<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic Control in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-Control/m-p/54834#M12660</link>
    <description>&lt;P&gt;This should be possible in R80.20 per&amp;nbsp;&lt;SPAN&gt;sk108202 i.e. HTTPSi + Categorise HTTPS websites&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 01 Jun 2019 05:45:50 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2019-06-01T05:45:50Z</dc:date>
    <item>
      <title>Traffic Control</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-Control/m-p/54833#M12659</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a VSX environment with various VS, two of them are controlling traffic, but just one has HTTPS Inspection enabled, the other one is only using categorization, in order to work with HTTPS Inspection, we uncheck the option "Categorize HTTPS websites", but the VS without HTTPS Inspection is not enforcing rules because can not categorize that traffic.&lt;/P&gt;&lt;P&gt;I need to know how does that option works, is there a way to only activate Categorization for the VS that does not have HTTPS Inspection? Does the platform have trouble having both enabled? if so, how can I control this traffic without using https inspection and the option "Categorize HTTPS websites" disabled?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2019 01:00:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-Control/m-p/54833#M12659</guid>
      <dc:creator>Oscar_David_Gom</dc:creator>
      <dc:date>2019-06-01T01:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Control</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-Control/m-p/54834#M12660</link>
      <description>&lt;P&gt;This should be possible in R80.20 per&amp;nbsp;&lt;SPAN&gt;sk108202 i.e. HTTPSi + Categorise HTTPS websites&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2019 05:45:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-Control/m-p/54834#M12660</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2019-06-01T05:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Control</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-Control/m-p/54862#M12661</link>
      <description>&lt;P&gt;In order for Application Control and URL Filtering to work best, it is better to have HTTPS Inspection enabled. I think it's better to do the Application Control + URL Filtering on the perimeter firewall w/ outbound HTTPS Inspection enabled on that firewall for outbound connections.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure why your topology requires 2 virtual systems to perform categorization, ideally this should only be done once on the way out to the internet. Are you able to share any more details?&lt;/P&gt;
&lt;P&gt;Without HTTPS Inspection or HTTPS Categorization, you won't be able to use site/category in the policy for rules containing the https service. HTTPS Categorization will only categorize based on the subject common name of the trusted certificate returned by the server, so the results will be mixed when using HTTPS Categorization.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jun 2019 18:39:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-Control/m-p/54862#M12661</guid>
      <dc:creator>Zach_S</dc:creator>
      <dc:date>2019-06-02T18:39:21Z</dc:date>
    </item>
  </channel>
</rss>

