- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All,
I'm new to Checkpoint Firewall, we already had Aruba network switch (locally Managed) & 2 - Aruba Instanton (AP22) Access Points (Cloud managed) setup in our office. We recently purchased Checkpoint 1550 Appliance and made a setup on top of Network switch and Access points.
Our network setup: ISP > Firewall > Switch > Access Points
After we connected the firewall - our access points went offline (continue to broadcast SSID and able to connect) and it's not connecting to Aruba cloud, so any config changes made in portal.arubainstanton.com are not sync and apply to the access points. Support have asked to whitelist the following urls in the firewall portal which I tried that but it's still not working. Expecting community help in this regard,
Hi @All,
Update:
I've successfully connected our Aruba InstantOn AP22 access points to the Aruba Cloud. The access points were identified as IoT devices in the Quantum Spark 1550 appliance console and had outgoing access restricted to the "IoT_Accepted_Domains" network group.
To resolve this, I added the necessary URLs to the IoT_Accepted_Domains group and reset the access points, which allowed them to connect to the Aruba Cloud successfully.
Thanks, everyone, for your help! 😊
Best,
Kirubakaran V
Question...do you actually see any logs on CP firewall indicating its blocking the traffic to those destinations?
Andy
Just came to my mind...can you try add custom category, say *arubainstanton* and see if that works?
Andy
Hi @the_rock
Under Access Policy - I cannot choose URL in destination, only domain, network object, network object group supported. Additionally domain - doesn't allow me to add like *arubainstanton*
Instead I tried add the required Url's but still no luck
From the firewall all I can see under security logs is: Accept to UDP/3490 (service) but I don't see any packets drop there
Sorry, I dont have locally managed smb to test, so cant say for sure, but thats what I always do in smart console for regular Gaia, as long as urlf blade is enabled inside the layer editor.
I would double check with TAC.
Andy
I assume it it local management.
Then check if you have this feature enabled:
HTTPS Categorization
This will make sure firewall will check certificate of the requested URL, so better rulebase match is then possible.
Of course best is to run full https inspection but that could be a bit difficult to start with. So start with ''Light SSL/HTTPS inspection''.
Also make sure FW is able to resolve the URL's. Test via SSH nslookup onboarding.portal.arubainstanton.com/
Hey @Lesley
Thanks for your comments,
Yes, we have https categorisation enabled. I tried ssh into the fw and nslookup required three URL's and able to resolve it. Also. the Access Points are added to a network group and I allowed them to connect to the arubainstanton.com domain in Access Policy still same issue.
You can go in Expert mode and use the domains_tool utility to check if your domain is resolved, the tool is present in Spark.
domains_tool -d onboarding.portal.arubainstanton.com
Your AP and firewall should use the same DNS for consistency. You might also need to add the full domains, do not assume the domain object will match all subdomains like in a regex URL object.
Check also that you have Hide NAT on, which I assume you have if Internet access works.
Is your policy in Strict Mode?
You might create an additional rule with Internet access from your AP for analysis and see what goes in there to fine-tune your firewall policy, unless it's against your security policies.
Also, fw ctl zdebug drop in Expert mode will show you what is dropped where if you don't see them in the logs.
HTTPS Categorisation will work with the Application/URL Filtering Blade activated, Domain objects are linked to the Firewall blade.
We don't use Domain objects in locally managed Spark so it's ideas.
Great tip! I always keep forgetting about domains_tool.
Andy
I believe Aruba instant on APs also try to ping the above URIs and use google dns (8.8.8.8 and 8.8.4.4), regardless of what you propagate via dhcp. Check for dropped packets originating from the AP IPs.
And if you are using HTTPS inspection, create a bypass rule for *.arubainstanton.com, as they won't trust your CA certificate.
Hi @All,
Update:
I've successfully connected our Aruba InstantOn AP22 access points to the Aruba Cloud. The access points were identified as IoT devices in the Quantum Spark 1550 appliance console and had outgoing access restricted to the "IoT_Accepted_Domains" network group.
To resolve this, I added the necessary URLs to the IoT_Accepted_Domains group and reset the access points, which allowed them to connect to the Aruba Cloud successfully.
Thanks, everyone, for your help! 😊
Best,
Kirubakaran V
Great jo!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
11 | |
6 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY