<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100915#M8732</link>
    <description>&lt;DIV&gt;
&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11456"&gt;@Kaspars_Zibarts&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In R80.30 JHF this feature is selectively enabled while in R80.40 it's enabled to all (depends on the rulebase configuration of course).&lt;/P&gt;
&lt;P&gt;O365 updatable objects is one of the updatable objects that use this feature because it contains both IPs and &lt;U&gt;Domains&lt;/U&gt; (as appears in MS &lt;A tabindex="-1" title="https://endpoints.office.com/endpoints/worldwide?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7" href="https://endpoints.office.com/endpoints/worldwide?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7" target="_blank" rel="noreferrer noopener"&gt;feed&lt;/A&gt;).&lt;/P&gt;
&lt;DIV&gt;Regarding what is the impact on O365 updatable object if the feature will be off, I'll explain with an example:&lt;/DIV&gt;
&lt;DIV&gt;One of the domains O365 object contains is&amp;nbsp;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;*.manage.office.com&lt;/STRONG&gt;&lt;/EM&gt; domain. &lt;BR /&gt;When this feature is enabled, the GW is able to match domains like &lt;EM&gt;&lt;STRONG&gt;XXX.manage.office.com&lt;/STRONG&gt;&lt;/EM&gt; to O365 updatable object.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;If the feature is off, such sub-domains may not be matched to O365 updatable object and it may cause few pages to not be loaded properly.&lt;BR /&gt;&lt;BR /&gt;If there are more questions I would love to schedule a call to answer everything&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Meital (&lt;A href="mailto:meitalna@checkpoint.com" target="_blank"&gt;meitalna@checkpoint.com&lt;/A&gt;)&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 02 Nov 2020 15:09:20 GMT</pubDate>
    <dc:creator>Meital_Natanson</dc:creator>
    <dc:date>2020-11-02T15:09:20Z</dc:date>
    <item>
      <title>FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100441#M8721</link>
      <description>&lt;P&gt;I'm not too sure if it is also relevant to non-VSX gateways but if you are running R80.40 and using FQDN I would suggest to check it straight away&lt;/P&gt;
&lt;P&gt;Say I created a rule that uses FQDN as a destination that should resolve to one IP only:&lt;/P&gt;
&lt;P&gt;updates.checkpoint.com -&amp;nbsp;104.121.238.27&lt;/P&gt;
&lt;P&gt;But domains_tools show me 20(!) extra IP addresses associated with this FQDN:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image.png" style="width: 789px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8668iFEF58828898B7D06/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And my test rule confirms that the "real" IP and "fake" IPs are accepted by the rule:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2020-10-28_21-27-17.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8669i3A1440B741785AEE/image-size/large?v=v2&amp;amp;px=999" role="button" title="2020-10-28_21-27-17.jpg" alt="2020-10-28_21-27-17.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So basically we have no trust in any of FQDN based rules right now in R80.40 - it can be open to anything!&lt;/P&gt;
&lt;P&gt;Really worried now as I checked some other FQDN objects and they were even worse with 50+ IPs associated with them instead of 1&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_screaming_in_fear:"&gt;😱&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 20:49:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100441#M8721</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-10-28T20:49:16Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100446#M8722</link>
      <description>&lt;P&gt;Interesting - we've seen inconsistent results with 2 firewalls (non-VSX) running R80.40 JHF78 and FQDN. Same policy - different outcome !!&lt;/P&gt;&lt;P&gt;One where the application control correctly drops the traffic to an FQDN domain object, the other allows it through.&lt;/P&gt;&lt;P&gt;One gateway is resolving one IP for the FQDN, the other is resolving two IPs , same DNS server(s) configured in the same order on Gaia.&lt;/P&gt;&lt;P&gt;Anyone from TAC care to comment ?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 21:18:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100446#M8722</guid>
      <dc:creator>Peter_Lyndley</dc:creator>
      <dc:date>2020-10-28T21:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100504#M8723</link>
      <description>&lt;P&gt;Just tried on newly built non-VSX gateway in the lab with one FQDN objec only and this bug might allow connecting to gateway itself on 0.0.0.0 not only some random additional public IPs!&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="2020-10-29_7-46-54.jpg" style="width: 829px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8693i6DCAF93BF43F8FB9/image-size/large?v=v2&amp;amp;px=999" role="button" title="2020-10-29_7-46-54.jpg" alt="2020-10-29_7-46-54.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 06:58:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100504#M8723</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-10-29T06:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100511#M8724</link>
      <description>&lt;P&gt;Just updating the thread that we took it offline with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11456"&gt;@Kaspars_Zibarts&lt;/a&gt;&amp;nbsp; and we will update the thread once we identify RCA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 08:14:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100511#M8724</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2020-10-29T08:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100518#M8725</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2124"&gt;@Peter_Lyndley&lt;/a&gt;&amp;nbsp;do you have a TAC case open for this?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 08:54:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100518#M8725</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-10-29T08:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100523#M8726</link>
      <description>&lt;P&gt;I can confirm that workaround did the trick!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 09:36:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100523#M8726</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-10-29T09:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100578#M8727</link>
      <description>&lt;P&gt;no, not yet&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 16:39:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100578#M8727</guid>
      <dc:creator>Peter_Lyndley</dc:creator>
      <dc:date>2020-10-29T16:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100586#M8728</link>
      <description>&lt;P&gt;Aren't those "unexpected" IPs simply CDN's distribution points?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 17:49:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100586#M8728</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2020-10-29T17:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100695#M8729</link>
      <description>&lt;P&gt;I have given my word to R&amp;amp;D not to tell. Before they have had official answer. But not CDN. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 22:59:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100695#M8729</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-10-30T22:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100804#M8730</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I'm Meital Natanson, R&amp;amp;D Group Manager at Check Point.&lt;/P&gt;
&lt;P&gt;My group is the R&amp;amp;D responsible for Domain objects.&lt;/P&gt;
&lt;P&gt;In order to improve non-FQDN domains matching and updatable objects matching, we introduced ‘DNS Passive Learning’ feature in R80.40 and R80.30 JHF T196 and above (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk161612&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;sk161612&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;This means that the GW “listens” to DNS traffic that pass through the GW which is destined to predefined DNS servers in order to learn non-FQDN domains and their IP resolving for better and accurate matching.&lt;/P&gt;
&lt;P&gt;The feature is enabled only when DNS servers are properly configured on the GW and non-FQDN objects (or specific updatable objects) are used in the policy.&lt;/P&gt;
&lt;P&gt;What you described above is because with this feature enabled, we keep the DNS resolved IP and its &lt;U&gt;additional records&lt;/U&gt; for the queried domain.&lt;/P&gt;
&lt;P&gt;This is the current behavior and we plan to publish a change in the upcoming weeks.&lt;/P&gt;
&lt;P&gt;Meanwhile, you can disable the feature by either changing the policy by not using non-FQDN (if this is an option) or disabling it on the GW with the following commands:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create the&amp;nbsp;&lt;EM&gt;$FWDIR/boot/modules/fwkern.conf&lt;/EM&gt;&amp;nbsp;file (if it does not already exit):&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName]# touch $FWDIR/boot/modules/fwkern.conf&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Edit the&amp;nbsp;&lt;EM&gt;$FWDIR/boot/modules/fwkern.conf&lt;/EM&gt;&amp;nbsp;file in vi editor:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName]# vi $FWDIR/boot/modules/fwkern.conf&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Add the following line (spaces and comments are not allowed):&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;dns_data_src_enabled=0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Save the changes and exit from Vi editor.&lt;/LI&gt;
&lt;LI&gt;Check the contents of the&amp;nbsp;&lt;EM&gt;$FWDIR/boot/modules/fwkern.conf&lt;/EM&gt;&amp;nbsp;file:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName]# cat $FWDIR/boot/modules/fwkern.conf&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Reboot the Security Gateway.&lt;/LI&gt;
&lt;LI&gt;Verify that the new value was set:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;[Expert@HostName]# fw ctl get int dns_data_src_enabled&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Do the same for the second member as well.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Meital (&lt;A href="mailto:meitalna@checkpoint.com" target="_blank"&gt;meitalna@checkpoint.com&lt;/A&gt;)&lt;/P&gt;</description>
      <pubDate>Sun, 01 Nov 2020 19:52:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100804#M8730</guid>
      <dc:creator>Meital_Natanson</dc:creator>
      <dc:date>2020-11-01T19:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100833#M8731</link>
      <description>&lt;P&gt;Thanks alot&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2480"&gt;@Meital_Natanson&lt;/a&gt;&amp;nbsp;for detailed description! It really helps as I feel much better when I can explain faults &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Quick question though we were on Take 219 on R80.30 before upgrade and did not experiance any issues. Not too sure if that's important info for you guys?&lt;/P&gt;
&lt;P&gt;Additionally would turing off DPL cause any issues to O365 Updatable object? We did not have any non-FQDN objects so I suspect that "fault" was somehow triggerred by O365 UO.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 07:41:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100833#M8731</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-11-02T07:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100915#M8732</link>
      <description>&lt;DIV&gt;
&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11456"&gt;@Kaspars_Zibarts&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In R80.30 JHF this feature is selectively enabled while in R80.40 it's enabled to all (depends on the rulebase configuration of course).&lt;/P&gt;
&lt;P&gt;O365 updatable objects is one of the updatable objects that use this feature because it contains both IPs and &lt;U&gt;Domains&lt;/U&gt; (as appears in MS &lt;A tabindex="-1" title="https://endpoints.office.com/endpoints/worldwide?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7" href="https://endpoints.office.com/endpoints/worldwide?clientrequestid=b10c5ed1-bad1-445f-b386-b919946339a7" target="_blank" rel="noreferrer noopener"&gt;feed&lt;/A&gt;).&lt;/P&gt;
&lt;DIV&gt;Regarding what is the impact on O365 updatable object if the feature will be off, I'll explain with an example:&lt;/DIV&gt;
&lt;DIV&gt;One of the domains O365 object contains is&amp;nbsp;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;*.manage.office.com&lt;/STRONG&gt;&lt;/EM&gt; domain. &lt;BR /&gt;When this feature is enabled, the GW is able to match domains like &lt;EM&gt;&lt;STRONG&gt;XXX.manage.office.com&lt;/STRONG&gt;&lt;/EM&gt; to O365 updatable object.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;If the feature is off, such sub-domains may not be matched to O365 updatable object and it may cause few pages to not be loaded properly.&lt;BR /&gt;&lt;BR /&gt;If there are more questions I would love to schedule a call to answer everything&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Meital (&lt;A href="mailto:meitalna@checkpoint.com" target="_blank"&gt;meitalna@checkpoint.com&lt;/A&gt;)&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 02 Nov 2020 15:09:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/100915#M8732</guid>
      <dc:creator>Meital_Natanson</dc:creator>
      <dc:date>2020-11-02T15:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101072#M8733</link>
      <description>&lt;P&gt;You are making me nervous&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2480"&gt;@Meital_Natanson&lt;/a&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; You are basically implying that CP updatable object might not fully match MS O365 requirements for subdomains (domains that are specified with a wildcard, i.e *.manage.office.com)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'll send you an email, we can take this offline for now!&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 07:30:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101072#M8733</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-11-04T07:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101794#M8734</link>
      <description>&lt;P&gt;So just to try and understand impact a little more:&lt;/P&gt;&lt;P&gt;1) A gateway running R80.10 isn't impacted, correct?&lt;/P&gt;&lt;P&gt;2) If I don't use Updatable objects, and only use FQDN domain objects (FQDN box is checked), is there an impact on R80.40 irrespective of the setting?&lt;/P&gt;&lt;P&gt;When will this setting be editable via the policy vs. having to manually edit the kernel configuration on each gateway?&amp;nbsp; Especially seeing as the default setting for R80.40 gateways could significantly reduce the security of the gateway when using domain or updateable objects.&lt;/P&gt;&lt;P&gt;Is this actually being fixed, or is the fix just to disable the feature at this time and render use of updatable objects less than ideal?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 14:55:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101794#M8734</guid>
      <dc:creator>Heath_H</dc:creator>
      <dc:date>2020-11-11T14:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101796#M8735</link>
      <description>&lt;P&gt;I guess&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2480"&gt;@Meital_Natanson&lt;/a&gt;&amp;nbsp;is the best to answer but R80.10 is not affected - passive DNS was introduced after R80.30 T196.&lt;/P&gt;
&lt;P&gt;I believe if you don't use Updatable Objects, you should be OK. That was my understanding at least.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 15:12:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101796#M8735</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2020-11-11T15:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: FQDN objects allowing non-relevant IP addresses in R80.40 T78</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101799#M8736</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21738"&gt;@Heath_H&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;1) Correct. In pre R80.30 GWs, passive DNS learning feature doesn't exist hence issue is not relevant.&lt;/P&gt;
&lt;P&gt;2) No. The issue may happen only when using specific updatable objects or non-FQDN domain objects.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The fix will be released in the incoming JHF releases of R80.30, R80.40 and R81 - the fix handles the additional records properly and not disabling the whole feature.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Meital&lt;/P&gt;</description>
      <pubDate>Wed, 11 Nov 2020 15:18:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FQDN-objects-allowing-non-relevant-IP-addresses-in-R80-40-T78/m-p/101799#M8736</guid>
      <dc:creator>Meital_Natanson</dc:creator>
      <dc:date>2020-11-11T15:18:35Z</dc:date>
    </item>
  </channel>
</rss>

