- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
So we recently moved a few of our firewalls to R80.20+ (i.e. we are still upgrading to R80.30 from R80.20)
We are trying to start using the FQDN feature of domain objects for normal firewall traffic.
I'm trying to allow access to sftp and not a website.
If my destination is something like www.vanityname.net and I can create a Domain object like:
.vanityname.net and make sure the FQDN feature is checked.
Put that as the destination in a normal firewall rule and it works.
If I have a site like sftp.vanityname.net and I create:
.sftp.vanityname.net
and make sure the FQDN feature is checked.
Put that as the destination in a normal firewall rule and it works sometimes.
Are only second level domains supported with the FQDN feature? (i.e. name.com but not sub.name.com )
And to be very clear I'm not talking wildcard domain names.
@Aaron_Wrasman , .sftp.vanityname.net should work. If it does not, please try troubleshooting and/or opening a support call
What would you suggest for troubleshooting?
Open a SR# with TAC...
you could test with
domains_tool -d sftp.vanityname.net
on the cli of the GW to see which IPs that objects has (if any)
test it without the preceding period and you may have to run this command a couple of times to get a result
domains_tools is looking at the FQDN objects you have deployed in your policies on that particular gateway.
Do you have a domain object setup as .53.com and have the FQDN option turned on?
And then have that object in an enabled rule in your policies on that gateway?
@Aaron_Wrasman name resolution for this specific object on your FW for starters
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY