- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
We have two web site: https://habr.com and https://habrastorage.org .
habr.com use images from https://habrastorage.org/ .
https://habrastorage.org/ include in URLs Categories : File Storage and Sharing .
We need to block URLs Categories : File Storage and Sharing, but images on habr.com need to be work.
We create two rules
1.
2.
but it isn't work...
for example image: https://habrastorage.org/getpro/habr/post_images/b09/090/87b/b0909087b281cd74df8fc2de8735758b.png
not match on firts rule. it match on the second rule.
Please verify that habr.com has "File Storage and Sharing" category associated with it.
You can create a custom app with its domain name and assign all necessary categories.
Alternatively, you can assign whatever category you want to the custom app for this domain, but use it in the top rule "Services and Application" column.
Can you create and test a new rule by downloading .png files from elsewhere?
I'd like to see if it is a problem related to the content recognition.
Another good test would be to change the extension (for instance .docx to .png and try to download that file.
As a test in your first rule in the Content field, set for "Any Direction, Any File" (not just "Any"). Do the PNG images now match the first rule? Just trying to see if Content Awareness is detecting things correctly at all in your situation...
not match.
Also match on second rule.
in habr i see:
habrastarage.org is block:
Why did you change the destination from "Any" to "Internet" in your second rule? Is your firewall topology configured completely and correctly so that object "Internet" is calculated properly?
Do you have HTTPS Inspection enabled? My guess is no. The second rule works because the application can be detected based on the site name without full HTTPS Inspection. The first rule doesn't work because Content Awareness cannot see the prohibited content you are trying to match inside the encrypted HTTPS connection unless HTTP Inspection is enabled.
@Timothy_Hall , you got to be right about HTTPS. After re-reading the original post, I see that the category does match on a second rule and not just dropping on cleanup. That's pretty convincing.
Any chance you are downloading the files using QUIC?
QUIC is bloked.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
10 | |
6 | |
6 | |
6 | |
6 | |
6 | |
4 | |
3 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY