Comments
-
Thank you for your feedback. Then we hope for the February patchday ;)
-
Exactly, I may remember that this was already the case on the December 2022 patchday, unfortunately. But maybe Zyxel can tell us more about it.
-
Thanks for the feedback and clarification of the issue. Then I am reassured and hope that the "spit" comes to an end.
-
I will do this as soon as I get a message from the support to solve the problem. Unfortunately, I have not read anything from support for three days. Seems to be a complex problem.
-
Yes, I think Zyxel has a problem there. I am in contact with the support, but so far no solution. Maybe there is still something coming.
-
Hi This seems to be something similar to what I have, see here: https://community.zyxel.com/en/discussion/15487/usg-flex-200-url-blocking-log What Zyxel model do you have?
-
It seems that the problem with the URL ocsp.pki.goog(pki-goog.l.google.com) is not fixed after all. Just now another log message -> alert -> url-threat-filter -> ACCESS BLOCK -> ocsp.pki.goog: -> Malicious Sites.
-
Thank you for your feedback. The URL ocsp.pki.goog(pki-goog.l.google.com) no longer appears in the blocklist as far as I can see. But now a lot of these are in the log file: e1.o.lencr.org -> Phishing -> 77.109.138.73 -> ACCESS BLOCK x1.c.lencr.org -> Phishing ->104.79.24.135 -> ACCESS BLOCK
-
Thank you for your explanation, so that means I can ignore this message. Should this URL be whitelisted by the firewall or not change it?