<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How URL filtering and Application control work in Checkpoint Firewall in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53413#M1152</link>
    <description>This document provides only the configuration part, I'm looking for internal process or working of URL filtering and Application control.</description>
    <pubDate>Tue, 14 May 2019 12:55:01 GMT</pubDate>
    <dc:creator>Yatiraj_Panchal</dc:creator>
    <dc:date>2019-05-14T12:55:01Z</dc:date>
    <item>
      <title>How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/52699#M1119</link>
      <description>&lt;P&gt;Hello Everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to know about "how URL filtering and Application Control work in checkpoint Firewall:.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!!!&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 15:25:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/52699#M1119</guid>
      <dc:creator>Yatiraj_Panchal</dc:creator>
      <dc:date>2019-05-06T15:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/52841#M1128</link>
      <description>I recommend reading the product documentation.&lt;BR /&gt;Assuming R80.20: &lt;A href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_NextGenSecurityGateway_Guide/html_frameset.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_NextGenSecurityGateway_Guide/html_frameset.htm&lt;/A&gt;&lt;BR /&gt;The section on How to Create an Access Policy is where this is discussed and there is a whole section on App Control and URL Filtering.</description>
      <pubDate>Wed, 08 May 2019 03:16:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/52841#M1128</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-05-08T03:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53413#M1152</link>
      <description>This document provides only the configuration part, I'm looking for internal process or working of URL filtering and Application control.</description>
      <pubDate>Tue, 14 May 2019 12:55:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53413#M1152</guid>
      <dc:creator>Yatiraj_Panchal</dc:creator>
      <dc:date>2019-05-14T12:55:01Z</dc:date>
    </item>
    <item>
      <title>How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53422#M1155</link>
      <description>&lt;P&gt;See &lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92743&amp;amp;partition=Advanced&amp;amp;product=URL" target="_blank" rel="noopener"&gt;sk92743: &lt;STRONG&gt;ATRG&lt;/STRONG&gt;: URL Filtering&lt;/A&gt; and&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73220&amp;amp;partition=Advanced&amp;amp;product=Application" target="_blank" rel="noopener"&gt;sk73220: &lt;STRONG&gt;ATRG&lt;/STRONG&gt;: Application Control&lt;/A&gt;&amp;nbsp;! Here you find details about the the internal working of these two blades.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2019 14:11:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53422#M1155</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-05-14T14:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53457#M1156</link>
      <description>Most Software Blades use the same basic architecture.&lt;BR /&gt;Here are a couple of documents that show the packet flow in different ways:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41747" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Logical-Packet-Flow/m-p/41747&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Simplified-Packet-Flow-document/m-p/16076" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Simplified-Packet-Flow-document/m-p/16076&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If you could tell us the actual problem you're trying to solve, we might be able to provide you with the documentation you need.</description>
      <pubDate>Tue, 14 May 2019 21:02:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53457#M1156</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-05-14T21:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53553#M1158</link>
      <description>Thanks for the reply.&lt;BR /&gt;&lt;BR /&gt;I want to know working of Application control and URL filtering.&lt;BR /&gt;Actually, you provide me packet flow.&lt;BR /&gt;&lt;BR /&gt;I want to know like: if any application comes to Checkpoint then how checkpoint identify the application is Skype or Facebook or etc.&lt;BR /&gt;Is there any specific unique code for every application and same for the URL.&lt;BR /&gt;May be in URL is matching pattern, I think so.</description>
      <pubDate>Thu, 16 May 2019 01:11:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53553#M1158</guid>
      <dc:creator>Yatiraj_Panchal</dc:creator>
      <dc:date>2019-05-16T01:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53705#M1160</link>
      <description>&lt;P&gt;Thanks for the solution, this is similar what I expect.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 14:09:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/53705#M1160</guid>
      <dc:creator>Yatiraj_Panchal</dc:creator>
      <dc:date>2019-05-17T14:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/72476#M1914</link>
      <description>&lt;P&gt;I believe the answer to your question is the following: Each known application has an associated Application ID. You are able to see the Application ID in the logs.&amp;nbsp;In R80 you can modify the default view and add the column manually. Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2020 21:51:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/72476#M1914</guid>
      <dc:creator>cwilliams</dc:creator>
      <dc:date>2020-01-16T21:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: How URL filtering and Application control work in Checkpoint Firewall</title>
      <link>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/72765#M1924</link>
      <description>Application Control uses signatures similar to IPS to determine what application a given traffic flow is.&lt;BR /&gt;URLs accessed do factor into this also.&lt;BR /&gt;&lt;BR /&gt;URL Filtering is similar but it merely uses the URL and not other characteristics.&lt;BR /&gt;A different online database is consulted for the categorization in this case.</description>
      <pubDate>Mon, 20 Jan 2020 22:10:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/How-URL-filtering-and-Application-control-work-in-Checkpoint/m-p/72765#M1924</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-01-20T22:10:29Z</dc:date>
    </item>
  </channel>
</rss>

