- CheckMates
- :
- Products
- :
- Quantum
- :
- Threat Prevention
- :
- anonymizer category in application control
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
anonymizer category in application control
Does anyone use the anonymizer category to prevent incoming traffic from using anonymizers to their web sites?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The Anonymizer category is specifically for outbound connections.
I don't believe it will work for blocking traffic FROM anonymizers.
We do offer a list of TOR IPs you can block, though: https://support.checkpoint.com/results/sk/sk103154
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I used it before for some proxy blocking in the lab. Below are best references I could find.
https://usercenter.checkpoint.com/ucapps/urlcat/categories
An intermediary which prevents Web sites from seeing a user's Internet Protocol (IP) address. Anonymizers are often used to circumvent company network acceptable use policies to potentially hide non-appropriate behavior, however in the home setting they may be used to provide additional layers of anonymity and protect privacy. Examples: http://www.anonymizer.com, http://www.megaproxy.com, http://www.hidemyass.com
https://appwiki.checkpoint.com/appwikisdb/public.htm
Just filter for category as anonymizer and same for the tags.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The Anonymizer category is specifically for outbound connections.
I don't believe it will work for blocking traffic FROM anonymizers.
We do offer a list of TOR IPs you can block, though: https://support.checkpoint.com/results/sk/sk103154
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
For TOR - I'm wondering even if you have AV/AB and can use custom intelligence feeds which the SK mentions to use as the method as best practice, is there any drawbacks for using as network feed instead? I would think if you do that way would be processed by FW blade and sooner in the packet flow so wonder if it is still best practice on 81.20?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
No specific drawbacks to using Network Feeds that I'm aware of.
