- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello everybody.
Users report that websites that they usually use during the day, from time to time a block appears because the WEB BROWSING category is not allowed, but after a few seconds it allows them to navigate to the requested site.
Same case for non-allowed sites, it seems like a blocking by WEB BROWSINNG not allowed, and then the block appears for the most specific category in which the site is belong it.
I think that is a problem with cache URLF, I read SK90422 How to modify URL Filtering cache size?, in such document refer that cache size its 20,000, but if I running at my FW...
watch -n 20 fw tab -t urlf_cache_tbl -s
I find cache size its 2,000, reseting every 70minutes approximatly. So I wish to increase cache size...but how I can do it?
If you think issue is raised by other factor, I'm open to listen recommendations.
Thanks.
The SK90422 is not valid for GAiA Embedded, and when you read: The URL Filtering cache limit default value is 20 000, which is usually enough for a Security Gateway holding 1000 users, you will know that this is could not be valid for 1490 SMB GWs 😉
So i would suggest to contact TAC !
How many users do you have behind the gateway ? I am not sure increasing table size will solve the problem. 20K is quite a lot already and there must be another reasons for the table to be overflowed.
A little known fact is that URL categorization happens in CheckPoint Cloud. If that is a slow process (for whatever reason) you may start experiencing what you do - URLs are initially blocked because they cannot be categorized on time. When centrally managed there is a way to configure URL inspection to happen in background allowing connections while categorization completes. Don't know if that is possible when appliance is locally managed.
When cache is full it shall auto-clear itself. I really don't think problem is in the cache table itself and increasing its size will only postpone the problem by some time.
In fact, locally managed SMB appliances have a couple of Advanced Settings to configure URLF (setting /type/default/details):
|
Application Control and URL Filtering - Block when service is unavailable
|
bool
|
false
|
Block web requests traffic when the Check Point categorization and widget definitions online web service is unavailable
|
|
Application Control and URL Filtering - Categorize cached and translated pages
|
bool
|
true
|
Perform URL categorization of cached pages and translated pages created by search engines
|
|
Application Control and URL Filtering - Custom App over HTTPS
|
bool
|
false
|
Indicates whether custom URLs and applications will be matched over HTTPS traffic using SNI field. Important note: as SNI field in HTTPS traffic is browser-dependent and promiscuous, it does not guarantee 100% match.
|
|
Application Control and URL Filtering - Encrypt RAD Communication
|
bool
|
false
|
Indicates if the communication with the RAD cloud is encrypted
|
|
Application Control and URL Filtering - Enforce safe search
|
bool
|
false
|
Force filtering explicit content in search engines results
|
|
Application Control and URL Filtering - Fail Mode
|
options
|
Block all requests
|
Indicates the action to take on traffic in case of an internal system error or overload
|
|
Application Control and URL Filtering - Inspect VPN traffic
|
bool
|
false
|
Indicates whether Outgoing Policy Inspects VPN traffic when Application Control is enabled
|
|
Application Control and URL Filtering - Track browse time
|
bool
|
true
|
Indicates if the total time that users are connected to different sites and applications in an HTTP session will be shown in relevant logs
|
|
Application Control and URL Filtering - Use HTTP referer header
|
bool
|
true
|
Indicates if the HTTP referer header is used by the inspection engine to improve application identification
|
|
Application Control and URL Filtering - Web site categorization mode
|
options
|
Background
|
Indicates the categorization mode: Background - requests are allowed until categorization is complete, Hold - requests are blocked until categorization is complete
|
I know some of this settings. By the way, Application Control and URL Filtering - Custom App over HTTPS was useless to deal with SNI certificates cloudflare(subject=sni.cloudflaressl.com), however, in thie same window setting comment that such setting can o not can work.
How do you deal with sni certificates? I did this question here in checkmates time ago, recommendations I received was to upgrade to R80.X (new appliance) or bypass https insppection by destination ip address.
I've url inspection in backgroud. Furthermore, recently I did monitor urlf_cache by order
[Expert@gwradsys]# fw tab -t urlf_cache_tbl -s
HOST NAME ID #VALS #PEAK #SLINKS
localhost urlf_cache_tbl 197 1553 0 0
When VALS reach 2000, cache is empty. But VALS decrease too in some circunstances because TTL of website registered on such table. So, I wish to enlarge such table to a value less probable to reach limit of VALS, or at less frequently.
I did contact TAC. Later will share results.
Thanks
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY