<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127625#M18531</link>
    <description>&lt;P&gt;Assuming the gateway version supports the relevant ciphers and TLS version, yes, that's my understanding.&lt;BR /&gt;That said, if you're doing HTTPS Inspection, it is highly recommended you are on the most current release in order to leverage the latest ciphers.&lt;/P&gt;</description>
    <pubDate>Sun, 22 Aug 2021 02:00:00 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-08-22T02:00:00Z</dc:date>
    <item>
      <title>HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127605#M18526</link>
      <description>&lt;P&gt;When having an HTTPS inspection rule and the Check Point firewall re-encrypts the connection to the destination, is there a version that can support re-encrypting as TLS1.1 for some destinations and TLS1.2 for others, etc.? Or, is every Check Point firewall version going to do the same TLS version for all re-encrypted connections on to all destinations?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Aug 2021 12:12:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127605#M18526</guid>
      <dc:creator>Jon_Crotteau</dc:creator>
      <dc:date>2021-08-21T12:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127612#M18528</link>
      <description>&lt;P&gt;It should mimic what the client does.&lt;BR /&gt;Note if you configure a minimum version (global setting), that version will be enforced by HTTPS Inspection.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Aug 2021 16:20:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127612#M18528</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-21T16:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127622#M18530</link>
      <description>&lt;P&gt;Are you saying that if globally I have it at TLS1.1 and the client initiates at TLS1.2 that the gateway will use TLS1.2 to the server no matter what gateway version I have (lets just say anything R77 and up).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Aug 2021 20:10:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127622#M18530</guid>
      <dc:creator>Jon_Crotteau</dc:creator>
      <dc:date>2021-08-21T20:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127625#M18531</link>
      <description>&lt;P&gt;Assuming the gateway version supports the relevant ciphers and TLS version, yes, that's my understanding.&lt;BR /&gt;That said, if you're doing HTTPS Inspection, it is highly recommended you are on the most current release in order to leverage the latest ciphers.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Aug 2021 02:00:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection/m-p/127625#M18531</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-22T02:00:00Z</dc:date>
    </item>
  </channel>
</rss>

