CPUG: The Check Point User Group

Resources for the Check Point Community, by the Check Point Community.


** Announcing the #CPUGchallenge **

I'm very happy to announce that CPUG will be hosting "The CPUG Challenge" during CPX this year.
It promises to be a fun and interesting event that will test (and maybe even expand) your knowledge of R80.10.
Whether or not you plan to attend CPX, we have something for you. Please check out this post or the CPUGchallenge.com web site for more information. -E

 

Results 1 to 4 of 4

Thread: Migration Ironport Web Proxy into App & URL Filtering

  1. #1
    Join Date
    2006-03-21
    Posts
    47
    Rep Power
    0

    Default Migration Ironport Web Proxy into App & URL Filtering

    Hi everyone,

    I am currently working on a migration from a Cisco Ironport Web proxy into Check Point URL Filtering.

    I just wanted to share the categories translation that I have used.

    Happy to hear feedback, as my experience with Ironport is quite basic.

    I have worked based on the following sources:

    Check Point Categories:
    https://www.checkpoint.com/urlcat/categories.htm

    Ironport
    http://www.cisco.com/c/en/us/td/docs...ter_01010.html

    I hope it helps for similar migrations in the future.


    Regards,


    Ed

    Ironport Categories Check Point Categories
    Adult Sex
    Advertisements Web Advertisements
    Alcohol Alcohol & Tobacco
    Arts Art / Culture
    Astrology None
    Auctions Shopping
    Business and Industry Business / Economy
    Chat and Instant Messaging Instant Chat
    Instant Messaging
    Cheating and Plagiarism Illegal / Questionable
    Child Abuse Content Child Abuse
    Computer Security Computers / Internet
    Computers and Internet Computers / Internet
    Dating Personals / Dating
    Digital Postcards Greeting Cards
    Dining and Drinking Restaurants / Dining / Food
    Do It Yourself (DIY) Projects Business / Economy
    Dynamic and Residential None
    Education Education
    Entertainment Entertainment
    Extreme Violence
    Fashion Fashion
    File Transfer Services File Storage and Sharing
    Filter Avoidance Anonymizer
    Finance Financial Services
    Freeware and Shareware File Storage and Sharing
    Gambling Gambling
    Games Games
    Government and Law Government / Military
    Hacking Hacking
    High Risk
    Spyware / Malicious Sites
    Critical Risk
    Botnets
    Phishing
    Hate Speech Hate / Racism
    Health and Nutrition Health
    Lifestyle
    Humor Entertainment
    Hunting Weapons
    Illegal Activities Illegal / Questionable
    Illegal Downloads Illegal / Questionable
    Illegal Drugs Illegal Drugs
    Infrastructure and Content Delivery Networks Computers / Internet
    Internet Telephony Computers / Internet
    Job Search Job Search / Careers
    Lingerie and Swimsuits Lingerie and Swimsuit / Suggestive
    Lotteries Gambling
    Military Government / Military
    Mobile Phones Computers / Internet
    Nature Nature / Conservation
    News News / Media
    Non-governmental Organizations Non-profits & NGOs
    Non-sexual Nudity Nudity
    Online Communities Newsgroups / Forums
    Online Storage and Backup File Storage and Sharing
    Online Trading Financial Services
    Organizational Email None
    Paranormal None
    Parked Domains Inactive Sites
    Peer File Transfer P2P File Sharing
    Personal Sites Blogs / Personal Pages
    Personal VPN None
    Photo Search and Images Media Sharing
    Politics Political / Legal
    Pornography Pornography
    Professional Networking Social Networking
    Real Estate Real Estate
    Reference Education
    Religion Religion
    SaaS and B2B Business / Economy
    Safe for Kids None
    Science and Technology Computers / Internet
    Education
    Search Engines and Portals Search Engines / Portals
    Sex Education Sex Education
    Shopping Shopping
    Social Networking Social Networking
    Social Science Education
    Society and Culture Art / Culture
    Software Updates Software Downloads
    Sports and Recreation Sports
    Recreation
    Streaming Audio Media Streams
    Streaming Video Media Streams
    Tobacco Alcohol & Tobacco
    Transportation Vehicles
    Travel Travel
    Weapons Weapons
    Web Hosting Computers / Internet
    Web Page Translation Translation
    Web-based Email Email
    Last edited by eduardoxmunoz; 1 Week Ago at 08:48.

  2. #2
    Join Date
    2006-03-08
    Location
    Lausanne
    Posts
    865
    Rep Power
    12

    Default Re: Migration Ironport Web Proxy into App & URL Filtering

    well done :-)
    -------------

    Valeri Loukine
    CCMA, CCSM, CCSI
    http://checkpoint-master-architect.blogspot.com/

  3. #3
    Join Date
    2013-09-25
    Location
    Bucharest
    Posts
    557
    Rep Power
    4

    Default Re: Migration Ironport Web Proxy into App & URL Filtering

    Hello,

    For how long did you use Ironport solution? Can you make a quick pros / cons vs Checkpoint?



    Quote Originally Posted by eduardoxmunoz View Post
    Hi everyone,

    I am currently working on a migration from a Cisco Ironport Web proxy into Check Point URL Filtering.

    I just wanted to share the categories translation that I have used.

    Happy to hear feedback, as my experience with Ironport is quite basic.

    I have worked based on the following sources:

    Check Point Categories:
    https://www.checkpoint.com/urlcat/categories.htm

    Ironport
    http://www.cisco.com/c/en/us/td/docs...ter_01010.html

    I hope it helps for similar migrations in the future.


    Regards,


    Ed

    Ironport Categories Check Point Categories
    Adult Sex
    Advertisements Web Advertisements
    Alcohol Alcohol & Tobacco
    Arts Art / Culture
    Astrology None
    Auctions Shopping
    Business and Industry Business / Economy
    Chat and Instant Messaging Instant Chat
    Instant Messaging
    Cheating and Plagiarism Illegal / Questionable
    Child Abuse Content Child Abuse
    Computer Security Computers / Internet
    Computers and Internet Computers / Internet
    Dating Personals / Dating
    Digital Postcards Greeting Cards
    Dining and Drinking Restaurants / Dining / Food
    Do It Yourself (DIY) Projects Business / Economy
    Dynamic and Residential None
    Education Education
    Entertainment Entertainment
    Extreme Violence
    Fashion Fashion
    File Transfer Services File Storage and Sharing
    Filter Avoidance Anonymizer
    Finance Financial Services
    Freeware and Shareware File Storage and Sharing
    Gambling Gambling
    Games Games
    Government and Law Government / Military
    Hacking Hacking
    High Risk
    Spyware / Malicious Sites
    Critical Risk
    Botnets
    Phishing
    Hate Speech Hate / Racism
    Health and Nutrition Health
    Lifestyle
    Humor Entertainment
    Hunting Weapons
    Illegal Activities Illegal / Questionable
    Illegal Downloads Illegal / Questionable
    Illegal Drugs Illegal Drugs
    Infrastructure and Content Delivery Networks Computers / Internet
    Internet Telephony Computers / Internet
    Job Search Job Search / Careers
    Lingerie and Swimsuits Lingerie and Swimsuit / Suggestive
    Lotteries Gambling
    Military Government / Military
    Mobile Phones Computers / Internet
    Nature Nature / Conservation
    News News / Media
    Non-governmental Organizations Non-profits & NGOs
    Non-sexual Nudity Nudity
    Online Communities Newsgroups / Forums
    Online Storage and Backup File Storage and Sharing
    Online Trading Financial Services
    Organizational Email None
    Paranormal None
    Parked Domains Inactive Sites
    Peer File Transfer P2P File Sharing
    Personal Sites Blogs / Personal Pages
    Personal VPN None
    Photo Search and Images Media Sharing
    Politics Political / Legal
    Pornography Pornography
    Professional Networking Social Networking
    Real Estate Real Estate
    Reference Education
    Religion Religion
    SaaS and B2B Business / Economy
    Safe for Kids None
    Science and Technology Computers / Internet
    Education
    Search Engines and Portals Search Engines / Portals
    Sex Education Sex Education
    Shopping Shopping
    Social Networking Social Networking
    Social Science Education
    Society and Culture Art / Culture
    Software Updates Software Downloads
    Sports and Recreation Sports
    Recreation
    Streaming Audio Media Streams
    Streaming Video Media Streams
    Tobacco Alcohol & Tobacco
    Transportation Vehicles
    Travel Travel
    Weapons Weapons
    Web Hosting Computers / Internet
    Web Page Translation Translation
    Web-based Email Email

  4. #4
    Join Date
    2006-03-21
    Posts
    47
    Rep Power
    0

    Default Re: Migration Ironport Web Proxy into App & URL Filtering

    Quote Originally Posted by laf_c View Post
    Hello,

    For how long did you use Ironport solution? Can you make a quick pros / cons vs Checkpoint?

    Hi Laf,

    Unfortunately my experience with Ironport is quite basic but from what I've seen so far it is seems to be a more mature Web proxy solution.

    As you might know, configuring Check Point as Web proxy is not always a good idea. Nevertheless, the integration of both blades Application and URL Filtering does not leave Check Point behind.

    Keep in mind that Application and URL Filtering is generally added on top of other security blades (firewall, vpn, etc.) so is not so fair to compare Check Point as a "Web filtering solution" with other vendors such as Ironport, BlueCoat, Forcepoint, etc. (my humble opinion)

    Regards

    Ed

Similar Threads

  1. URL filtering, HTTPS Inspection, HTTP/HTTPS Proxy
    By bhavinjbhatt in forum R75.40 (GAiA)
    Replies: 0
    Last Post: 2015-07-07, 13:33
  2. URL filtering vs. anonymous surfing (proxy)
    By Kriss in forum Content Security/Security Servers/CVP/UFP
    Replies: 4
    Last Post: 2008-11-13, 08:54
  3. Filtering URL's
    By imwings in forum Content Security/Security Servers/CVP/UFP
    Replies: 2
    Last Post: 2008-04-22, 20:16
  4. FW-1 Request to proxy other than next proxy
    By intehnet in forum Miscellaneous
    Replies: 0
    Last Post: 2005-12-13, 00:01
  5. Request to proxy other than next proxy resource http://proxy.foo.com
    By roadrunner in forum Content Security/Security Servers/CVP/UFP
    Replies: 0
    Last Post: 2005-08-14, 12:23

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •