<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound HTTPS inspection with Site Category in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85377#M11297</link>
    <description>&lt;P&gt;Not surprised, the APCL and URLF blades while separate, are heavily intertwined in both policy configuration and implementation since R75.40.&amp;nbsp; I've seen some odd behavior in my training lab when trying to enable only one of them.&lt;/P&gt;</description>
    <pubDate>Fri, 15 May 2020 12:50:43 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2020-05-15T12:50:43Z</dc:date>
    <item>
      <title>Inbound HTTPS inspection with Site Category</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85042#M11293</link>
      <description>&lt;P&gt;Hi, I'm trying to use inbound https inspection with site category but I'm getting this error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal system error in HTTPS Inspection (Error Code: 2)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I remove the site category the inspection works fine, but this is not an option for me since all of my domains points to the same webserver.&lt;/P&gt;&lt;P&gt;My goal is to create a custom site+rule with the corresponding certificate for every domain.&lt;/P&gt;&lt;P&gt;This is the rule:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captura de pantalla 2020-05-13 a las 12.07.57.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6058i91BD656000E1AAFA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Captura de pantalla 2020-05-13 a las 12.07.57.png" alt="Captura de pantalla 2020-05-13 a las 12.07.57.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'm using a non-standard port since the gateway is in AWS and the traffic is received from a load balancer. I have added the port in the Application Control &amp;amp; URL filtering Advanced Settings but the error persist.&lt;/P&gt;&lt;P&gt;It's necessary to enable the Application Control and/or URL filtering blades on the gateway for this to work? When I have tryed it I get the error "URL filtering blade is not responding" and I can not install policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any hint will be apprecieted, thank you&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 10:33:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85042#M11293</guid>
      <dc:creator>Alejandro_Ferna</dc:creator>
      <dc:date>2020-05-13T10:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection with Site Category</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85316#M11294</link>
      <description>Custom Applications/Sites require either App Control OR URL Filtering blade to be active.&lt;BR /&gt;For this specific use case, App Control is better.</description>
      <pubDate>Thu, 14 May 2020 17:49:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85316#M11294</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-14T17:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection with Site Category</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85352#M11295</link>
      <description>&lt;P&gt;OK, now I have to find the reason why I can not activate the blade...&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captura de pantalla 2020-05-15 a las 9.13.07.png" style="width: 658px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6087iB5AEBE5FAC61F9A4/image-dimensions/658x88?v=v2" width="658" height="88" role="button" title="Captura de pantalla 2020-05-15 a las 9.13.07.png" alt="Captura de pantalla 2020-05-15 a las 9.13.07.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT: I dont know why but at second attempt I have been able to install policy and the error is gone. Now I have the Application control blade enabled but I'm still getting the "Internal system error in HTTPS Inspection (Error Code: 2)" message.&lt;/P&gt;&lt;P&gt;I keep investigating.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 08:00:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85352#M11295</guid>
      <dc:creator>Alejandro_Ferna</dc:creator>
      <dc:date>2020-05-15T08:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection with Site Category</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85372#M11296</link>
      <description>&lt;P&gt;It's working.&lt;/P&gt;&lt;P&gt;I leave here my experience in case it is helpful to someone else:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN class=""&gt;I'm not sure if the fact that our web server works with SNI / virtualhost affects inspection in some way&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;but, in my case, the inspection only works with Application Control and URL Filtering blades both enabled.&lt;/P&gt;&lt;P&gt;Only with AC I get Internal system error in HTTPS Inspection (Error Code: 2)&lt;/P&gt;&lt;P&gt;Trying to only enable URL Filtering the policy installation fails with "Policy installation failed on gateway. If the problem persists contact Check Point support (Error code: 0-2000112)."&lt;/P&gt;&lt;P&gt;With both enabled, the inspection is working and the IPS is blocking correctly the HTTPS urls that match the IPS protections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I'm stepping forward testing with two domains/rules:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captura de pantalla 2020-05-15 a las 13.35.27.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6090i08ADD3EAFCAE5710/image-size/large?v=v2&amp;amp;px=999" role="button" title="Captura de pantalla 2020-05-15 a las 13.35.27.png" alt="Captura de pantalla 2020-05-15 a las 13.35.27.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When I test the first domain, the first rule matches the traffic and does the inspection.&lt;BR /&gt;When I test the second domain, the second rule does not match the traffic.&lt;/P&gt;&lt;P&gt;I'll keep updating.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 11:41:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85372#M11296</guid>
      <dc:creator>Alejandro_Ferna</dc:creator>
      <dc:date>2020-05-15T11:41:05Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection with Site Category</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85377#M11297</link>
      <description>&lt;P&gt;Not surprised, the APCL and URLF blades while separate, are heavily intertwined in both policy configuration and implementation since R75.40.&amp;nbsp; I've seen some odd behavior in my training lab when trying to enable only one of them.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 12:50:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85377#M11297</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-15T12:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS inspection with Site Category</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85420#M11298</link>
      <description>That sounds like a bug and is probably worth a TAC case (only having APCL and not URLF enabled results in error).</description>
      <pubDate>Fri, 15 May 2020 19:42:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-HTTPS-inspection-with-Site-Category/m-p/85420#M11298</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-15T19:42:44Z</dc:date>
    </item>
  </channel>
</rss>

