<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Rewriting internet access policy in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Rewriting-internet-access-policy/m-p/256224#M43144</link>
    <description>&lt;P&gt;Our current rule base is pretty old, two ordered layers - access and appcontrol\url, and i'm going to rewrite utilizing just one combined layer.&amp;nbsp; A few questions&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Our current representation of the internet in policy is a negated group of all internal networks.&amp;nbsp; I want to start using the "internet" object but seeing unexpected behavior.&amp;nbsp; My understanding of this object is any traffic that leaves on an "external" interface, that doesn't go through a VPN.&amp;nbsp; But..i'm seeing traffic that leaves on the external interface via a 2s2 tunnel being caught by this rule.&amp;nbsp; The tunnel is managed by our management server.&amp;nbsp; Is this considered correct behavior?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;All relevant blades are enabled: https inspection, app control, url filtering.
&lt;UL&gt;
&lt;LI&gt;Let's say for O365 - would y'all use the "Office365 Worldwide Services" updatable object, or the "Microsoft &amp;amp; Office365 Services" url category, or the many application objects?&amp;nbsp; What's really the difference between these 3 very different methods of allowing traffic?&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just noticed that i show many more URL categories in dashboard than are listed on this URL:&amp;nbsp;&amp;nbsp;&lt;A href="https://usercenter.checkpoint.com/ucapps/urlcat/categories" target="_blank"&gt;https://usercenter.checkpoint.com/ucapps/urlcat/categories&lt;/A&gt;.&amp;nbsp; Does anyone know if there is an updated list somewhere, i need to forward on to a few folks.&amp;nbsp; thanks&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2025 18:49:15 GMT</pubDate>
    <dc:creator>D_TK</dc:creator>
    <dc:date>2025-08-29T18:49:15Z</dc:date>
    <item>
      <title>Rewriting internet access policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Rewriting-internet-access-policy/m-p/256224#M43144</link>
      <description>&lt;P&gt;Our current rule base is pretty old, two ordered layers - access and appcontrol\url, and i'm going to rewrite utilizing just one combined layer.&amp;nbsp; A few questions&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Our current representation of the internet in policy is a negated group of all internal networks.&amp;nbsp; I want to start using the "internet" object but seeing unexpected behavior.&amp;nbsp; My understanding of this object is any traffic that leaves on an "external" interface, that doesn't go through a VPN.&amp;nbsp; But..i'm seeing traffic that leaves on the external interface via a 2s2 tunnel being caught by this rule.&amp;nbsp; The tunnel is managed by our management server.&amp;nbsp; Is this considered correct behavior?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;All relevant blades are enabled: https inspection, app control, url filtering.
&lt;UL&gt;
&lt;LI&gt;Let's say for O365 - would y'all use the "Office365 Worldwide Services" updatable object, or the "Microsoft &amp;amp; Office365 Services" url category, or the many application objects?&amp;nbsp; What's really the difference between these 3 very different methods of allowing traffic?&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Many thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just noticed that i show many more URL categories in dashboard than are listed on this URL:&amp;nbsp;&amp;nbsp;&lt;A href="https://usercenter.checkpoint.com/ucapps/urlcat/categories" target="_blank"&gt;https://usercenter.checkpoint.com/ucapps/urlcat/categories&lt;/A&gt;.&amp;nbsp; Does anyone know if there is an updated list somewhere, i need to forward on to a few folks.&amp;nbsp; thanks&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 18:49:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Rewriting-internet-access-policy/m-p/256224#M43144</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2025-08-29T18:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Rewriting internet access policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Rewriting-internet-access-policy/m-p/256226#M43145</link>
      <description>&lt;P&gt;If I were you, I would do this...but this is just my personal opnion, though I have not had any issues with this approach in the lab or any clients.&lt;/P&gt;
&lt;P&gt;1) in ordered network layer, just have as many inline layers as needed, representing each interface (tied to a zone) and remove any rules with 0 hits, just to clean it up&lt;/P&gt;
&lt;P&gt;2) have urlf + appc layer, with simply those blades enabled and yes, you can use Internet object as destination&lt;/P&gt;
&lt;P&gt;Just make sure traffic is allowed on all ordered layers, ie you can have any any allow at the bottom of the last ordered layer, thats fine.&lt;/P&gt;
&lt;P&gt;I attached doc I made while back with some screenshots. I know its related to https inspection, but you get an idea.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 19:05:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Rewriting-internet-access-policy/m-p/256226#M43145</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-29T19:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: Rewriting internet access policy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Rewriting-internet-access-policy/m-p/256231#M43147</link>
      <description>&lt;P&gt;Updatable Objects fundamentally use a programmatic list provided by the vendor.&lt;BR /&gt;Updatable Objects do not require advanced blades to use, but if the Updatable Object is wrong, you may miss something.&lt;/P&gt;
&lt;P&gt;Microsoft &amp;amp; Office365 Services uses Application Control signatures similar to the individual app signatures, which are there for granularity sake.&lt;BR /&gt;This isn't tied to IP addresses, but it definitely requires App Control/URL Filtering, which means traffic must pass through Medium Path to be properly detected.&lt;BR /&gt;App Control is definitely required to restrict Office 365 to a specific tenant:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk146993" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk146993&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are actually two types of categories: App Control categories (which use signatures) and URL Filtering categories (which are by URL).&lt;BR /&gt;They are shown together in the UI.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 21:03:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Rewriting-internet-access-policy/m-p/256231#M43147</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-08-29T21:03:35Z</dc:date>
    </item>
  </channel>
</rss>

