- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
I need to allow access to a URL to a particular IP.
I have separate Firewall+APPC&URLF layers.
I have rules allowing access on both layers.
I have also "Bypassed" at HTTPs Inspection level the page to consume, but the problem of the IP to access the domain, still remains.
At the log level, I don't see a log like Drop or Reject, rather, it seems to be all right, as it shows that the flow is "allowed".
The URL to which the user wants to access is https://apps2.mef.gob.pe/siafmib/
Is there a way to make a good filter at LOGS level that allows me to confirm, if the GW is really blocking or not the connection to the IP?
Source: 10.192.116.59
Destination: https://apps2.mef.gob.pe/siafmib/
Thanks for any comments.
If you alow it on both ordered layers, then policy should not be blocking it. Do you use https inspection on the gateway(cluster)?
Also, if logging works, then you can either filter by ip or simply fqdn itself or you can try resource:fqdn, ie resource:www.news.com
Kind regards,
Andy
Hi, Andy,
Yes, the GW has HTTPS Inspection enabled.
The problem is, the user can access the URL https://apps2.mef.gob.pe/siafmib/ .... but when he is already in the portal, here he must enter some credentials to access the final resource, but when he enters the credentials and presses "ENTER", the page stays "thinking", and fails to load.
A query, if the ORIGIN that wants to consume this URL, does not have the HTTPS Inspection certificate installed, can you have these access problems?
Greetings.
Can you send a screenshot of how you made https inspection bypass?
Kind regards,
Andy
In the logs of the IP that we need the URL to consume, we find a "log" related to the HTTPS Inspection part.
Forget to completely check if the IP that needs to access the URL, had or had not installed the certificate on your PC, we validated and did not have the certificate installed, we installed it and now if you can access that portal.
Do I misunderstand or is the issue now resolved?
Address spoofing typically implies something different...
Hello
Does address spoofing usually indicate that something is wrong with the firewall?
Is it something to take into account?
Or normally why does this kind of logs appear?
Cheers.
Firstly it is a "Detect" not a "Prevent" (drop) log
Commonly this (address spoofing) would infer traffic is seen on an interface from which the origin doesn't belong and may be indicative of a routing problem or other issue.
Please clarify if the original issue still persists?
The problem that I exposed has been corrected.
It turns out that the client is using HTTPS Inspection in the GW.
For some reason the client was able to access only to the portal of the subdomain that I exposed at the beginning "https://apps2.mef.gob.pe/siafmib/" ... but when he entered his login credentials, the web remained "thinking".
This was solved, once the client on the affected PC, installed the HTTPS Inspection certificate.
Can not having the certificate installed on the clients (PCs) cause problems like this?
I clarify that the problem was only at the time of "logging" the credentials on the web, the certificate, fixed this.
A look at your rules would be very helpful. If you don‘t use HTTPS inspection on your gateway you can‘t filter the URL. The first request for your shown URL will be encrypted and can‘t be seen by the gateway. You can create an accessrule with „.apps2.mef.gob.pe“ as FQDN destination but not the whole URL.
URL above is not working even without a FW, so it's hard to tell.
I believe its internal site based on the link itself...
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 18 | |
| 15 | |
| 13 | |
| 12 | |
| 10 | |
| 6 | |
| 5 | |
| 5 | |
| 4 |
Thu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY