- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Access from internet for URL path
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Access from internet for URL path
Hello colleague!
Please help me understand how to implement the following settings.
Our system
SMS Gaia R81.20
ClusterXL Gaia R81.10
Our Web resource has been published on the Internet and is available at (as an example)
https://web-site.com/
We want to leave access only for this path (from Internet)
https://web-site.com/folder/data/
and deny access along the path:
https://web-site.com/folder/catalog/
Is this possible to do using rules on the gateway?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, using a custom application/site and HTTPS Inspection (required to see the URLs accessed).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, using a custom application/site and HTTPS Inspection (required to see the URLs accessed).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Am I correct in understanding that the rule structure itself should look like this (as an example)?
P.S.
SSL inspections activated.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That should work or what I always do is say you want to block anything facebook, I just put it as *facebook* in URL list.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Unfortunately rule 1.1 does not work.
The traffic eventually goes through rule 1.2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Please show a full log card (mask sensitive data) where that happens (i.e. traffic matches 1.2).
Please also show the certificate used for the website in question when the traffic is accepted.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That only answers the first question.
For the second question, we'll need to know what the actual site you're trying to configure blocking on versus what the certificate for that site says.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You're probably in TAC territory now: https://help.checkpoint.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just do wildcard, it will work.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I tried different options, but unfortunately it didn't solve the problem.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you are allowed to send me website in private message, so I can test it in the lab?
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I don't see how you can test this given that the site is located in our perimeter.
Or did I misunderstand the question?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You got the answer from phoneboy, for this, you 100% need https inspection.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
URL is encrypted so what the other guys said I agree with. In this case it will be a 'reverse HTTPS inspection'.
So you need to intercept the traffic towards the public server
If you like this post please give a thumbs up(kudo)! 🙂
