- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Post management R80.10 upgrade things were fine after the 1st few policy pushes. It wasn't until we installed database, and pushed policy we started seeing: "dropped by fwpslglue_chain Reason: PSL Reject: internal - reject enabled;" in fw ctl zdebug drop on our R77.30 clusters. This is mainly HTTPS traffic that is being permitted by the FW blade, but dropped anyhow.
I found sk33328 which clears out $FWDIR/state directory to resolve policy corruption issues and is the same SK CP support has advised. This is a nuclear option, however as both MGMT and gateways need to be cpstop'd.
Have any of you run into this issue before and did you have a solution other than what was described in this SK?
After working with multiple CP support resources and finally with a Tier 3 tech, we determined that it was APP/URL filtering silently dropping the traffic. Glad to have found the issue and not having had to take down clusters.
After working with multiple CP support resources and finally with a Tier 3 tech, we determined that it was APP/URL filtering silently dropping the traffic. Glad to have found the issue and not having had to take down clusters.
Hi Matt,
Following your update i've changed the title to reflect the issue as needed.
Also appreciate if you mark the thread as answered 🙂
Did TAC happen to explain why it was dropping?
I *believe* it was because HTTPS wasn't explicitly allowed in the APP/URL policy. Behavior change from R77.30 MGMT to R80.10 MGMT possibly.
Hi Matt,
I am having a similar issue with HTTPS traffic in R80.10. Does any hotfix was provided to you? CP mention any plans to add the solution for future HFA's?
Regards.
If i can read the explanation correctly, issue has been resolved when HTTPS was explicitly allowed in the APP/URL policy.
I read that as "believe", not as final solution...For me, that's a workaround. In fact, I had to do the same for a customer a month ago after upgrade to R80.10.
It seems as an architecture error, so in enviroments where exists a Drop Any rule at the bottom of application layer; you must allow HTTPS before final rule for application traffic that should be already allowed explicitely right? This is a huge gap open to certain traffic not recognized as application.
Regards.
Yes, after HTTPS was fixed, we found other HTTPS traffic on non-standard port 443 was having the issue as well. Very troubling indeed.
Afaik from CP TAC, APP/URL filtering rules should have no "Drop Any" rule as the last rule at all. Also, CP does recommend to remove/disable as many Accept rules in URLF/Application rules as possible. URLF/Application control accept rules serve no enforcement purposes, since any traffic which is not explicitly blocked will just be allowed. Such rules, however, do cause traffic to be matched on them - which causes high CPU usage.
So URLF/Application rules should just restrict unwanted traffic and let the rest pass. But of course i know that there may be special requirements that can not be fullfilled using that concept...
Thanks for the followup Matt, when researching my book I spent a lot of time trying to find a way to disable APCL/URL filtering (and even Limit actions) "on the fly" to help isolate conditions such as this, and my eventual conclusion was that it is not possible. APCL/URLF must be a bit too tightly intertwined with the Firewall blade; the Application Control and URL Filtering boxes must be unchecked on the gateway object and policy reinstalled to achieve this effect.
On the fly disablement is possible for IPS/Threat Prevention as covered in my CPX presentation.
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
15 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY