<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking pornography without https inspection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48045#M87134</link>
    <description>&lt;P&gt;Hmm.. Tim, I think I may be missing something here:&lt;/P&gt;
&lt;P&gt;The URL itself contains the word "porno".&lt;/P&gt;
&lt;P&gt;We may surmise that the back-end categorization of sites would parse it out, we'll have the regex match for the categorization and would prevent even the DNS portion of communication.&lt;/P&gt;
&lt;P&gt;So why are we even performing lookup of this URL's IP, connecting to it, analyzing its certificate etc.. ?&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2019 22:31:31 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2019-03-20T22:31:31Z</dc:date>
    <item>
      <title>Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47939#M87123</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Trying to block pornsites like Youporn fails without https inspection in R80.10.&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;STRONG&gt;Categorize HTTPS websites&lt;/STRONG&gt;" is enabled. Youporn use a *.youporn.com certificate.&lt;/P&gt;&lt;P&gt;Is it true that Application control will not be able to block Pornography category for all sites that use a *.xxxx certificate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 12:03:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47939#M87123</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2019-03-20T12:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47940#M87124</link>
      <description>&lt;P&gt;Do you have the APPC/URLF enabled, added to the layer and are blocking the category "Pornography"?&lt;/P&gt;
&lt;P&gt;Any chance a higher rule permitting it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 12:09:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47940#M87124</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-20T12:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47949#M87125</link>
      <description>&lt;P&gt;APPC/URLF enabled added as to the layer and blocking category "Pornography".&amp;nbsp;&lt;/P&gt;&lt;P&gt;If &lt;A href="https://youporn.com" target="_blank"&gt;https://youporn.com&lt;/A&gt; is used there is no match for that rule in the Application layer and it's being accepted by the default allow in the end of the application rules.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If &lt;A href="http://youporn.com" target="_blank"&gt;http://youporn.com&lt;/A&gt; is used it's being blocked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you think the *.youporn.com certificate is the problem?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 12:47:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47949#M87125</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2019-03-20T12:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47951#M87126</link>
      <description>&lt;P&gt;Nope, I think it is a categorization problem. Please report it to Check Point.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 12:50:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47951#M87126</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-20T12:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47953#M87127</link>
      <description>&lt;P&gt;checked on R80.20, is blocked&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HTTPS_inspection_1.png" style="width: 895px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/297i8C70893393BE288A/image-size/large?v=v2&amp;amp;px=999" role="button" title="HTTPS_inspection_1.png" alt="HTTPS_inspection_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 12:54:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47953#M87127</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-03-20T12:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47955#M87128</link>
      <description>&lt;P&gt;Then perhaps the exception categories should be examined.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 13:04:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47955#M87128</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-20T13:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47956#M87129</link>
      <description>&lt;P&gt;Thanks for checking Wolfgang. I hope someone can check it also in R80.10 without https inspection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 13:04:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47956#M87129</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2019-03-20T13:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47964#M87130</link>
      <description>&lt;P&gt;Hi Ed,&lt;/P&gt;&lt;P&gt;We're also experiencing this issues on R80.20 for pornography sites hosted on cloudflare. HTTPS categorization is enabled, but the site is not recognized under HTTPS. We opened a TAC case for another customer on R80.10 with this issue also, and the only viable solution is to enable HTTPS Inspection based on sk121532.&lt;/P&gt;&lt;P&gt;Our policy it's configured to block uncategorized and porn sites; however since the site on HTTPS returns cloudflare certificate, the connection is allowed on second instance:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="imagen.png" style="width: 911px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/300i25263092EB3EE3C9/image-size/large?v=v2&amp;amp;px=999" role="button" title="imagen.png" alt="imagen.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here is the DNS Query for the site:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="imagen.png" style="width: 555px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/301i3C2CA829AB447B19/image-size/large?v=v2&amp;amp;px=999" role="button" title="imagen.png" alt="imagen.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You can check the alternate names on the site to get other porn sites that are hosted under the same cloudflare certificate; also not blocked.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 13:36:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47964#M87130</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2019-03-20T13:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47973#M87131</link>
      <description>&lt;P&gt;checked with R80.10, blocked without HTTPS inspection&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https-inspection_R80.10.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/304i598E6DF329BD5D4E/image-size/large?v=v2&amp;amp;px=999" role="button" title="https-inspection_R80.10.PNG" alt="https-inspection_R80.10.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 14:14:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/47973#M87131</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-03-20T14:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48005#M87132</link>
      <description>&lt;P&gt;Right, the reason that full HTTPS Inspection must be enabled in that case is that the server's certificate name/subject does not match the actual domain/website being requested by the user.&amp;nbsp; In R80.30 it is planned to be able to leverage the Server Name Indication (SNI) provided by the client for filtering, instead of what the server's certificate says.&amp;nbsp; Should definitely help with this particular situation.&amp;nbsp; I think there may be a special version of R80.20 that supports SNI inspection as well.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 17:06:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48005#M87132</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-03-20T17:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48043#M87133</link>
      <description>&lt;P&gt;The following is new in r80.30:&lt;/P&gt;
&lt;P&gt;- SNI Support&lt;/P&gt;
&lt;P&gt;- TLS1.3&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Heiko&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 22:08:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48043#M87133</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-03-20T22:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48045#M87134</link>
      <description>&lt;P&gt;Hmm.. Tim, I think I may be missing something here:&lt;/P&gt;
&lt;P&gt;The URL itself contains the word "porno".&lt;/P&gt;
&lt;P&gt;We may surmise that the back-end categorization of sites would parse it out, we'll have the regex match for the categorization and would prevent even the DNS portion of communication.&lt;/P&gt;
&lt;P&gt;So why are we even performing lookup of this URL's IP, connecting to it, analyzing its certificate etc.. ?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 22:31:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48045#M87134</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-20T22:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48054#M87135</link>
      <description>While some have said blocking the DNS lookups is a solution, it’s not full proof either. What if the DNS lookup doesn’t go thru the security device? Or traverses a DNS over HTTPS proxy like CloudFlare operates?&lt;BR /&gt;&lt;BR /&gt;Having proper support for SNI is definitely going to help here.</description>
      <pubDate>Thu, 21 Mar 2019 04:35:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48054#M87135</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-21T04:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48062#M87136</link>
      <description>&lt;P&gt;Wolfgang, thanks again for checking. Does R80.10 support having both HTTPS inspection and "Categorize HTTPS websites" enabled concurrently? When you tested did you have both enabled (without having your source machine going through HTTPS inspection?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 07:01:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48062#M87136</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2019-03-21T07:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48092#M87137</link>
      <description>&lt;P&gt;I had once similar issue. In my case HTTPS access to porno worked because there was an Application Control rule with "SSL Protocol" allowed.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 11:57:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48092#M87137</guid>
      <dc:creator>Boris_Karnaukh</dc:creator>
      <dc:date>2019-03-21T11:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48115#M87138</link>
      <description>&lt;P&gt;Any chance you have HTTPS Inspection active for testing/only for specific sources?&lt;BR /&gt;Or do you use a proxy?&lt;BR /&gt;&lt;BR /&gt;Then HTTPS Categorization will not work in R80.10.&lt;/P&gt;&lt;P&gt;See:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108202#Additional%20Information%20-%20Update%20Services" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108202#Additional%20Information%20-%20Update%20Services&lt;/A&gt;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;The Categorize HTTPS sites option does not run if:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;HTTPS Inspection is enabled -&amp;nbsp;&lt;STRONG&gt;solved in R80.20 and above&lt;/STRONG&gt;&amp;nbsp;under&amp;nbsp;PMTR-3908&lt;/LI&gt;&lt;LI&gt;There is a proxy between the destination site and the Security Gateway (or the Security Gateway functions as a proxy)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 14:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48115#M87138</guid>
      <dc:creator>D_W</dc:creator>
      <dc:date>2019-03-21T14:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48132#M87139</link>
      <description>&lt;P&gt;Of course relying strictly on DNS is not a solution, for all we know the site could have a URL of "&lt;A href="https://www.cakebaking.com" target="_blank"&gt;https://www.cakebaking.com&lt;/A&gt;" and be a porn site. The issue with Cloudflare is also a possibility, albeit is not a prevalent situation yet. That being said, if we do see the URL in the clear and if the portion of its name does clearly indicate its intended use, why not take advantage of it at this early stage and forego additional processing just to block it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also wander if in this case, the categorization is st to "Hold":&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 655px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/335i8D4008D89B641A43/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And if this will help.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 15:16:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48132#M87139</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-21T15:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48245#M87140</link>
      <description>&lt;P&gt;Hi D_W,&lt;/P&gt;&lt;P&gt;I have HTTPS inspection active for only specific sources and also categorize HTTPS websites enabled. Turned off HTTPS inspection and the App/URL now stops the porn sites. I have some questions left:&lt;/P&gt;&lt;P&gt;1. What is the reason that having both HTTPS inspection and categorize HTTPS sites doesn't work in R80.10?&lt;/P&gt;&lt;P&gt;2. If i had to choose only one of these in R80.10, forexample HTTPS inspection and turned off categorization of HTTPS sites. How reliable is the APP/URL blade to stop HTTPS sites that belong to pornography category without being HTTPS inspected?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; do you have any input on these questions?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 09:25:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48245#M87140</guid>
      <dc:creator>ED</dc:creator>
      <dc:date>2019-03-22T09:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48286#M87141</link>
      <description>&lt;P&gt;Doesn't matter if the URL requested by the client contains the word "porno", that is not what the firewall is looking at for categorization.&amp;nbsp; It is looking at the site name in the certificate sent by the remote server, which does not necessarily match the site name requested by the client.&amp;nbsp; This difference is what will be addressed by SNI inspection.&amp;nbsp; Some large social media companies have taken advantage of this difference in an attempt to avoid filtering and keep their users engaged 24/7 even at work where the site is supposed to be blocked.&amp;nbsp; All "to help ensure the privacy of their users".&amp;nbsp; Yeah right...&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 13:45:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48286#M87141</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-03-22T13:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking pornography without https inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48288#M87142</link>
      <description>&lt;P&gt;What about http:// sites?&lt;/P&gt;
&lt;P&gt;I mean what is wrong, conceptually, with the idea of categorization based on the content of the site's name in addition to the SNI? In the end, it is looking at the strings identifying the sites, it is just in case of SNI inspection it is retrieving them from the certs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 13:58:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Blocking-pornography-without-https-inspection/m-p/48288#M87142</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-22T13:58:27Z</dc:date>
    </item>
  </channel>
</rss>

