- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
We need to create a rule in our FW, that allows access for Outlook mail consumption to a user with IP 10.x.x.x.x/32
We do not have APPC or URLF
We only have the instance with the blade FW running (We have a VSX environment)
The detail is that we have created a rule using as destination an 'Updatable Object', as Office 365, but the FW ignores the rule and the user can not access (does not load the main page), the only way is to change the destination by ANY, and then if it works.
Questions.
1. Updatable Object, does it work with a particular blade?
2. If you only have your VS working as FW, in what ways could we control the traffic to a particular destination, would it be using FQDN?
3. What are the domains that Outlook normally consumes so that someone can use webmail?
Thanks for your comments
I just ran below command on the lab fw:
[Expert@CP-GW:0]# dynamic_objects -uo "Office365 Services"
Output is way too long to copy it here, but outlook.com is 100% there. If it does not work, maybe try add domain object as .*outlook.com and uncheck fqdn option and see if that works.
Andy
With the command shown by Andy you'll see if the updatable object will be fine. Using "Office 365 services" or "Exchange services" is the correct way. That's what updatable objects are for. Maybe something goes wrong...
Follow sk178775 - Security Gateway does not enforce a rule with Updatable Object in the Access Control Poli... to check your gateway
@Matlu what‘s OUTLOOK as destination? You mean https://outlook.com or dou you mean outlook as client for an onpremise exchange or O365 exchange?
If you use an updatable object you need a working DNS on your gateway and your client and they have to be using the same DNS servers (meaning the DNS resolution has to be the same results on the client and on the gateway)
Hello
Indeed, our need is that the user can access via web, to https://outlook.com, but the problem is that when I make the security rule putting as destination the Updatable Object of 'Office 365', this does not work, because the user can not access the web.
The only way is putting as destination in 'Any'.
For it to consume https://outlook.com, do you need to place other 'Updatable Objects'?
Or the correct way for this permission is another one?
We only have the FW blade available
Thanks for your comments
I can check in the lab tomorrow...what is EXACT name of the updatable object?
Andy
It's Office 365
If it is not feasible to use Updatable Object for this purpose, what would be the most favorable option when you only have the FW blade available?
Let me do some lab tests soon and will update you buddy.
Andy
Hey, Bro
When working with “DOMAINS”, do you know if it is necessary to enable also the HTTPS Inspection in the GW?
The rule you created is not working, and it seems that since you created it it doesn't work.
Unfortunately I had a problem with the logs of our box and I had no way to confirm if the rule was working or not.
You dont need to, only having fw blade enabled on the layer is good enough.
Andy
Hey buddy,
If using domain objects is not working, where is it blocked? MAKE SURE it starts with . thats a must.
Andy
I just ran below command on the lab fw:
[Expert@CP-GW:0]# dynamic_objects -uo "Office365 Services"
Output is way too long to copy it here, but outlook.com is 100% there. If it does not work, maybe try add domain object as .*outlook.com and uncheck fqdn option and see if that works.
Andy
Bro,
I'll try it today and update you
One query, the command you shared to test, I guess it should be run on the VS instance where I'm working this permission, right?
Cheers
Thats right. Btw, command works for ANY updatable object used in policy, just make sure to put EXACT name as it shows in smart console.
Andy
With the command shown by Andy you'll see if the updatable object will be fine. Using "Office 365 services" or "Exchange services" is the correct way. That's what updatable objects are for. Maybe something goes wrong...
Follow sk178775 - Security Gateway does not enforce a rule with Updatable Object in the Access Control Poli... to check your gateway
Hey, Andy
Your recommendation seems to have taken effect in my environment.
I have a question, does Check Point have a kind of “Debug Flow”, as it exists in other vendor like Fortinet, which helps you to know by CLI, in which rule a particular traffic is doing MATCH?
It happens to be working with your recommendation what I needed, but we have a problem with our LOG SERVERS, and we can't see the real traffic at this moment.
I want to rely on a “Packet Capture” class to help me know if the traffic is MATCHing or not with the rule we have created.
Cheers. 🙂
K, great!
If you are looking for something similar to what I attached on Fortigate (by the way, for what its worth, fortimanager is way better for that), closest I can think of is below.
Andy
Interesting tool, but I have a question, in the “destination” field, how would you filter if your original destination is a domain?
Do you have to first do a NSLOOKUP on your PC, and resolve your domain as https://outlook.com, and take any IP that NSLOOKUP gives you, to put it in the command syntax?
Or is there another way?
Excellent question!
Sadly, you can NOT do domains, ONLY ip addresses. So you can do nslookup as you said and then test it that way. I dont sadly know of any other way.
Andy
Hey bud,
You only need technically fw blade enabled to use updatable object. I always only use it like that on ordered layer with fw blade enabled and works just fine.
Andy
I suspect you have to enable HTTPS Inspection to do this, regardless of other configuration requirements.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
5 | |
5 | |
4 | |
3 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY