<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS INSPECTION SHA1 to SHA256 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67840#M12082</link>
    <description>&lt;P&gt;You are going to have to list out exactly step by step what done then as the SK seems to contain what to do when reading through,&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108641&amp;amp;partition=Advanced&amp;amp;product=HTTPS" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108641&amp;amp;partition=Advanced&amp;amp;product=HTTPS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Shows a little more about having once opened an R80.x SmartDashboard for the HTTPS Inspection Policy but is once in there the same as on R77.x in the SK,&lt;/P&gt;&lt;P&gt;I would think that Check Point take it that you need to install the Policy afterwards for it to take affect as a given as is hammered into everyone that make a change and need to install Policy afterwards.&lt;/P&gt;&lt;P&gt;If haven't finished importing the SHA-256 Cert then would still be using the SHA-1 which presumbably you had working fine so wouldn't get any errors still.&lt;/P&gt;&lt;P&gt;So How have you exported the certificate and then distributed the Client Machines as if the Client PC not trusting the Certs then it looks as though either not in the Trusted Root CA store on the machine or hasn't imported to the machine properly for which looking more at the PC rather then Check Point.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Nov 2019 18:44:06 GMT</pubDate>
    <dc:creator>mdjmcnally</dc:creator>
    <dc:date>2019-11-19T18:44:06Z</dc:date>
    <item>
      <title>HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67672#M12074</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Found the Checkpoint HTTPS INSPECTION cert is SHA1 and as it is outdated should move forward to SHA256. Followed the&amp;nbsp;&lt;SPAN&gt;sk115894&lt;/SPAN&gt; but when accessing,&amp;nbsp; the browser is not trusting the certificate. Kindly help on resolving this issue.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Nov 2019 18:35:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67672#M12074</guid>
      <dc:creator>sajin</dc:creator>
      <dc:date>2019-11-17T18:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67677#M12075</link>
      <description>You can replace the certificate, you know?&lt;BR /&gt;What software release?</description>
      <pubDate>Sun, 17 Nov 2019 22:00:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67677#M12075</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-17T22:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67685#M12076</link>
      <description>&lt;P&gt;Its R80.30 with Take 76.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please brief to replace the existing certificate SHA1 and its in production now.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 04:02:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67685#M12076</guid>
      <dc:creator>sajin</dc:creator>
      <dc:date>2019-11-18T04:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67745#M12077</link>
      <description>See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115894" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk115894&lt;/A&gt;</description>
      <pubDate>Mon, 18 Nov 2019 16:42:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67745#M12077</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-18T16:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67759#M12078</link>
      <description>&lt;P&gt;Wandering if Stage 6 has been done which requires to install the new SHA-256 Cert into the Trusted Root CA Folder on the Windows machines.&lt;/P&gt;&lt;P&gt;If reading write then have updated the Cert but the Machines not trusting the Certificates from the New Certificate which points to the new Cert not being Trusted.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 18:40:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67759#M12078</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-11-18T18:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67828#M12079</link>
      <description>&lt;P&gt;The certificate .crt is already added in the Trusted Root Certificate.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 17:03:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67828#M12079</guid>
      <dc:creator>sajin</dc:creator>
      <dc:date>2019-11-19T17:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67831#M12080</link>
      <description>&lt;P&gt;If the new SHA-256 Cert is in the Trusted CA Root Folder then you will need to investigate on the Client Machines why they are not trusting the new Root CA even though added as a Trusted CA Root Certificate.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 17:31:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67831#M12080</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-11-19T17:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67837#M12081</link>
      <description>&lt;P&gt;Created a different lab and tested and am getting the same error message. I think some configuration of installing the certificate is missing in the Dashboard.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 18:08:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67837#M12081</guid>
      <dc:creator>sajin</dc:creator>
      <dc:date>2019-11-19T18:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67840#M12082</link>
      <description>&lt;P&gt;You are going to have to list out exactly step by step what done then as the SK seems to contain what to do when reading through,&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108641&amp;amp;partition=Advanced&amp;amp;product=HTTPS" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108641&amp;amp;partition=Advanced&amp;amp;product=HTTPS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Shows a little more about having once opened an R80.x SmartDashboard for the HTTPS Inspection Policy but is once in there the same as on R77.x in the SK,&lt;/P&gt;&lt;P&gt;I would think that Check Point take it that you need to install the Policy afterwards for it to take affect as a given as is hammered into everyone that make a change and need to install Policy afterwards.&lt;/P&gt;&lt;P&gt;If haven't finished importing the SHA-256 Cert then would still be using the SHA-1 which presumbably you had working fine so wouldn't get any errors still.&lt;/P&gt;&lt;P&gt;So How have you exported the certificate and then distributed the Client Machines as if the Client PC not trusting the Certs then it looks as though either not in the Trusted Root CA store on the machine or hasn't imported to the machine properly for which looking more at the PC rather then Check Point.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 18:44:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/67840#M12082</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-11-19T18:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68818#M12083</link>
      <description>&lt;P&gt;After enabling PBR, HTTPS INSPECTION is not working to the interface where PBR is enabled.&amp;nbsp; Is there any limitation in HTTPS INSPECTION with PBR. Able to get the certificate and page takes too much time to load and&amp;nbsp; much often doesn't load. External Interface without PBR works fine perfectly.&lt;/P&gt;&lt;P&gt;I could see traffic flowing through both External Interface when HTTPS INSPECTION is enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 13:52:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68818#M12083</guid>
      <dc:creator>sajin</dc:creator>
      <dc:date>2019-11-28T13:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68821#M12084</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100500&amp;amp;partition=General&amp;amp;product=Security#Limitations" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100500&amp;amp;partition=General&amp;amp;product=Security#Limitations&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The following features/blades are&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;not&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;supported with PBR:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IPv6&lt;/LI&gt;&lt;LI&gt;URL Filtering&lt;/LI&gt;&lt;LI&gt;IPS&lt;/LI&gt;&lt;LI&gt;Locally-generated traffic&lt;/LI&gt;&lt;LI&gt;Security Servers&lt;/LI&gt;&lt;LI&gt;Data Loss Prevention (DLP) blade&lt;/LI&gt;&lt;LI&gt;VPN Domain Based&lt;/LI&gt;&lt;LI&gt;VPN Route Based&lt;/LI&gt;&lt;LI&gt;Anti-Spam blade&lt;/LI&gt;&lt;LI&gt;Mail Transfer Agent (MTA) (relevant for Threat Emulation/Threat Extraction/Data Loss Prevention/Anti-Spam blades)&lt;/LI&gt;&lt;LI&gt;ISP Redundancy&lt;/LI&gt;&lt;LI&gt;The following applications (which use Check Point Active Streaming [CPAS]):&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;VoIP (H323, SIP, Skinny, etc.)&lt;/LI&gt;&lt;LI&gt;HTTPS Inspection&lt;/LI&gt;&lt;LI&gt;HTTP Header Spoofing&lt;/LI&gt;&lt;LI&gt;HTTP Proxy&lt;/LI&gt;&lt;LI&gt;IMAP in IPS&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTTPS Inspection listed there.&amp;nbsp; &amp;nbsp;Cannot do HTTPS Inspection with PBR.&amp;nbsp; Pretty much all you can run on a Check Point with PBR enabled is the Firewall Blade.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 14:07:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68821#M12084</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-11-28T14:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68824#M12085</link>
      <description>&lt;P&gt;Thank You so much for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have seen this SK before but some of our customers are using HTTPS INSPECTION with PBR successfully in the same&amp;nbsp; version.&lt;/P&gt;&lt;P&gt;Even IPS and URLF was working fine over there. I could see PBR traffic with IPS Events in logs.&lt;/P&gt;&lt;P&gt;We had created a test Lab and tested,&amp;nbsp; and the test was a success.&lt;/P&gt;&lt;P&gt;What i had noticed in production environment is "PBR NAT IP is again coming as a source in next External interface with the same destination IP".&lt;/P&gt;&lt;P&gt;Is there anyway we can avoid the above situation mentioned in double quotes.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 14:50:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68824#M12085</guid>
      <dc:creator>sajin</dc:creator>
      <dc:date>2019-11-28T14:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68825#M12086</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you please conform&amp;nbsp;&lt;SPAN&gt;sk100500 is relevant or not, as PBR works with HTTPS INPECTION for some environment and creating issues on others. Is the SK relevant.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 14:57:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68825#M12086</guid>
      <dc:creator>sajin</dc:creator>
      <dc:date>2019-11-28T14:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS INSPECTION SHA1 to SHA256</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68828#M12087</link>
      <description>&lt;P&gt;Yes the SK article is VERY relevant as quite clearly says is NOT SUPPORTED.&amp;nbsp; &amp;nbsp; That is not to be confused with DOES NOT WORK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you are running in an unsupported configuration when running HTTPS Inspection and configuring PBR.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 15:03:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-INSPECTION-SHA1-to-SHA256/m-p/68828#M12087</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-11-28T15:03:19Z</dc:date>
    </item>
  </channel>
</rss>

