Hi,
We have identified some servers that currently have full HTTP and HTTPS access to the Internet through our external Check Point security gateways.
In order to restrict the access we need to know what the servers are connecting to on the Internet. The current rule uses the firewall blade (allowing HTTP and HTTPS) and logging gives us the destination IP addresses.
We also want to know the FQDNs accessed. I therefore created an inline layer for a test source IP address (with parent rule allowing HTTP and HTTPS) with Internet as destination and enabled Detailed Log for the rule.
I thought this would help us view the FQDNs, but for most destinations I still only see IP addresses. I also tried enabled Extended Log, but with similar results.
I noticed that for some log entries that are marked as "Content Awareness", I can see the fields "TLS Server Host Name" and "Sni", which seems to give what I am looking for.
Strange thing is that Content Awareness is not even enabled on this gateway. Would someone be able to explain this and recommend how to best detect the FQDNs that are accessed?
We are running R80.20 on the security gateways and R80.40 on the management servers.
Thanks for your help!
Best regards,
Harry