<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: best practices for blocking URLs in a scenario where resources have different URLs but the same in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255653#M42989</link>
    <description>&lt;P&gt;We use the "Destination" column, which contains an object of the "Domains" type.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Aug 2025 14:28:59 GMT</pubDate>
    <dc:creator>Oliver_222</dc:creator>
    <dc:date>2025-08-21T14:28:59Z</dc:date>
    <item>
      <title>best practices for blocking URLs in a scenario where resources have different URLs but the same IP</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255327#M42904</link>
      <description>&lt;P&gt;Please tell me the best practices for blocking URLs in a scenario where two resources have different URLs but the same IP.&lt;BR /&gt;The problem is that we block a malicious resource using a domain object in the access rules, but we see in the logs that this rule also blocks a legitimate resource.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 12:23:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255327#M42904</guid>
      <dc:creator>Oliver_222</dc:creator>
      <dc:date>2025-08-18T12:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255330#M42906</link>
      <description>&lt;P&gt;Is the URL filtering blade licensed / used for this gateway?&lt;/P&gt;
&lt;P&gt;This works differently than your current approach (DNS objects in FW blade).&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:04:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255330#M42906</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-18T14:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255333#M42909</link>
      <description>&lt;P&gt;In case of 443, the fw will need to be able to see the cn in certificate or do full https inspection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on this you can create domain based object and the firewall will resolve it for you.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure you have correct blades: url filtering and enable either categorize https or full https inspection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 13:38:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255333#M42909</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-08-18T13:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255334#M42910</link>
      <description>&lt;P&gt;Can you give an example? I can test it in my https inspection lab.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 13:39:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255334#M42910</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-18T13:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255336#M42911</link>
      <description>&lt;P&gt;I'm not sure that's needed it appears simply about how DNS objects function, they are resolved to IPs.&lt;/P&gt;
&lt;P&gt;URL filtering works differently by comparison.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:03:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255336#M42911</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-18T14:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255337#M42912</link>
      <description>&lt;P&gt;Right, thats true, I just wanted to see if I can simulate it in the lab.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:04:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255337#M42912</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-18T14:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255338#M42913</link>
      <description>&lt;P&gt;minboth[.]click is a domain that is blocked by an access rule.&lt;/P&gt;&lt;P&gt;cdn.stepik.net is a legitimate resource with the same IP that should not be blocked, but it is blocked in our environment.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:18:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255338#M42913</guid>
      <dc:creator>Oliver_222</dc:creator>
      <dc:date>2025-08-18T14:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255339#M42914</link>
      <description>&lt;P&gt;Yes, the URL Filtering blade is enabled and licensed&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:20:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255339#M42914</guid>
      <dc:creator>Oliver_222</dc:creator>
      <dc:date>2025-08-18T14:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255340#M42915</link>
      <description>&lt;P&gt;Is https inspection enabled?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:25:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255340#M42915</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-18T14:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255342#M42917</link>
      <description>&lt;P&gt;Blade is enabled.&lt;BR /&gt;Its settings have fail-close mode.&lt;BR /&gt;Also enabled checkboxes: Categorize HTTPS websites, Enforce safe search on search engines, Categorize cached pages and translated pages in search engines.&lt;BR /&gt;Added http, https, HTTPS_proxy, HTTP_proxy.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:28:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255342#M42917</guid>
      <dc:creator>Oliver_222</dc:creator>
      <dc:date>2025-08-18T14:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255343#M42918</link>
      <description>&lt;P&gt;Not sure how its configured under blades, but in my case, I always set it like below for url filtering:&lt;/P&gt;
&lt;P&gt;fail mode -&amp;gt; block&lt;/P&gt;
&lt;P&gt;categorization -&amp;gt; background&lt;/P&gt;
&lt;P&gt;same for https inspection (under manage and settings -&amp;gt; blades)&lt;/P&gt;
&lt;P&gt;Btw, just tested your scenario, works fine for me, no issues.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 14:45:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255343#M42918</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-18T14:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255344#M42919</link>
      <description>&lt;P&gt;Can you share how that rule looks are you using the destination or services column?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 15:04:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255344#M42919</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-18T15:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255345#M42920</link>
      <description>&lt;P&gt;Is your firewall in the path between clients and the DNS server they use?&lt;BR /&gt;If so, you might want to implement &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/Content/Topics-TPG/Configuring-a-Malware-DNS-Trap.htm" target="_self"&gt;DNS Trap&lt;/A&gt;.&lt;BR /&gt;With Anti-Virus/Anti-Bot and DNS Trap configured, the malicious domain will resolve to the DNS Trap IP instead, which should be a harmless IP (the default IP provided is).&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 15:07:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255345#M42920</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-08-18T15:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255651#M42988</link>
      <description>&lt;P&gt;Yes, user requests to the DNS go through CheckPoint.&lt;BR /&gt;We thought about this option.&lt;BR /&gt;How should we configure the DNS Trap so that we can specify which URLs are malicious and which are safe? If I'm not mistaken, CheckPoint determines this itself.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 14:26:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255651#M42988</guid>
      <dc:creator>Oliver_222</dc:creator>
      <dc:date>2025-08-21T14:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255653#M42989</link>
      <description>&lt;P&gt;We use the "Destination" column, which contains an object of the "Domains" type.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 14:28:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255653#M42989</guid>
      <dc:creator>Oliver_222</dc:creator>
      <dc:date>2025-08-21T14:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255655#M42990</link>
      <description>&lt;P&gt;Just MAKE SURE to NOT configure dns trap to any IP address used anywhere in the network.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 14:31:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255655#M42990</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-21T14:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255656#M42991</link>
      <description>&lt;P&gt;Can you tell me how you tested it?&lt;BR /&gt;Did you enable HTTPS inspection and set the "Domains" object to ".cdn.stepik.net" in the allow rule and ".minboth.click" in the deny rule below?&lt;BR /&gt;I also want to mention that you should open the "stepik.org" website to see the redirect to cdn.stepik.net, which is blocked as minboth.click on CheckPoint.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 14:35:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255656#M42991</guid>
      <dc:creator>Oliver_222</dc:creator>
      <dc:date>2025-08-21T14:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255657#M42992</link>
      <description>&lt;P&gt;Yep, thats it. I wish I took a video or screenshot, apologies. My colleague is currently modifying our lab, since he has to put in more powerful firewall, so I cant access it at the moment, but thats the gist of it and yes, ssl inspection is on.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 14:37:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255657#M42992</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-21T14:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255688#M43007</link>
      <description>&lt;P&gt;DNS Trap is a Threat Prevention feature.&lt;BR /&gt;Domains already flagged as malicious ones in ThreatCloud will be rewritten to the DNS Trap IP.&lt;BR /&gt;You can create exceptions in your Threat Prevention policy using Custom Application/Site objects.&lt;BR /&gt;"Inactive" means allow, "Prevent" means block.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 19:51:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255688#M43007</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-08-21T19:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: best practices for blocking URLs in a scenario where resources have different URLs but the same</title>
      <link>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255703#M43008</link>
      <description>&lt;P&gt;You will likely need to switch to using URL filtering rather than Domain objects.&lt;/P&gt;
&lt;P&gt;At a minimum you could try a URL filtering rule / Layer above your current rule with the domain object to allow sites that you don't want blocked by it but this may not be fool proof.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2025 23:26:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/best-practices-for-blocking-URLs-in-a-scenario-where-resources/m-p/255703#M43008</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-21T23:26:19Z</dc:date>
    </item>
  </channel>
</rss>

