<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNI on  security gateway 1490 in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87372#M3673</link>
    <description>SNI support was added to the 1500 series codebase running R80.20.x.&lt;BR /&gt;You may have to exclude by IP. &lt;BR /&gt;As far as I know, there are no plans to add SNI support to the 1400 series.</description>
    <pubDate>Fri, 05 Jun 2020 05:49:39 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-06-05T05:49:39Z</dc:date>
    <item>
      <title>SNI on  security gateway 1490</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87356#M3672</link>
      <description>&lt;P&gt;Recently we had trouble accessing some https websites hosted by cloudflare, such sites have in its CN's certificates =sni.cloudflaressl.com, besides in SAN the domain name requested. Here is the list:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;syscom.mx&lt;/LI&gt;&lt;LI&gt;eleconomista.com.mx&lt;/LI&gt;&lt;LI&gt;tabascohoy.com&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After review SK's and contact with TAC's, well, there is no much to do:&amp;nbsp;&amp;nbsp;SNI is not supported on SG 1490 locally management.&amp;nbsp; TAC's solution is create https exceptions to each website, however there are hundreds, thousands websites outthere with this technology implemented on its webserver, not only hosted by cloudflare, but many other hosting services. Website's list formerly mentionated has grown... and I'm sure will continu growing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to know how have you dealt with this situation? Do you create exception to each website?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for you support comments.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 23:59:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87356#M3672</guid>
      <dc:creator>LuisSP</dc:creator>
      <dc:date>2020-06-04T23:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: SNI on  security gateway 1490</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87372#M3673</link>
      <description>SNI support was added to the 1500 series codebase running R80.20.x.&lt;BR /&gt;You may have to exclude by IP. &lt;BR /&gt;As far as I know, there are no plans to add SNI support to the 1400 series.</description>
      <pubDate>Fri, 05 Jun 2020 05:49:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87372#M3673</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-06-05T05:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: SNI on  security gateway 1490</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87465#M3674</link>
      <description>Greetings PhoneBoy.&lt;BR /&gt;&lt;BR /&gt;I appretiated your reply,. Regarding to exclude by IP (unique solution by TAC), I face collateral trouble, if I would have to exclude community.checkpoint.com, nslookup get me next IP address:&lt;BR /&gt;&lt;BR /&gt;nslookup community.checkpoint.com&lt;BR /&gt;Respuesta no autoritativa:&lt;BR /&gt;Nombre: d2m0sklryvkyy2.cloudfront.net&lt;BR /&gt;Addresses:&lt;BR /&gt;13.226.214.104&lt;BR /&gt;13.226.214.61&lt;BR /&gt;13.226.214.41&lt;BR /&gt;13.226.214.86&lt;BR /&gt;Aliases: community.checkpoint.com&lt;BR /&gt;fyrhh23835.lithium.com&lt;BR /&gt;&lt;BR /&gt;but 13.226.214.86 is resolved by lulify.com too:&lt;BR /&gt;&lt;BR /&gt;nslookup lulify.com&lt;BR /&gt;Respuesta no autoritativa:&lt;BR /&gt;Nombre: lulify.com&lt;BR /&gt;Addresses:&lt;BR /&gt;13.226.214.126&lt;BR /&gt;13.226.214.86&lt;BR /&gt;13.226.214.56&lt;BR /&gt;13.226.214.46&lt;BR /&gt;&lt;BR /&gt;so, creating a https exception by ip open traffic to lulify.com in this case, what it's not malicious site, but imagine that such website was inside a category not allowed.&lt;BR /&gt;&lt;BR /&gt;Unfortunatetly CheckPoint did throw over its promise to upgrade appliance 1490 to r80.x (unknow reasons).&lt;BR /&gt;&lt;BR /&gt;Thanks again.</description>
      <pubDate>Sat, 06 Jun 2020 01:20:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87465#M3674</guid>
      <dc:creator>LuisSP</dc:creator>
      <dc:date>2020-06-06T01:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: SNI on  security gateway 1490</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87470#M3675</link>
      <description>It was originally planned to put R80.20 on the earlier SMB appliances.&lt;BR /&gt;However, it turns out the R80.20+ code requires more resources than is available on the 700/1200R/1400 series.&lt;BR /&gt;You may be able to execute a trade-in for a 1590 through your local Check Point office/reseller.&lt;BR /&gt;</description>
      <pubDate>Sat, 06 Jun 2020 03:57:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87470#M3675</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-06-06T03:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: SNI on  security gateway 1490</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87484#M3677</link>
      <description>&lt;P&gt;Have you tried this?:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60280/highlight/true#M12199" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/m-p/60280/highlight/true#M12199&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should be available on 14xx locally managed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jun 2020 21:50:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87484#M3677</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2020-06-06T21:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: SNI on  security gateway 1490</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87657#M3687</link>
      <description>I tried it, but unfrotunatetly solution expressed in above url do not worked on my case.&lt;BR /&gt;&lt;BR /&gt;Thanks Miguel.</description>
      <pubDate>Mon, 08 Jun 2020 20:36:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SNI-on-security-gateway-1490/m-p/87657#M3687</guid>
      <dc:creator>LuisSP</dc:creator>
      <dc:date>2020-06-08T20:36:54Z</dc:date>
    </item>
  </channel>
</rss>

