- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I had an interesting discussion about performing URL filtering using DNS only instead of URLs which allows faster resolving and will allow controlling of remote offices internet traffic without deploying URL Filtering on remote gateways or force redirection of internet traffic through the corporate gateway. This means that all DNS requests from remote offices are inspected by the gateway and allowed/blocked based on the DNS resolving. I know that the Anti-bot uses DNS for malicious website and also according to the "the R80.x Security Gateway Architecture (Content Inspection)" the RAD is using DNS as well but I am wandering if the URL filtering can be done based on the DNS request of the remote hosts or the http/https connection has to be opened and pass through the gateway.
This is similar to OpenDNS solution for Web Content filtering Web Content Filtering and Security – OpenDNS.
Any insights are welcome.
i would suggest sk92743 ATRG: URL Filtering for technical details.
I already looked at it. There is no mention to use of DNS by URLF or RAD


although the "R80.x Security Gateway Architecture (Content Inspection)" says that there is use of DNS with RAD

It would be nice to know if Check Point can support the scenario in my original question or not
I do not think that this is possible - URLF checks the URL in the internal database first and, if niot successfull, sends a request to online detection service. So, no DNS is contacted here before the URL categorization is finished. The OpenDNS solution rather is a competitor to CP URLF with very a small set of features.
Thanks for the information Gunthar,
No argue that CP can provide better functionality than OpenDNS. I was just wandering if Check Point can provide similar functionality giving the fact that the infrastructure already exist with Anti-bot to block malicious DNS requests
CP is using very similar functionality, but does not disguise itself as DNS server 😉 Did you read sk31727 and sk35484 already ?
This is good information. bottom line is that Check Point products do not implement DNS server functionality and therefore cannot perform URL filtering based on DNS requests.
DNS doesn't factor into URL filtering at all.
The main problem with using DNS as I see it is that a number of sites could use the same IP address.
You may allow access to some sites on the same IP, but block others.
Also I could access a given IP without doing a DNS lookup (e.g. Because of caching, poisoned or otherwise).
Let me put it like this: With OpenDNS, you use the DNS lookup for performing URLF. With CP URLF, no DNS request will be made at all if the URL is blocked.
Deamon and Gunther,
Thanks for the answers. I agree that using URLF is the best possible solution. I am trying to figure out what is the best solution if I can't route end users traffic through the gateway. I am thinking about Endpoint security with URLF blade will be a suitable replacement but it is not deployed at the moment. what do you think?
Either Endpoint URLF or Capsule Cloud would be reasonable in these cases.
Both would work regardless of where the end users are.
I agree with Shahar Grober
it will be better if Checkpoint can perform dns filtering instead of relying on 3rd party appliances such as infoblox or other dns firewall outside.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 42 | |
| 21 | |
| 10 | |
| 7 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 |
Thu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY