web server and manipulate the local host file where you put in the public ip and the name for internal web server you will be routed trough the Logical Server, there will be CA error but it works.&lt;/P&gt;&lt;P&gt;Here is the guide we followed:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_NextGenSecurityGateway_Guide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_NextGenSecurityGateway_Guide/205222" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_NextGenSecurityGateway_Guide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_NextGenSecurityGateway_Guide/205222&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have tried to block using Https Inspection for incoming traffic,&amp;nbsp; but this tool is useless and we also expected that R80.40 had higher TLS value (TLS 1.0 as min.??) and stronger Chipers since Https Inspection takes over as front end web server for security.&lt;/P&gt;&lt;P&gt;The Https Inscetion rule should have blocked incoming traffic if the Web browser presented wrong SNI.&lt;/P&gt;&lt;P&gt;Applications &amp;amp; URL filters does not work either together with Logical server Objects, we receives some Layer error.&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 06:26:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/99659#M7788</guid>
      <dc:creator>geirh</dc:creator>
      <dc:date>2020-10-21T06:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: Logical Servers Object easy to manipulate with local host file</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/99671#M7789</link>
      <description>&lt;P&gt;I would suggest to involve TAC asap to get the issue resolved ! But honestly - why did you have to manipulate the local host file at all ? It should be very hard to manipulate the local host file in a secured production evironment...&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 07:11:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/99671#M7789</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-10-21T07:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Logical Servers Object easy to manipulate with local host file</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/100022#M7804</link>
      <description>&lt;P&gt;Manipulate the host file on what machine precisely?&lt;BR /&gt;Are you sure that HTTPS Inspection is actually activating in this case?&lt;/P&gt;</description>
      <pubDate>Sat, 24 Oct 2020 05:56:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/100022#M7804</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-24T05:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: Logical Servers Object easy to manipulate with local host file</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/100144#M7814</link>
      <description>&lt;P&gt;First of all Https Inspection is turned on and activated on the FW.&lt;/P&gt;&lt;P&gt;We are trying to create a Load balancer for our internal Kubernetes Cluster, the Kubernetes Cluster has internal and external DNS.&lt;/P&gt;&lt;P&gt;The FW rule is a follow:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="85"&gt;&lt;P&gt;Source&lt;/P&gt;&lt;/TD&gt;&lt;TD width="274"&gt;&lt;P&gt;Dest&lt;/P&gt;&lt;/TD&gt;&lt;TD width="265"&gt;&lt;P&gt;NAT ip&lt;/P&gt;&lt;/TD&gt;&lt;TD width="151"&gt;&lt;P&gt;service&lt;/P&gt;&lt;/TD&gt;&lt;TD width="161"&gt;&lt;P&gt;Action&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="85"&gt;&lt;P&gt;Any&lt;/P&gt;&lt;/TD&gt;&lt;TD width="274"&gt;&lt;P&gt;Logical SRV Public ip 85.x.x.x DNS:Api.Contoso.Com&lt;/P&gt;&lt;/TD&gt;&lt;TD width="265"&gt;&lt;P&gt;Nat ip internal web servers10.x.x.101-102 DNS inside: Admin.K8s.local.Com&lt;/P&gt;&lt;/TD&gt;&lt;TD width="151"&gt;&lt;P&gt;Https&lt;/P&gt;&lt;/TD&gt;&lt;TD width="161"&gt;&lt;P&gt;Allow&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;As you see, if you from internet know the internal DNS names, (Admin.K8s.local.Com) and from a laptop update the host file like this: 85.241.20.85&amp;nbsp; Admin.K8s.local.Com, this rule above will not stop you, you receive a CA error. The Logical Server Object should had an option to use URL and not public ip only.&lt;/P&gt;&lt;P&gt;The problem is, if you do as described over, you reach out to Kubernetes Admin page,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 12:53:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Logical-Servers-Object-easy-to-manipulate-with-local-host-file/m-p/100144#M7814</guid>
      <dc:creator>geirh</dc:creator>
      <dc:date>2020-10-26T12:53:57Z</dc:date>
    </item>
  </channel>
</rss>

