- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hello,
We have two web site: https://habr.com and https://habrastorage.org .
habr.com use images from https://habrastorage.org/ .
https://habrastorage.org/ include in URLs Categories : File Storage and Sharing .
We need to block URLs Categories : File Storage and Sharing, but images on habr.com need to be work.
We create two rules
1.
2.
but it isn't work...
for example image: https://habrastorage.org/getpro/habr/post_images/b09/090/87b/b0909087b281cd74df8fc2de8735758b.png
not match on firts rule. it match on the second rule.
Please verify that habr.com has "File Storage and Sharing" category associated with it.
You can create a custom app with its domain name and assign all necessary categories.
Alternatively, you can assign whatever category you want to the custom app for this domain, but use it in the top rule "Services and Application" column.
Can you create and test a new rule by downloading .png files from elsewhere?
I'd like to see if it is a problem related to the content recognition.
Another good test would be to change the extension (for instance .docx to .png and try to download that file.
As a test in your first rule in the Content field, set for "Any Direction, Any File" (not just "Any"). Do the PNG images now match the first rule? Just trying to see if Content Awareness is detecting things correctly at all in your situation...
not match.
Also match on second rule.
in habr i see:
habrastarage.org is block:
Why did you change the destination from "Any" to "Internet" in your second rule? Is your firewall topology configured completely and correctly so that object "Internet" is calculated properly?
Do you have HTTPS Inspection enabled? My guess is no. The second rule works because the application can be detected based on the site name without full HTTPS Inspection. The first rule doesn't work because Content Awareness cannot see the prohibited content you are trying to match inside the encrypted HTTPS connection unless HTTP Inspection is enabled.
@Timothy_Hall , you got to be right about HTTPS. After re-reading the original post, I see that the category does match on a second rule and not just dropping on cleanup. That's pretty convincing.
Any chance you are downloading the files using QUIC?
QUIC is bloked.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 23 | |
| 12 | |
| 12 | |
| 7 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 |
Wed 05 Nov 2025 @ 08:00 AM (IST)
Your First Response: Immediate Actions for Cyber Incident Containment - AMERWed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesWed 05 Nov 2025 @ 08:00 AM (IST)
Your First Response: Immediate Actions for Cyber Incident Containment - AMERWed 05 Nov 2025 @ 11:00 AM (EST)
TechTalk: Access Control and Threat Prevention Best PracticesThu 06 Nov 2025 @ 10:00 AM (CET)
CheckMates Live BeLux: Get to Know Veriti – What It Is, What It Does, and Why It MattersTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY