- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello everybody.
I received a request from a customer to configure a rule in the gateway policy to block downloads of files larger than 500 MB.
I enabled https inspection to the gateway can do full inspection on the HTTPS protocol and I enabled the content Awareness blade so I can create the rules.
Import the https inspection certificate to the client machine and see the inspection being done.
I created the rule in my policy with the source being an AD group, the destination INTERNET and in the "Content" column I put it to consider any direction. I also added the "Large Archive", "Large Archive" objects and a few others (the screenshot is attached).
I configured the "Large Archive" and "Large Archive" objects to identify files larger than 500 GB in the properties. I even put a smaller size (for example 1MB, 10MB) to test too.
When the client starts downloading the file (for example, a 1 GB ISO) I see that the traffic does not match the rule I created.
So I have two questions: Can I meet the customer's requirements at the gateway? If so, what else needs to be done?
The customer has a centrally managed enterprise gateway cluster in version R81.10 take 95.
Hello,
We discovered that checkpoint is compatible with some file extensions.
We were testing on a website that downloads files with the .dat extension. This extension is not compatible, so it did not match the rule.
Reference follows:
For our configuration to work, we use content awareness and https inspection.
Which rule is being matched when you download a large file?
Which rule is being matched when you download a large file?
Also, did you try to change the Access Role to just the local network? Is file downloaded through office to internet HTTPS session? Not enough info here to help you out.
Hello,
We discovered that checkpoint is compatible with some file extensions.
We were testing on a website that downloads files with the .dat extension. This extension is not compatible, so it did not match the rule.
Reference follows:
For our configuration to work, we use content awareness and https inspection.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 14 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY