- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: Advice on Application Control Policy
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Advice on Application Control Policy
Hello everyone,
I am currently running into an issue with an Application Control Policy from a customer and am brainstorming on how to solve our issue. I would appreciate any tips on how you would solve this or setup the policy.
We currently have setup the policy the following way:
- Rule: Allow specific Categories and whitelisted URLs that otherwise would be blocked.
- P_X_Allow contains categories such as "Computers / Internet", Education, Financial Services etc. and URLs which we whitelist explicitly. Basically anything that isn't harmful per se.
- Rule: Block any categories that we don't want users to access.
- all_categories contains all categories that are not in the P_X_Allow category such as Botnets, Email, Critical Risk, etc.
Rulebase:
Now as an Example, the customer doesn't want their customers to access Gmail, and we expected it to be blocked by the Email category in the 2nd Rule. But it is being accepted in the first rule since Gmail also matches the Application "Computers / Internet".
According to the Check Point URL Categorization Tool, Gmail matches the following applications:
Current Categories: Low Risk, Email, Computers / Internet
So what would be the best practice to setup our Application Control Policies or how do you usually do it with your customers?
The fastest solution would probably be to just add another Block Rule before the first rule and add Gmail to it. While this may be a quick solution, there might be a ton of other applications that are currently allowed through categories you don't expect them to be in. So we'd have to go through all the Logs and check all the applications on how they are categorized.
If we simply move our current 2nd Rule above the Allow rule, we might also block applications that were previously allowed.
How would you tackle this?
Any advice is appreciated, thank you!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have a lab where I run multiple ordered layers, for example first one is just fw blade, 2nd one appc+urlf, 3rd one content awareness and then last one again just fw.
So, 2nd layer, what I ALWAYS do is have any any allow at the bottom, because as Im sure you already know, traffic has to be allowed on EVERY ordered layer.
Now, tricky part is this...IF its not really good option to do it that way and you need to do whitelist, instead of blacklist, then you have to make sure that whatever traffic needs to be allowed, there is rule for it, otherwise, it would never work.
So, if you client does not want people to access gmail, just create custom site with something like *gmail* in it and that should do it and then you can have any any allow at the bottom.
I attached quick doc I made about how I did it in my lab. Hope it helps, but if not, happy to do remote if you allow it.
Andy
https://support.checkpoint.com/results/sk/sk112249
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Also, attached below if you use ssl inspection.
Best,
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What version/JHF is used here?
Is HTTPS Inspection used?
The usage of HTTPS Inspection will generally improve rulebase matching.
In general, more specific rules (i.e. for specific applications/sites) should occur before more general rules (i.e. using App Control or URL Filtering categories).
If you want to block access to Gmail specifically, which has it's Application Signature as shown in AppWiki, that should probably be done before any allow rules.
