Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Nima_Chogyal
Contributor

FQDN Objects

Hi,

So one of the banks gives access to only internal services from checkpoint and restricts internet surfing on some LANs.Previously they had a mail server that was in their local LAN and recently they migrated to google workspace. They bought the whole package where they will be using all the services that are given by google like gmail,google sheet etc. They want the LAN users to access only google workspace and restrict other traffic. I created quite alot of fqdn objects on the management server(R80.10) and installed the policy. 

It was working for a few minutes and as soon as the ip address to say google.com changes, the users cant access google workspace anymore. Its a ON and OFF thing. Not sure what the issue is, did everything as per the SK for FQDN. restarted the wsdns service aswell. The ip addresses of google seems to be changing and when it does ,google workspace is inaccessible aswell.

 

The only thing i didnt do is cpstop and cpstart/reboot the appliance.

The management server and the gateway cluster is running on R80.10.

 

Does anyone know what the issue is?

 

regards,

Nima

0 Kudos
9 Replies
PhoneBoy
Admin
Admin

R80.10 is End of Support and you should upgrade to a supported release (R81.20 being the most recent and recommended).
Allowing access to Google Workspace reliably should be done using App Control and with HTTPS Inspection.

0 Kudos
Nima_Chogyal
Contributor

But is there a solution to the FQDN and the ever changing IP addresses for a single FQDNin R80.10?

As per the document it says it supports from r80.10.Customer has a internal DNS server. Is there anything that i have to do between the gateway and the DNS server?

0 Kudos
Chris_Atkinson
Employee Employee
Employee

As indicated current versions may deal with this requirement better or a change in approach may be necessary.

See also: sk133313 / sk181215

CCSM R77/R80/ELITE
0 Kudos
the_rock
Legend
Legend

The best solution I can suggest to what you indicated is using domain objects. Say, for argument's sake, the exact domain is https://app.bankxyz.com,  you can use below. What guys said is absolutely true, R80.10 is totally unsupported, BUT, to be blunt about it, if your customer cannot use app control or https inspection, even if they upgrade to R81.20, wont make the sligtest difference. Not to say they should not upgrade, R81.20 is super solid, but for now, I would stick with domain objects.

Andy

 

Screenshot_1.png

 

 

0 Kudos
PhoneBoy
Admin
Admin

You can use non-FQDN objects as noted...if you know the exact FQDNs you will need to allow access to.
That is not practical to maintain and can be handled with an App Control signature.
For that to work right without HTTPS Inspection, you need to upgrade to a supported release that includes support for SNI: https://support.checkpoint.com/results/sk/sk163594

0 Kudos
Wolfgang
Authority
Authority

@Nima_Chogyal blocking access to those type of cloud application with FQDN is not practical. That will be a never ending story hunting new IPs as a result of the fast changing of these IPs. Like @PhoneBoy wrote, use app control or myabe updatable objects to create your rules. All of the applications of googles workspace are available via app control and you can create rules based on them. We are using this to allow only some of the apps not all. This is working fine in our environment with enabled HTTPS inspection or SNI support and R81.20.

Here are a sample of googles applications and updatable objects available via SmartConsole to use in the rule base:

2023-11-21 07_02_20.png2023-11-21 07_11_41.png

0 Kudos
(1)
Nima_Chogyal
Contributor

The customer has fortigate on their network and it works with fqdn for fortigate gateways without a hitch.

So with https inspection enabled do i need to install the certificates on each of the machine for it to work or can i just put it in detect mode?

 

 

0 Kudos
Chris_Atkinson
Employee Employee
Employee

Again there are enhancements in newer versions than you are running, so you're very likely comparing apple & oranges here.

Example:

sk161612: Domain Object Enhancement - DNS Passive Learning

CCSM R77/R80/ELITE
0 Kudos
PhoneBoy
Admin
Admin

HTTPS Inspection requires deploying CA certificates to clients.
This is only "necessary" as you are choosing to remain on R80.10 instead of upgrading to a supported release that has additional functionality that can be leveraged to meet this requirement instead of HTTPS Inspection.
Or, at the very least, you can get support if it's not working as expected.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events