- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi,
I have created a rule to allow all IPads to reach to .apple.com domain. The problem is that not all IPads are reaching to that domain, but some still drop, this is my rule:
Source: Ipad network
destination: .apple.com domain
services and application: any
Action:accept
Track:log
The IPad network is 10.10.32.0/19. After adding that rule some IPads are accepted to reach .apple.com:
And some still drop:
So why some are still dropping? They are reaching to the Cleanup rule 59.12, where 59.3 is to accept all connections to Apple?!
59 is an Inline layer where IPad network is in the source of it.
What do I miss here?!
Just allow 17.0.0.0/8 subnet, that will fix it, as thats what Apple uses.
https://news.ycombinator.com/item?id=3341349
Otherwise, make sure urlf and appc blades are enabled and follow what Guenther suggested, screenshots are there, its pretty straight forward...you need to use built in applications in smart console, just type apple when adding it in the rule and bunch of stuff will pop up.
Andy
https://community.checkpoint.com/t5/Security-Gateways/Apple-and-HTTPS-Inspection/m-p/176039
What @G_W_Albrecht is your best process to follow...now, IF you dont use urlf blade, then domain objects is fine, but make sure it says .*.apple.com and fqdn option is unchecked, otherwise, it may not match all needed sub-domains.
Andy
When trying to make it *.apple.com i get this:
Now my domain object looks like this:
What if URL and application blades are active, is there any better way to do that ?
Yes, if those are enabled, please follow what @G_W_Albrecht suggested.
Andy
Maybe you missed . in my post : -)
I mentioned .*.apple.com, but you can also do .*apple.com
Every domain object MUST start with .
Hope that helps
Andy
Please refer to below link:
https://support.checkpoint.com/results/sk/sk120633
Now it looks like this:
But still have drops!
I don't really understand what @G_W_Albrecht suggestion is?!
How should I use app and url blades to achieve the same?
Just allow 17.0.0.0/8 subnet, that will fix it, as thats what Apple uses.
https://news.ycombinator.com/item?id=3341349
Otherwise, make sure urlf and appc blades are enabled and follow what Guenther suggested, screenshots are there, its pretty straight forward...you need to use built in applications in smart console, just type apple when adding it in the rule and bunch of stuff will pop up.
Andy
It works fine now with 17.0.0.0/8
URL and application, do you mean enable all these?
Could well be that only using 17.0.0.0/8 works for you, i would try before doing any other configuration !
Not really, if that range works, then its good. I would leave it as is then.
Andy
Also, as per below
https://developer.apple.com/forums/thread/44549
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 23 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 5 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY