<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Signatures? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/168808#M28083</link>
    <description>&lt;P&gt;Hello mates, I hope all is well&lt;/P&gt;&lt;P&gt;I have the same problem with a vpn application,that connect to different server around the world.&lt;/P&gt;&lt;P&gt;The applications are itop VPN and radmin VPN and I want to block this traffic&amp;nbsp;specifically&lt;/P&gt;&lt;P&gt;What should we do? Should I oped a TAC case or use this tool?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Mon, 23 Jan 2023 20:32:47 GMT</pubDate>
    <dc:creator>BrunoCiongoli</dc:creator>
    <dc:date>2023-01-23T20:32:47Z</dc:date>
    <item>
      <title>Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25208#M5111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am attempting to create a signature for an Aruba VPN application to use with my Checkpoint App/URL filter.&amp;nbsp; I see the application ID within my log files (appears to be consistent) and have found a Checkpoint tools called Application Control Signature Tool (ACST) that can be used to create customer application signatures and import them.&amp;nbsp; However, the information that is being requested by ACST to build this signature is a little above my knowledge level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone within this community used ACST to develop a signature for Aruba VPN (application ID 2042272525)?&lt;/P&gt;&lt;P&gt;Does anyone have experience using ACST that could offer some examples to help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACST Admin Guide: &lt;A class="link-titled" href="http://dl3.checkpoint.com/paid/7d/7dc39df4c4c93fcba550b9f2d22768d9/CP_ApplicationControlSignatureTool_AdminGuide.pdf?HashKey=1527021511_bdf82de3415377f9bec268a561ceffd2&amp;amp;xtn=.pdf" title="http://dl3.checkpoint.com/paid/7d/7dc39df4c4c93fcba550b9f2d22768d9/CP_ApplicationControlSignatureTool_AdminGuide.pdf?HashKey=1527021511_bdf82de3415377f9bec268a561ceffd2&amp;amp;xtn=.pdf"&gt;http://dl3.checkpoint.com/paid/7d/7dc39df4c4c93fcba550b9f2d22768d9/CP_ApplicationControlSignatureTool_AdminGuide.pdf?Has…&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACST Download: &lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103051" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103051"&gt;Signature Tool for custom Application Control and URL Filtering applications&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks!&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2018 19:23:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25208#M5111</guid>
      <dc:creator>Mike_Schepers</dc:creator>
      <dc:date>2018-05-22T19:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25209#M5112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It’s possible the ACST isn’t the right answer here for your traffic.&lt;/P&gt;&lt;P&gt;We may be able to create a signature for this, please contact the TAC.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://www.checkpoint.com/support-services/contact-support/" title="https://www.checkpoint.com/support-services/contact-support/"&gt;Contact Support | Check Point Software&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 08:19:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25209#M5112</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-23T08:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25210#M5113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had originally opened a TAC case (3-0234333211) and that is how I found out about ACST; perhaps the tech assigned to my case was not aware that TAC could help create a signature?  Should I escalate the case or open another with some different information that could help me get to the proper engineering team?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 10:47:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25210#M5113</guid>
      <dc:creator>Mike_Schepers</dc:creator>
      <dc:date>2018-05-23T10:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25211#M5114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In some cases R&amp;amp;D needs to create the signature.&lt;/P&gt;&lt;P&gt;Did you provide packet captures as part of the SR?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 22:48:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25211#M5114</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-23T22:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25212#M5115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, I did not provide a packet capture… because the support engineer did not request one. Do you know what specifically I need to capture, and whether this needs to be done at the client PC, my firewall (which is the security perimeter gateway), or the far end VPN termination point? If the packet capture needs to be performed at my security gateway firewall, does this mean that I need to have HTTPS inspection enabled on my firewall?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2018 23:01:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25212#M5115</guid>
      <dc:creator>Mike_Schepers</dc:creator>
      <dc:date>2018-05-23T23:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25213#M5116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think it may be sufficient to do this from the gateway only.&lt;/P&gt;&lt;P&gt;HTTPS Inspection shouldn't need to be enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 05:03:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25213#M5116</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-24T05:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25214#M5117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you. I will open a new TAC case and start this process.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2018 10:24:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25214#M5117</guid>
      <dc:creator>Mike_Schepers</dc:creator>
      <dc:date>2018-05-24T10:24:35Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25215#M5118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to follow up, I checked with R&amp;amp;D and ACST is definitely not the right tool for the job here.&lt;/P&gt;&lt;P&gt;It's something we will likely have to create and the right approach is to open a TAC case as you've done.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you hit a roadblock with TAC, please contact me privately.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2018 16:25:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25215#M5118</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-06-11T16:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25216#M5119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;btw: it's getting time that https inspection policy supports applications created by acst. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Jun 2018 19:19:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/25216#M5119</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-11T19:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/168808#M28083</link>
      <description>&lt;P&gt;Hello mates, I hope all is well&lt;/P&gt;&lt;P&gt;I have the same problem with a vpn application,that connect to different server around the world.&lt;/P&gt;&lt;P&gt;The applications are itop VPN and radmin VPN and I want to block this traffic&amp;nbsp;specifically&lt;/P&gt;&lt;P&gt;What should we do? Should I oped a TAC case or use this tool?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jan 2023 20:32:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/168808#M28083</guid>
      <dc:creator>BrunoCiongoli</dc:creator>
      <dc:date>2023-01-23T20:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Application Signatures?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/168838#M28090</link>
      <description>&lt;P&gt;Without knowing precisely how the applications work, I recommend engaging the TAC.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 04:18:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Signatures/m-p/168838#M28090</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-24T04:18:42Z</dc:date>
    </item>
  </channel>
</rss>

