<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Control in R77 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24317#M4834</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Create a group that includes the host/networks you wish to subject to Application Control.&lt;/P&gt;&lt;P&gt;Ensure that is listed as the Source for&amp;nbsp;&lt;STRONG&gt;all&lt;/STRONG&gt; of&amp;nbsp;the Application Control rules you wish to create.&lt;/P&gt;&lt;P&gt;This will ensure that only the hosts you explicitly list will be subject to Application Control (and thus be in Medium Path)&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;All other sources&lt;/STRONG&gt;&lt;/EM&gt; will not be subject to Application Control and should remain in the SecureXL path, if eligible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note this assumes that the relevant hosts/networks are permitted to access the Internet via the Firewall rulebase, which must accept the traffic before Application Control even sees it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 May 2018 06:13:58 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-05-16T06:13:58Z</dc:date>
    <item>
      <title>Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24313#M4830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand in R77, traffic will hit firewall rule first and&amp;nbsp;after that application control rules applies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i would like a group of ip addresses hit firewall rule then hit application control rules(allow these ip address to access some domain objects, for instance *.google.com)&lt;/P&gt;&lt;P&gt;for the rest of the internal ip addressed, only need to hit firewall rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible and How do i set it up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Cathy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 May 2018 01:16:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24313#M4830</guid>
      <dc:creator>Cathy_Cheng</dc:creator>
      <dc:date>2018-05-16T01:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24314#M4831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The source for all the rules you create should be in terms of the&amp;nbsp;hosts you wish to subject to Application Control.&lt;/P&gt;&lt;P&gt;In R77.x, the implicit (last) rule is an &lt;STRONG&gt;Allow&lt;/STRONG&gt; rule (not a Drop rule like in the Firewall policy).&lt;/P&gt;&lt;P&gt;Connections accepted by this implicit accept rule should remain in the SecureXL path.&lt;/P&gt;&lt;P&gt;At least that's how it appears to work per the following SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk94484" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk94484"&gt;Accelerating traffic with the Security Acceleration Module (SAM) while also using non-accelerated blades&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 May 2018 04:57:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24314#M4831</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-16T04:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24315#M4832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Dameon.&amp;nbsp; I had a look a the SK, "&lt;SPAN style="font-size: 10pt;"&gt;Configure a group of networks under the policy rule to be scanned by the Application Control and URL Filtering Blade.&lt;/SPAN&gt;&amp;nbsp;"&amp;nbsp; how do I set up the firewall rule to configure a group of ip addresse to be scanned by the application control and url Filtering?". Currently, I have 60&amp;nbsp; firewall rules, the&amp;nbsp;implicit firewall rule is deny any any.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 May 2018 05:51:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24315#M4832</guid>
      <dc:creator>Cathy_Cheng</dc:creator>
      <dc:date>2018-05-16T05:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24316#M4833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically what the SK is saying is, for the pictured example:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Networks/Hosts mentioned in the group Groups_Networks_XYZ will be subject to Application Control and will flow through the Medium Path&lt;/LI&gt;&lt;LI&gt;Anything NOT listed in Groups_Networks_XYZ will be matched by the explicit rule, and thus remain in the SecureXL path&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The main thing is to make sure &lt;EM&gt;&lt;STRONG&gt;no explicit Application Control rules&lt;/STRONG&gt; &lt;STRONG&gt;match&lt;/STRONG&gt;&lt;/EM&gt; the traffic you want&amp;nbsp;to remain in the SecureXL path.&lt;/P&gt;&lt;P&gt;In other words, make sure your Application Control rulebase makes &lt;EM&gt;&lt;STRONG&gt;no mention&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;of the hosts who's traffic you want to remain in the SecureXL path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't want specific hosts to reach the Internet, they should be blocked from doing so in the Firewall rulebase.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 May 2018 06:05:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24316#M4833</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-16T06:05:07Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24317#M4834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Create a group that includes the host/networks you wish to subject to Application Control.&lt;/P&gt;&lt;P&gt;Ensure that is listed as the Source for&amp;nbsp;&lt;STRONG&gt;all&lt;/STRONG&gt; of&amp;nbsp;the Application Control rules you wish to create.&lt;/P&gt;&lt;P&gt;This will ensure that only the hosts you explicitly list will be subject to Application Control (and thus be in Medium Path)&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;All other sources&lt;/STRONG&gt;&lt;/EM&gt; will not be subject to Application Control and should remain in the SecureXL path, if eligible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note this assumes that the relevant hosts/networks are permitted to access the Internet via the Firewall rulebase, which must accept the traffic before Application Control even sees it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 May 2018 06:13:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24317#M4834</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-16T06:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24318#M4835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help. the application control works perfectly.&lt;/P&gt;&lt;P&gt;Just one more question re the regular expression&lt;/P&gt;&lt;P&gt;if I would like to allow http and https traffic to example.com and all subdomains of example.com, can I use wildcard&lt;/P&gt;&lt;P&gt;*.example.com in the application control policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H1 style="margin: 0px; padding: 0px; border: 0px currentColor; text-align: center; color: #000000; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 2rem; font-style: normal; font-weight: 200; word-spacing: 0px; vertical-align: baseline; white-space: normal; -ms-word-wrap: break-word; orphans: 2; widows: 2; background-color: #ffffff; font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;/H1&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2018 05:53:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24318#M4835</guid>
      <dc:creator>Cathy_Cheng</dc:creator>
      <dc:date>2018-05-17T05:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24319#M4836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For that to work correctly, you will probably need to have HTTPS Inspection enabled.&lt;/P&gt;&lt;P&gt;You could implement a version of this:&amp;nbsp;&lt;A href="https://community.checkpoint.com/thread/7853"&gt;Regex for TLD Blocks&lt;/A&gt;&amp;nbsp;but instead use the full domain instead of the TLD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's possible that Categorize HTTPS Sites may work depending on the site with a custom signature.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103051&amp;amp;partition=General&amp;amp;product=Application" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103051&amp;amp;partition=General&amp;amp;product=Application"&gt;Signature Tool for custom Application Control and URL Filtering applications&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2018 23:33:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24319#M4836</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-17T23:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24320#M4837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks Dameon. my concern is if I enable https inspection, will it impact the checkpoint performance?&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-align: left; color: #000000; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: DIN; font-size: 14px; font-style: normal; font-weight: 400; word-spacing: 0px; float: none; display: inline !important; white-space: normal; orphans: 2; widows: 2; background-color: #ffffff; font-variant-ligatures: normal; font-variant-caps: normal; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial;"&gt;if the https traffic is non-browser traffic. will the https inspection still work?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2018 05:14:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24320#M4837</guid>
      <dc:creator>Cathy_Cheng</dc:creator>
      <dc:date>2018-05-18T05:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control in R77</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24321#M4838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HTTPS Inspection has a performance impact for sure.&lt;/P&gt;&lt;P&gt;It may also impact non-browser HTTPS Traffic, which you can create exceptions for and/or enable Probe Bypass for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 May 2018 15:27:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-in-R77/m-p/24321#M4838</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-18T15:27:29Z</dc:date>
    </item>
  </channel>
</rss>

