<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Categorize HTTPS Websites in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134527#M20171</link>
    <description>&lt;P&gt;O really? Hm, I did not know that, my bad...I remember once though working with customer and TAC and they did not have https inspection enabled and TAC guy said in that case categorize https sites was not going to change anything at all. Customer was on R80.40, cant remember what jumbo hotfix though.&lt;/P&gt;</description>
    <pubDate>Fri, 19 Nov 2021 16:47:23 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2021-11-19T16:47:23Z</dc:date>
    <item>
      <title>Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134521#M20165</link>
      <description>&lt;P&gt;After I enabled "categorize https websites" on my internet facing gateway, some of the government specific websites stopped working and rest of the internet sites worked well. Any idea what would went wrong?&lt;/P&gt;&lt;P&gt;I haven't seen any drops in smart console during the issue reported time.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:07:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134521#M20165</guid>
      <dc:creator>Nandhakumar</dc:creator>
      <dc:date>2021-11-19T16:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134525#M20169</link>
      <description>&lt;P&gt;Keep in mind one thing...that setting, in all honesty, is totally useless if you dont do HTTPS inspection. Do you have inspection enabled? Ok, maybe thats wrong term, its not useless, but wont help you much with categorizing anything. If you have url filtering enabled, are you blocking that specific category?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:33:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134525#M20169</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-19T16:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134526#M20170</link>
      <description>&lt;P&gt;Not true. With R80.40 and up, SNI enforcement and categorization is used even if HTTPSi is off.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:44:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134526#M20170</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-11-19T16:44:15Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134527#M20171</link>
      <description>&lt;P&gt;O really? Hm, I did not know that, my bad...I remember once though working with customer and TAC and they did not have https inspection enabled and TAC guy said in that case categorize https sites was not going to change anything at all. Customer was on R80.40, cant remember what jumbo hotfix though.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Nov 2021 16:47:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134527#M20171</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-19T16:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134563#M20177</link>
      <description>&lt;P&gt;We don't have https inspection enabled. Our gateway is running with Gaia OS R81 and Jumbo Take 23. Then why still its not working?&lt;/P&gt;&lt;P&gt;Can you share what are all the things that will be checked, if we enable "Categorize HTTPS websites" option?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 04:46:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134563#M20177</guid>
      <dc:creator>Nandhakumar</dc:creator>
      <dc:date>2021-11-20T04:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134564#M20178</link>
      <description>&lt;P&gt;What does the browser show on these now non-functioning websites?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I.e. any specific errors seen?&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 07:07:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134564#M20178</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-11-20T07:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134566#M20179</link>
      <description>&lt;P&gt;No error/drop was seen in smart console logs as well as in browser. These sites have been accessed via SAP application.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to know working principle for "Categorize HTTPS website" option?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 08:07:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134566#M20179</guid>
      <dc:creator>Nandhakumar</dc:creator>
      <dc:date>2021-11-20T08:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134568#M20181</link>
      <description>&lt;P&gt;That statement would only be true for R80.30 and below. In R80.40 and up there is SNI verification tech, which sends independent TLS request from a security GW, to verify SNI and a site certificate are matching. It is called sometimes "SSL Lite" and allows us to categorise sites even if HTTPSi is inactive.&lt;BR /&gt;&lt;BR /&gt;We have also publicised this functionality quite a lot in 2019 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 10:41:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134568#M20181</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-11-20T10:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134569#M20182</link>
      <description>&lt;P&gt;As already mentioned above, after enabling this option, GW would try retrieving and reading site TLS certificate. Please check your GW can successfully resolve and connect to the mentioned sites directly. curl_cli and nslookup would provide you with the answers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 10:46:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134569#M20182</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-11-20T10:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134570#M20183</link>
      <description>&lt;P&gt;I am not sure what to look specifically in curl_cli output? Can you guide if we need to look specifically something?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the curl command output from the gateway&lt;/P&gt;&lt;P&gt;[Expert@GW:0]# curl_cli &lt;A href="https://www.altinn.no" target="_blank"&gt;https://www.altinn.no&lt;/A&gt;&lt;BR /&gt;curl: (60) SSL certificate problem: self signed certificate in certificate chain&lt;BR /&gt;More details here: &lt;A href="https://curl.haxx.se/docs/sslcerts.html" target="_blank"&gt;https://curl.haxx.se/docs/sslcerts.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;curl failed to verify the legitimacy of the server and therefore could not&lt;BR /&gt;establish a secure connection to it. To learn more about this situation and&lt;BR /&gt;how to fix it, please visit the web page mentioned above.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;[Expert@GW:0]# curl_cli &lt;A href="https://www.virustotal.com/gui/home/upload" target="_blank"&gt;https://www.virustotal.com/gui/home/upload&lt;/A&gt;&lt;BR /&gt;curl: (60) SSL certificate problem: unable to get local issuer certificate&lt;BR /&gt;More details here: &lt;A href="https://curl.haxx.se/docs/sslcerts.html" target="_blank"&gt;https://curl.haxx.se/docs/sslcerts.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;curl failed to verify the legitimacy of the server and therefore could not&lt;BR /&gt;establish a secure connection to it. To learn more about this situation and&lt;BR /&gt;how to fix it, please visit the web page mentioned above.&lt;BR /&gt;&lt;BR /&gt;[Expert@GW:0]# curl_cli &lt;A href="https://urlcat.checkpoint.com/urlcat/main.htm" target="_blank"&gt;https://urlcat.checkpoint.com/urlcat/main.htm&lt;/A&gt;&lt;BR /&gt;curl: (60) SSL certificate problem: self signed certificate in certificate chain&lt;BR /&gt;More details here: &lt;A href="https://curl.haxx.se/docs/sslcerts.html" target="_blank"&gt;https://curl.haxx.se/docs/sslcerts.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;curl failed to verify the legitimacy of the server and therefore could not&lt;BR /&gt;establish a secure connection to it. To learn more about this situation and&lt;BR /&gt;how to fix it, please visit the web page mentioned above.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 11:52:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134570#M20183</guid>
      <dc:creator>Nandhakumar</dc:creator>
      <dc:date>2021-11-20T11:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134571#M20184</link>
      <description>&lt;P&gt;This post may also be helpful, though I believe this was before R80.40, but phoneboy gave great explanation. I was not aware that those changes&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp; mentioned were implemented in newer versions...&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Management/Difference-between-HTTPS-Inspection-and-Categorize-HTTPS/td-p/20073" target="_blank"&gt;https://community.checkpoint.com/t5/Management/Difference-between-HTTPS-Inspection-and-Categorize-HTTPS/td-p/20073&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 12:35:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134571#M20184</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-20T12:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134572#M20185</link>
      <description>&lt;P&gt;I am not getting 100% context in that thread. Not sure what might be issue here? How to fix the same?&lt;/P&gt;&lt;P&gt;Does "Categorize HTTPS websites" will inspect encrypted traffic from client machine? If no, then what it will do?&lt;/P&gt;&lt;P&gt;For sure, the site worked well if I un-tick "Categorize HTTPS Websites" option.&lt;/P&gt;&lt;P&gt;Can we enable exception only for specific sites that should not categorize with https?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, does it have limitation with SSL site Grade. Only works for sites with the specific grades?&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 13:31:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134572#M20185</guid>
      <dc:creator>Nandhakumar</dc:creator>
      <dc:date>2021-11-20T13:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134574#M20186</link>
      <description>&lt;P&gt;Maybe opening TAC case would not be a bad idea...below is section from documentation about it:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/SmartConsole_OLH/EN/Topics-OLH/7IwBkYZnE5dyeAqAU5ILiA2.htm?cshid=7IwBkYZnE5dyeAqAU5ILiA2" target="_blank"&gt;Application and URL Filtering - Advanced Settings - General (checkpoint.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;So, it really boils down to whether certificate is trusted or not, because based on that, the categorization would work differently...&lt;/P&gt;
&lt;P class="Procedure_Heading"&gt;Categorize HTTP sites&lt;/P&gt;
&lt;P&gt;This option lets Application and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_urlf variable"&gt;URL Filtering&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;assign categories to HTTPS sites without activating HTTPS inspection. It assigns a site category based on its domain name and whether the site has a valid certificate. If the server certificate is:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Trusted&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Application and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_urlf variable"&gt;URL Filtering&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;gets the domain name from the certificate and uses it to categorize the site.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Not Trusted&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Application and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_urlf variable"&gt;URL Filtering&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;assigns a category based on the IP address.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Application and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_urlf variable"&gt;URL Filtering&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;uses these pages (in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_con variable"&gt;SmartConsole&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;&lt;SPAN class="mc-variable Vars_Other.tp_set variable"&gt;Manage &amp;amp; Settings&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab &amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Blades&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_httpsi variable"&gt;HTTPS Inspection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Menu_Options"&gt;Configure in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_dash variable"&gt;SmartDashboard&lt;/SPAN&gt;&lt;/SPAN&gt;) to make sure that a certificate is valid:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;Trusted CAs&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page - Makes sure the certificate is not stolen or revoked.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="Note"&gt;Note&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;: If your company issues certificates, you must add your company CA to the list of Trusted CAs.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="Menu_Options"&gt;HTTPS Validation&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page - If the certificate is blacklisted, for example, it is not trusted and the site categorized according to its IP address.&lt;/P&gt;
&lt;TABLE class="TableStyle-TP_Table_Notes" cellspacing="0"&gt;&lt;COLGROUP&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Image" /&gt;&lt;COL class="TableStyle-TP_Table_Notes-Column-Column_Style_Text" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR class="TableStyle-TP_Table_Notes-Body-Body"&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyB-Column_Style_Image-Body"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="the_rock_0-1637416942954.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14327iD1EA31760DC9A97E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="the_rock_0-1637416942954.png" alt="the_rock_0-1637416942954.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD class="TableStyle-TP_Table_Notes-BodyA-Column_Style_Text-Body"&gt;
&lt;P&gt;&lt;SPAN class="Important_Note"&gt;Important&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Application and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_urlf variable"&gt;URL Filtering&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;gets the site URL from the SSL "CONNECT" request sent to the proxy, if:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;There is a proxy between the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_fwcap variable"&gt;Firewall&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and the destination site or&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_fwcap variable"&gt;Firewall&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is configured to work as a proxy&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sat, 20 Nov 2021 14:03:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134574#M20186</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-20T14:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134578#M20188</link>
      <description>&lt;P&gt;A few points:&lt;/P&gt;
&lt;P&gt;1) As mentioned R80.40 and later (and R80.20/R80.30 with latest Jumbo HFA) look at the SNI when making a categorization decision instead of just the site name on the certificate, but it is highly unlikely this operation is the cause of your issue.&lt;/P&gt;
&lt;P&gt;2) A possible issue could be the problematic sites are forcing TLS 1.3 which is only supported by R81+, but you are using the R81 release so that is unlikely.&lt;/P&gt;
&lt;P&gt;3) A little-known fact: When Categorize HTTPS Sites is enabled, the firewall performs certificate verification similarly to what happens when full HTTPS Inspection is enabled.&amp;nbsp; It is likely that the CA certificate chain for these sites cannot be validated by the firewall (and your curl output seems to suggest this) because it does not have the CA certificate for all CAs in the signing chain utilized by the digital certificates being provided by the problematic sites.&amp;nbsp; Please provide a screenshot of the settings on Manage &amp;amp; Settings...Blades...HTTPS Inspection...SmartDashboard...HTTPS Inspection...HTTPS Validation, as you may have "Untrusted&amp;nbsp; server certificate" checked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4) Inspect the signing chain for the certificates being presented by the problematic systems, and make sure all entities are included on the "HTTPS Inspection...Trusted CAs" screen in the SmartDashboard.&amp;nbsp; If they are not it may be as simple as clicking the "Install Now" button at the bottom of this screen to update with the latest CAs, as this update does NOT happen automatically and it is possible the problematic CAs are new and simply not in the trusted list for the firewall, but are for the web browsers.&amp;nbsp; You may possibly need to manually import the needed chain certificate instead to complete the signing chain properly.&amp;nbsp; See the following for an example: &amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121615&amp;amp;partition=Advanced&amp;amp;product=HTTPS" target="_blank" rel="noopener"&gt;sk121615: HTTPS Inspection rejects Netflix traffic&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;5) Unlikely, but it is possible that the problematic sites are using non-RFC compliant HTTPS, which will suddenly break them when Categorize HTTPS Sites is enabled.&amp;nbsp; See here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109897&amp;amp;partition=Advanced&amp;amp;product=URL" target="_blank" rel="noopener"&gt;sk109897: How to use "Categorize HTTPS websites" configuration with non-RFC compliant HTTPS traffic&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Most of this was mentioned in my IPS/AV/ABOT Video Class which covers HTTPS Inspection...&lt;/P&gt;</description>
      <pubDate>Sat, 20 Nov 2021 18:07:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134578#M20188</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-20T18:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134591#M20193</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;for your response. In our infra, we haven't enabled https inspection. The specific question runs in my mind "how it was working fine for other internet sites except few websites?"&lt;/P&gt;&lt;P&gt;The problematic site is complaint with RFC 5246 (TLS V1.2).&amp;nbsp; Please find attached screenshot for HTTPS Validation where "Untrusted Server Certificate" was not checked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, does firewall need client machine certificate to be in the trusted CA list in order for outbound traffic to work or no need? (Assume here we enable only 'categorize https websites' option)&lt;/P&gt;</description>
      <pubDate>Sun, 21 Nov 2021 03:56:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134591#M20193</guid>
      <dc:creator>Nandhakumar</dc:creator>
      <dc:date>2021-11-21T03:56:37Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134592#M20194</link>
      <description>&lt;P&gt;What do you see in the logs if you just do search for url filtering blade when you try accessing those websites? Can you share example of one of the logs?&lt;/P&gt;</description>
      <pubDate>Sun, 21 Nov 2021 02:55:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134592#M20194</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-11-21T02:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134593#M20195</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Your curl output shows as such as you didn't use the '-k' switch for https (ignores warnings/errors in the case you didn't provide the full certificate chain to curl. Make sure you trust the site...).&lt;/P&gt;
&lt;P&gt;Do you have an example of one of the domains that is giving you issues?&lt;/P&gt;
&lt;P&gt;Tim listed a good number of possibilities of what the issue could be but it would help to have an example site.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Nov 2021 03:46:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134593#M20195</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-11-21T03:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134600#M20196</link>
      <description>&lt;P&gt;Yes I realize that you don't have HTTPS Inspection enabled, but when Categorize HTTPS Sites is enabled it performs certificate verification and that is probably what is failing.&amp;nbsp; The firewall should not need to have the Client cert CA.&amp;nbsp; Either the traffic to those few websites is not RFC compliant or there is something different about the certificates those sites are using, and I've already mentioned how to investigate these possibilities.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 15:20:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134600#M20196</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-11-22T15:20:51Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134602#M20197</link>
      <description>&lt;P&gt;So that is what I expected. GW cannot validate certificates properly&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Nov 2021 15:15:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134602#M20197</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-11-21T15:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Categorize HTTPS Websites</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134604#M20200</link>
      <description>&lt;P&gt;Believe it or not I have a similar issue access, of all sites "bbc.co.uk".&amp;nbsp; We are running R80.40 with JHFA118&amp;nbsp; and in VSX mode.&lt;/P&gt;
&lt;P&gt;I've enabled https inspect on a test VS.&amp;nbsp; cnn.com works fine and bbc.co.uk fails everytime with https enabled.&lt;/P&gt;
&lt;P&gt;I raise a TAC case, months ago and TAC have not provide any resolution.&lt;/P&gt;
&lt;P&gt;What I do know is the Global Root CA used is imported into the repository (by default), the intermediates are not there (yes did try to import this as well and TAC were on a zoom with me) but that should not really matter.&lt;/P&gt;
&lt;P&gt;The only way I could get this working was to import the actually 'bbc.co.uk' certificate, which is totally wrong (TAC have also seen this).&lt;/P&gt;
&lt;P&gt;For me using https inspection is completely useless with Checkpoint&amp;nbsp; for two reason:&lt;/P&gt;
&lt;P&gt;- When we have a site that does not work, the evidence so far indicates that Checkpoint cannot resolve it within a reasonable timeframe.&lt;/P&gt;
&lt;P&gt;- The resource requirements to use https inspection is just not financially viable, its better to use a cheaper competitor that does this at a fraction of the cost and with dedicate inbuild https inspection module without the hefty price tag.&lt;/P&gt;
&lt;P&gt;Sorry this sounds like a rant, but unfortunately this has been my experience.&lt;/P&gt;
&lt;P&gt;also one odd thing that TAC mentioned which I've challenged:&lt;/P&gt;
&lt;P&gt;Apparently VS0 needs access to the internet for OSCP access, despite the fact I see no traffic from VS0 even attempting this.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Nov 2021 21:45:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Categorize-HTTPS-Websites/m-p/134604#M20200</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-11-21T21:45:32Z</dc:date>
    </item>
  </channel>
</rss>

