This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Web content filtering breaks Hulu and Netflix.

There are numerous posts with an identical issue.  None have an actual solution, at least not one that Sophos has recommended.  Seems like there should be a checkbox or an easy policy to allow this sort of traffic.  The rules I've seen posted in here seem to be reporting mixed results.  Sophos, please provide DETAILED instructions for allowing Hulu, Netflix, iTunes, Amazon, and any other mainstream streaming services through your HTTP, HTTPS, Malware, Web Content Filters.

Thank you!!!



This thread was automatically locked due to age.
Parents
  • This list did the trick for me.

    ^https?://([A-Za-z0-9.-]*\.)?ne?t?fli?x(img|ext|video)?\.(com|net)/
    ^http?://[A-Za-z0-9.-]*netflix.com/
    ^http?://[A-Za-z0-9.-]*nflximg.com/
    ^https?://([A-Za-z0-9.-]*\.)?nflximg\.com\.?/
    ^https?://([A-Za-z0-9.-]*\.)?nflxvideo\.net\.?/
    ^https?://([A-Za-z0-9.-]*\.)?netflix\.com/
    ^http?://([A-Za-z0-9.-]*\.)?netflix-*.vo.llnwd.net/.*
    ^https?://secure\.netflix\.com/*
    ^https?://uiboot\.netflix\.com/*
    ^http?://23.246.[0-63].*
    ^http?://37.77.1(8[4-9])|(9[0-1])].*
    ^http?://45.57.([0-1][0-1][0-9])|(12[0-7]).*
    ^http?://64.120.(12[8-9])|(1[3-9][0-9])|(2[0-4][0-9])|(25[0-5]).*
    ^http?://66.197.(12[8-9])|(1[3-9][0-9])|(2[0-4][0-9])|(25[0-5]).*
    ^http?://108.175.(3[2-5,8,9])|(4[0-4,6,7]).*
    ^http?://185.2.22[0-3].*
    ^http?://185.9.(188)|(19[0-1]).*
    ^http?://192.173.(6[4-9])|([7-9][0-9])|(10[0-9])|(11[0-7]).*
    ^http?://198.38.(9[6-9])|(10[2-3,8-9])|(11[0-9])|(12[0-5]).*
    ^http?://198.45.(4[8-9])|(5[2-8])|(6[1-3]).*

    Ip-ranges might change over time. Check them at :

    http://ipinfo.io/AS2906#blocks

  • Where do you put this exactly? I was under the impression it would go into Protection > Web Protection > Web Content Filter and then down in the HTTP Scanning Rules section by adding a rule but you can't just paste this rule in there.

    I have actually found in the logs its actually invalid traffic being dropped causing the issue and its the IPS/IDS causing the issue but there is no information on the signatures to know what rules to enter.

  • Web filtering options > Exception list worked for me. I posted a screenshot in another thread

  • Yeah UTM is easy, I was looking for XG instructions as its in the XG category.

  • Anthony,

    if you have a Policy where Web Filter is applied and HTTP and/or HTTPS scan is on, you have to edit the web filter and add exceptions in this way:

    https://community.sophos.com/products/xg-firewall/f/129/p/75503/290316#290316


    See the thread above.

    If IPS is blocking that traffic, inside the Log Viewer you see the signature ID matched, so remove that one from your IPS policy. By default all onboard IPS cannot be customized.

Reply Children
No Data