- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hi,
I have created a rule to allow all IPads to reach to .apple.com domain. The problem is that not all IPads are reaching to that domain, but some still drop, this is my rule:
Source: Ipad network
destination: .apple.com domain
services and application: any
Action:accept
Track:log
The IPad network is 10.10.32.0/19. After adding that rule some IPads are accepted to reach .apple.com:
And some still drop:
So why some are still dropping? They are reaching to the Cleanup rule 59.12, where 59.3 is to accept all connections to Apple?!
59 is an Inline layer where IPad network is in the source of it.
What do I miss here?!
Just allow 17.0.0.0/8 subnet, that will fix it, as thats what Apple uses.
https://news.ycombinator.com/item?id=3341349
Otherwise, make sure urlf and appc blades are enabled and follow what Guenther suggested, screenshots are there, its pretty straight forward...you need to use built in applications in smart console, just type apple when adding it in the rule and bunch of stuff will pop up.
Andy
https://community.checkpoint.com/t5/Security-Gateways/Apple-and-HTTPS-Inspection/m-p/176039
What @G_W_Albrecht is your best process to follow...now, IF you dont use urlf blade, then domain objects is fine, but make sure it says .*.apple.com and fqdn option is unchecked, otherwise, it may not match all needed sub-domains.
Andy
When trying to make it *.apple.com i get this:
Now my domain object looks like this:
What if URL and application blades are active, is there any better way to do that ?
Yes, if those are enabled, please follow what @G_W_Albrecht suggested.
Andy
Maybe you missed . in my post : -)
I mentioned .*.apple.com, but you can also do .*apple.com
Every domain object MUST start with .
Hope that helps
Andy
Please refer to below link:
https://support.checkpoint.com/results/sk/sk120633
Now it looks like this:
But still have drops!
I don't really understand what @G_W_Albrecht suggestion is?!
How should I use app and url blades to achieve the same?
Just allow 17.0.0.0/8 subnet, that will fix it, as thats what Apple uses.
https://news.ycombinator.com/item?id=3341349
Otherwise, make sure urlf and appc blades are enabled and follow what Guenther suggested, screenshots are there, its pretty straight forward...you need to use built in applications in smart console, just type apple when adding it in the rule and bunch of stuff will pop up.
Andy
It works fine now with 17.0.0.0/8
URL and application, do you mean enable all these?
Could well be that only using 17.0.0.0/8 works for you, i would try before doing any other configuration !
Not really, if that range works, then its good. I would leave it as is then.
Andy
Also, as per below
https://developer.apple.com/forums/thread/44549
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 35 | |
| 22 | |
| 17 | |
| 12 | |
| 9 | |
| 9 | |
| 8 | |
| 8 | |
| 8 | |
| 7 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY