<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection bypass issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136214#M20581</link>
    <description>&lt;P&gt;A bypass rule should do it provided it is correctly done.&lt;BR /&gt;However the issue may have nothing to do with HTTPS Inspection.&lt;BR /&gt;You might need to debug this issue in the application having trouble to determine what the precise issue is.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Dec 2021 21:04:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-12-13T21:04:56Z</dc:date>
    <item>
      <title>HTTPS Inspection bypass issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136199#M20577</link>
      <description>&lt;P&gt;Good evening,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm assisting a colleague with the set up of Remote Help (an app that works with InTune). When I install the client on my personal device from home (we use a split-tunnelling VPN that is configured to send Microsoft traffic via the users' local LAN),&amp;nbsp;I can connect the client to Microsoft without any issues. When I attempt to do the same on a test host on-prem, the client fails to connect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured a test rule in the Access Control policy to allow access from this host to all of the relevant Microsoft domains using domain objects. I have also added a HTTPS Inspection bypass rule at the top of the HTTPS Inspection policy for this host. I can see in the logs that the traffic is hitting the correct Access Control and HTTPS Inspection bypass policies, but the client still fails to connect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have used the HTTPS Inspection bypass list (SK163595) but this hasn't helped either.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am wondering if there is a way to totally bypass the HTTPS Inspection module altogether in R80.40?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any advice/help on this would be much appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aaron.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 18:08:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136199#M20577</guid>
      <dc:creator>AaronCP</dc:creator>
      <dc:date>2021-12-13T18:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection bypass issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136214#M20581</link>
      <description>&lt;P&gt;A bypass rule should do it provided it is correctly done.&lt;BR /&gt;However the issue may have nothing to do with HTTPS Inspection.&lt;BR /&gt;You might need to debug this issue in the application having trouble to determine what the precise issue is.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 21:04:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136214#M20581</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-13T21:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection bypass issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136327#M20592</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way in R80.40 to bypass the HTTPS Inspection module entirely? I don't want any packets in the connection hitting the HTTPS Inspection blade. I know I can use bypass rules, or specific HTTPS bypass updatable objects, but I wonder if there's any way of circumnavigating the whole module?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aaron.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 20:31:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136327#M20592</guid>
      <dc:creator>AaronCP</dc:creator>
      <dc:date>2021-12-14T20:31:15Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection bypass issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136376#M20594</link>
      <description>&lt;P&gt;Short of disabling it entirely? Not that I'm aware of.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 06:09:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136376#M20594</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-15T06:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection bypass issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136411#M20599</link>
      <description>&lt;P&gt;You could try matching the problematic traffic using fast_accel, this would fastpath the traffic through SecureXL which performs minimal inspection and cannot do HTTPS Inspection.&amp;nbsp;&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk156672&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank"&gt;sk156672: SecureXL Fast Accelerator (fw fast_accel) for R80.20 and above&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However I concur with Phoneboy that you'll probably need to gain more understanding about what is going wrong with the application, probably with some packet captures.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 13:01:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-bypass-issue/m-p/136411#M20599</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-12-15T13:01:54Z</dc:date>
    </item>
  </channel>
</rss>

