- Products
- Learn
- Local User Groups
- Partners
- More
Check Point Jump-Start Online Training
Now Available on CheckMates for Beginners!
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
The SMB Cyber Master
Boost your knowledge on Quantum Spark SMB gateways!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hi Mates,
I have enabled URL/Application blade and allowed some URL but the same traffic are blocked in the firewall blade. Please guide, is there any rule is required at the firewall blade for allowing IP? I am sharing the URL filtering rule and logs. Please suggest.
Regards,
RB
Are you using layers in your policy & what Services & Applications are allowed?
Hi Chris,
There is no layer in the policy.
We are allowing outlook.com, outlook365.com, microsoft.com etc
Is access rule is required for allowing those IPs which are blocked at firewall blade ?
The APPI/URL Filtering will occur after the Network/Access Filtering unless you run both on the same policy.
If you have seperate policies, as we used in R77.x and below, this is expected.
You will need to allow it first through Access, then filter through APPI/URL Filtering as required. - This is the legacy approach, typically we not will use Policies that contain Access, and APPI/URL Filtering in one policy.
Hi Stephen,
We are using R81 and try to allow outlook.com, microsoft.com etc. For this access we have create two rule, one is in application/url filtering(Source is server IP and destination is URL(screenshot attached) and another one is in firewall blade (Source is server IP and destination is domain (screenshot attached) . Kindly guide, if any changes required, and please share SK, if available.
Is there any SSL inspection is required for https traffics ?
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY