Hi all,
Scenario:
- Smart-1 Cloud (R82)
- Cloudguard Network Security (R81.20) HA (Azure)
- Perimeter fw in Hub VNET.
- URLF and AppControl blades enabled
- And enabled in the policy
- Inline layers configured for web browsing (any traffic; common web ports)
- I have enabled categorise HTTPS traffic by SNI
I have been turning on URLF and AppControl and doing some testing on it. I created a very simple policy using inline layers
- sub-layer 1: Allow categories Very Low Risk, Low Risk, Medium Risk
- sub-layer 2: Block categories High Risk, Critical Risk, Unknown Risk
- sub-layer 3: Clean-up.
We found a High Risk (4) application in the logs but it is being allowed by the sub-layer 1 despite being a High Risk application.
The application definition says you need to apply HTTPS Inspection but the it is being properly categorised without HTTPS Inspection being applied yet is being caught by sub-layer 1.
Is this expected behaviour? Any other thoughts on how to resolve this?
I want to keep HTTPS Inspection to a minimum.