<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Spark 1900 URL &amp;amp; APP filtering issue in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241837#M12083</link>
    <description>&lt;P&gt;Categories example such as gambling, Shopping, Media, Youtube.&lt;/P&gt;&lt;P&gt;Amazon.in&lt;/P&gt;&lt;P&gt;flipkart.com&lt;/P&gt;&lt;P&gt;888.com&lt;/P&gt;&lt;P&gt;velonyx.live&lt;/P&gt;&lt;P&gt;and many more&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Feb 2025 17:57:28 GMT</pubDate>
    <dc:creator>AmitS</dc:creator>
    <dc:date>2025-02-20T17:57:28Z</dc:date>
    <item>
      <title>Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241745#M12076</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;We have a 1900 spark appliance in Cluster version R81.10.10.&lt;/P&gt;&lt;P&gt;Requirement is to have APP &amp;amp; URL Blocking based on the predefined categories (e.g Shopping, FTP, Social, Media etc) with out HTTPS inspection as customer cannot install the certificates on endpoint and/or mobile devices.&lt;/P&gt;&lt;P&gt;We have tested to use HTTPS categorization but its not working as expected, few sites are getting blocked and some are working, hence not achieving the desired solution.&lt;/P&gt;&lt;P&gt;but when HTTPS inspection is configured all is working properly, the categories which are blocked in rule are not working which is desired.&lt;/P&gt;&lt;P&gt;Is there any other way to achieve this???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 08:11:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241745#M12076</guid>
      <dc:creator>AmitS</dc:creator>
      <dc:date>2025-02-20T08:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241748#M12077</link>
      <description>&lt;P&gt;I would first install the current version &lt;STRONG&gt;R81.10.15 Build 996003913&lt;/STRONG&gt; and after testing, open SR# with CP TAC to get this resolved.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 08:31:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241748#M12077</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-02-20T08:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241775#M12079</link>
      <description>&lt;P&gt;Do you have an explicit rule blocking QUIC in your rulebase?&lt;BR /&gt;QUIC traffic will not be categorized by HTTPS Categorization.&lt;BR /&gt;By blocking QUIC, the client web browsers should fall back to HTTP/1.1, for which traffic can be categorized correctly.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 13:13:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241775#M12079</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-20T13:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241778#M12080</link>
      <description>&lt;P&gt;Yes, QUIC - but recently with 1600, blocking QUIC on GW did not help, so customer had to disable it for browsers using GPO.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 13:20:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241778#M12080</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-02-20T13:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241804#M12081</link>
      <description>&lt;P&gt;Yes, we have explicit rule to block QUIC. Still categorisation is not working.&lt;/P&gt;&lt;P&gt;Any alternate solution?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 15:06:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241804#M12081</guid>
      <dc:creator>AmitS</dc:creator>
      <dc:date>2025-02-20T15:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241822#M12082</link>
      <description>&lt;P&gt;HTTPS Categorization uses one two things to categorize websites for HTTP/HTTPS connections (QUIC connections aren't supported for HTTPS Categorization):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The DN of the site certificate (which is always unencrypted, but may not reflect the actual site being accessed)&lt;/LI&gt;
&lt;LI&gt;The &lt;EM&gt;&lt;STRONG&gt;unencrypted&lt;/STRONG&gt;&lt;/EM&gt; SNI of the HTTPS connection. If the &lt;A href="https://www.cloudflare.com/learning/ssl/what-is-encrypted-sni/" target="_self"&gt;SNI is encrypted&lt;/A&gt;, there is no way to see the SNI short of full HTTPS Inspection, thus not possible to categorize the connection.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Specific examples of websites that should be being blocked but aren't might be helpful.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 16:20:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241822#M12082</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-20T16:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241837#M12083</link>
      <description>&lt;P&gt;Categories example such as gambling, Shopping, Media, Youtube.&lt;/P&gt;&lt;P&gt;Amazon.in&lt;/P&gt;&lt;P&gt;flipkart.com&lt;/P&gt;&lt;P&gt;888.com&lt;/P&gt;&lt;P&gt;velonyx.live&lt;/P&gt;&lt;P&gt;and many more&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 17:57:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241837#M12083</guid>
      <dc:creator>AmitS</dc:creator>
      <dc:date>2025-02-20T17:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241864#M12084</link>
      <description>&lt;P&gt;To see if the problem is Encrypted SNI, you will have to take a packet capture when the client initiates a connection to this site.&lt;BR /&gt;If it's Encrypted SNI, the only solution to that is HTTPS Inspection.&lt;BR /&gt;If the SNI is not encrypted and it's not working, then I suggest a TAC case.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 19:55:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241864#M12084</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-20T19:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241901#M12091</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;Customer is having other Firewall as well such as Palo alto &amp;amp; sonicwall &amp;amp; same thing is working there without SSL/HTTPS inspections..&lt;/P&gt;&lt;P&gt;So here in Checkpoint its not working without Https inspections...&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 05:31:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241901#M12091</guid>
      <dc:creator>AmitS</dc:creator>
      <dc:date>2025-02-21T05:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241971#M12097</link>
      <description>&lt;P&gt;A TAC case will be necessary to investigate this issue further.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2025 21:42:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241971#M12097</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-21T21:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241996#M12099</link>
      <description>&lt;P&gt;To accelerate the analysis - I would try Quantum centrally managed, SPARK centrally managed as well&lt;/P&gt;
&lt;P&gt;(For simplicity VM version can be used. It will allow us to pinpoint where the problem is.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2025 12:11:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/241996#M12099</guid>
      <dc:creator>Amir_Erman</dc:creator>
      <dc:date>2025-02-22T12:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244657#M12307</link>
      <description>&lt;P&gt;TAC is already raised but still not proper solution.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 08:06:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244657#M12307</guid>
      <dc:creator>AmitS</dc:creator>
      <dc:date>2025-03-25T08:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244658#M12308</link>
      <description>&lt;P&gt;We have tried testing with&amp;nbsp;&lt;SPAN&gt;Quantum centrally managed full Gaia in LAB (VM based) &amp;amp; there categorization is working properly, blocking is working as expected based on categories configured in rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But the same is not working with 1900 spark appliances with Local Management.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 08:09:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244658#M12308</guid>
      <dc:creator>AmitS</dc:creator>
      <dc:date>2025-03-25T08:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244659#M12309</link>
      <description>&lt;P&gt;I had taken captures on Firewall, there was no encrypted SNI.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 08:10:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244659#M12309</guid>
      <dc:creator>AmitS</dc:creator>
      <dc:date>2025-03-25T08:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244676#M12314</link>
      <description>&lt;P&gt;Can you confirm the browsers are configured the same in each test scenario, this site will be useful here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cloudflare.com/ssl/encrypted-sni/#results" target="_blank"&gt;https://www.cloudflare.com/ssl/encrypted-sni/#results&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 11:46:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/244676#M12314</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-03-25T11:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/254613#M13052</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Same issue, using&amp;nbsp;&lt;SPAN&gt;current firmware version is&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;R81.10.17 (996004653)&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Is there any update regarding this ?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 23:43:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/254613#M13052</guid>
      <dc:creator>Vickman</dc:creator>
      <dc:date>2025-08-05T23:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Spark 1900 URL &amp; APP filtering issue</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/254615#M13053</link>
      <description>&lt;P&gt;If you have already tested with the equivalent of the following set for 'hold' instead of background then you should take it internally or with TAC.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="hold.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31122i55079F02324E2128/image-size/large?v=v2&amp;amp;px=999" role="button" title="hold.png" alt="hold.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 00:07:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Spark-1900-URL-amp-APP-filtering-issue/m-p/254615#M13053</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-08-06T00:07:37Z</dc:date>
    </item>
  </channel>
</rss>

