- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello, community.
I have URLF and APPC blades active in my FW CP.
The detail is that certain traffics are not blocked, when in fact they should be blocked, according to the explicit rule created in the FW.
For example, the domains thisisgore.com and bestgore.fun, are inside an "Application/Site" added in the URL List part, as independent entries, here I put the example.
*.bestgore.fun
bestgore.fun
thisisgore.com
*.thisisgore.com
The detail is that my rule says, that the segment x.x.132.0/24 when it tries to reach that destination, it must be "blocked", but really it is not blocked, because the segment can reach those resources.
Below I have an almost free rule, that allows that same segment to reach the Internet in general, but this should not happen.
I don't have HTTPS Inspection enabled in FW, and I have a rule at the top of my rule base, where I block QUIC for all my private segments.
Is there any way to debug for web traffic?
Is it necessary to enable HTTPS Inspection when working with URLF and APPC?
Thanks for your comments.
It's not strictly necessary, but it is becoming increasingly more difficult to see where HTTPS traffic is going without using HTTPS Inspection.
What version/JHF are we talking about here?
Using Extended logging on the relevant rules is a good starting point for debugging, which will help determine how the gateway "sees" the traffic.
I have the R82 version with JHF Take 19.
Is it normal that when in the log browser you put the domain “thisisgore.com” nothing appears in the logs, but if I search by the IP that resolves that domain, if I find traffic related to that IP?
This is because of a bad definition in the FW rule with the URL Filtering profile?
Thanks for your comments
Not every field in the logs is indexed (meaning, you cannot find it by search), so that may be expected.
Seeing the actual rules used to "allow" the traffic and the actual log entries generated (full log cards) will help.
What level of logging is set in the track field for the matching rule is it detailed or extended?
sk120536: Application Control or URL Filtering does not produce logs in Logs & Monitor view
Great point Chris, extended logging definitely helps.
Andy
Currently I have the logs related to URL in Detailed mode.
If I put it in ‘Extended’ mode, can it stay this way permanently? Or is there any risk of high resource consumption?
Thanks
The option to log something Detailed/Extended is just like any option in a rule: it'll stay configured that way until you change it.
Extended logging only makes sense if the traffic is subject to HTTPS Inspection, which is the only way to see the full URL.
Otherwise, thinking about it, not sure Extended logging makes any sense here.
However, there are some improvements to HTTPS Inspection logging (relevant here, even if you're not actually using it) in later JHFs that might be worth considering.
You dont have to enable ssl inspection, but without it, you might be limited as far as things you can do with url filtering.
Andy
Is Categorized HTTPS Sites option enabled in Smart Console?
This the bare minimum that should be enabled.
https://support.checkpoint.com/results/sk/sk182318
Hello
Is this option necessary to enable it?
I have made an additional block, where I focus on blocking the category to which the domain thisisgore.com belongs (Tasteless, Low Risk), but the traffic is still allowed and should not be so
I have one rule explicitly blocking the domain, and the other new rule blocking the category but the traffic does not match these rules and goes to my most allowable rule which is almost at the end of my rule base
We don't have control over all users so enabling HTTPS Inspection is not a viable option now.
Thanks for the feedback
Hey bro,
It might help, but again, without ssl inspection, you will not get all the benefits.
Andy
Yes, you either pick full HTTPS inspection OR Categorized HTTPS Sites option
Or you enable both
Start to enable Categorized HTTPS Sites option , no changes are needed on users for this. It checks the certificate without full decryption
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
19 | |
12 | |
6 | |
6 | |
6 | |
5 | |
4 | |
4 | |
4 | |
4 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY