- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello, everyone,
We are in the process of implementing the IA+APPC&URLF+HTTPS Inspection... blades.
So far everything seems to be going "fine".
We are using the IDC for the iA blade.
We are working with separate layers (1 Firewall layer, 1 APPC+URLF layer).
The rules are working fine so far, but there are some "alerts".
We are blocking access to "Social Networking" for a group of users.
The rule is working, but there is some traffic, such as consumption of the Facebook page, which is not blocked and is allowed to pass.
We are using a self-signed certificate, which is already deployed to the users by GPO.
When a user consumes Facebook via web, the page does open (and this should not happen).
I get the "untrusted site" message from the page, and when I check the certificate, I don't see our certificate, I see the public certificate.
This behavior is happening on some pages, not all.
Do you know what steps can be followed in this scenario, to get pages like Facebook blocked?
Thanks for your help.
Are you using Google Chrome to test or are multiple browsers affected?
Is Quic traffic blocked or allowed in the environment?
Hello,
I had not read about "QUIC Traffic", until now.
Where can I validate that?
We have tested in 3 browsers, Chrome, Edge, Mozilla.
They are only for "certain" pages.
Facebook web, is one of them.
The rest of the pages, if it is blocking them by the rule created.
Greetings.
There is built in quic application in R81.20 you can use (not sure lower versions). If not, you can do below:
https://support.checkpoint.com/results/sk/sk111754
Also, I attached how I have it set in my lab. Its only appc+urlf blade in that layer.
Andy
Hey, bro
I have version R81.10 in production.
I'm going to check the SK.
The weird thing is that it only happens for certain "web pages".
The rest of the pages are being inspected and blocked according to our policies.
We have the layers separated (as you can see in the following image)
Cheers. 🙂
QUIC traffic is not categorized by Check Point.
There needs to be an explicit rule blocking this service in the Access Policy.
Hello, PhoneBoy.
You would have to create an explicit rule in the Firewall layer, denying the "UDP/443" service, which I understand is what the QUIC uses, and also create an explicit rule in the APPC+URLF layer, is this correct?
Or is it enough just to create the drop rule in the Firewall layer?
Thank you.
Fw layer is good bro. Idea is this...whatever is dropped on first layer, there is no more checks. Whatever is accepted on fw layer, it has to be accepted on all additional layers.
Andy
Haaa, Ok.
So, I can define an explicit rule only in the Firewall layer, something like this:
Source: Any
Destination: Any
Service: QUIC (UDP/443)
Action: DROP
With this explicit rule, it would be enough for me to block the famous "QUIC", right?
Yes sir 🙂
I will test the recommendation in the work window, because it is very rare that only for certain pages, it does not apply the block filter for web pages.
Are you able to provide a screenshot of the log card showing that the traffic was allowed?
(Please redact sensitive information).
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 41 | |
| 21 | |
| 9 | |
| 7 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY