<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BEST PRACTICES HTTPS INSPECTION R81.10 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150971#M24573</link>
    <description>&lt;P&gt;In this moment we have all rules inspect disabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https rules disabled.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16933i8907043D68DE84E1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="https rules disabled.png" alt="https rules disabled.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rules https.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16934iA112DF8F68924C0E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rules https.png" alt="rules https.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="example rules.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16935i3C0270A72F463B2D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="example rules.png" alt="example rules.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you see the most rules are in bypass and the inspect rules are disabled due to the fact that&amp;nbsp; we have slowness in all networks.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Jun 2022 14:56:22 GMT</pubDate>
    <dc:creator>Julian_Sanchez</dc:creator>
    <dc:date>2022-06-15T14:56:22Z</dc:date>
    <item>
      <title>BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150825#M24526</link>
      <description>&lt;P&gt;Hello guys,&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are having problems with HTTPs Inspection in R81.10 Take 55. We are having an alert in HTTPs Inspection in internal traffic. This is the log:&amp;nbsp;The probe was unable to establish a TCP connection to the destination.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to know if anymore has had problems with HTTPs Inspection in R81.10.&amp;nbsp; And what are the best practices to this version.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 15:59:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150825#M24526</guid>
      <dc:creator>Julian_Sanchez</dc:creator>
      <dc:date>2022-06-14T15:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150880#M24535</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16155"&gt;@Julian_Sanchez&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;It might be some general connectivity issue&lt;/P&gt;
&lt;P&gt;Please open a ticket to Check Point Support&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Matan&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 09:18:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150880#M24535</guid>
      <dc:creator>matangi</dc:creator>
      <dc:date>2022-06-15T09:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150918#M24556</link>
      <description>&lt;P&gt;These are my notes, shamelessly copied mostly from various posts and snippets shared by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;HTTPS Inspection Rulebase Order&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;1. Rules specifying an Action of "Bypass" that are matching only specific source and destination IP addresses/networks (no domains) with a Category of "Any"&lt;BR /&gt;&lt;BR /&gt;2. Rules bypassing sites known to not work with HTTPS Inspection via the Check Point-provided ‘HTTPS Services – bypass’ updatable object&lt;BR /&gt;&lt;BR /&gt;3. Rules specifying an Action of "Bypass" that are matching specific source and destination IP addresses/networks (and/or domains) with a Category of "Any".&lt;BR /&gt;&lt;BR /&gt;4. Rules specifying an Action of "Bypass" that are matching specific source and destination IP addresses/networks (and/or domains) with specific categories set.&lt;BR /&gt;&lt;BR /&gt;5. Rules specifying an Action of "Bypass" that are matching specific source and destination IP addresses/networks (and/or domains) with specific categories or a Category of "Any" set.&lt;BR /&gt;&lt;BR /&gt;6. &amp;nbsp;Rules specifying Inspect actions.&lt;BR /&gt;&lt;BR /&gt;7. A "cleanup rule" consisting of "Any Any ‘HTTPS default services’ Any Bypass &lt;STRONG&gt;(This is possibly not in line with current best practices, please see&lt;/STRONG&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;&lt;STRONG&gt;'s post below mine.&amp;nbsp; Use&amp;nbsp;&amp;lt;Internal NETS&amp;gt; - &amp;lt;Internet&amp;gt;-&amp;lt;HTTPS&amp;gt;-BYPASS instead&lt;/STRONG&gt;)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Notes:&lt;/STRONG&gt; &lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;NEVER use “Any” in the Destination of the HTTPS Inspection policy unless you are intending to perform HTTPS Inspection on internal traffic not interacting with the Internet. Setting a Destination of Any will throw a huge load on the firewall’s CPU as it attempts HTTPS Inspection on traffic traveling at LAN speeds which is highly inadvisable.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;NEVER use "Any" in the Services field of the HTTPS Inspection policy as this can draw large amounts of traffic into active streaming on the firewall when it is not necessary, substantially increasing CPU usage and even breaking some things as described here: sk118574: FTP/SSH/SFTP Traffic fails when HTTPS Inspection and Application Control are enabled&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 12:32:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150918#M24556</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2022-06-15T12:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150919#M24557</link>
      <description>&lt;P&gt;I am not sure position 7 is recommended. Regardless of whether you are doing the inbound or outbound inspection, the cleanup rule as described will cause ALL HTTPS connections to be tagged by&amp;nbsp;&lt;SPAN&gt;wstlsd daemon, and this might cause memory and performance issues.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This point was widely debated both internally and outside of Check Point, and my personal understanding is, that it is best to limit the explicit cleanup rule to other than ANY for destination and potentially source as well.&lt;BR /&gt;&lt;BR /&gt;For example, if you are doing outbound inspection only, and only for your internal networks, you can use &amp;lt;Internal NETS&amp;gt; - &amp;lt;Internet&amp;gt;-&amp;lt;HTTPS&amp;gt;-BYPASS. That would significantly reduce work for&amp;nbsp;wstlsd with tagging anything HTTPS crossing your GW.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 12:18:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150919#M24557</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-06-15T12:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150922#M24559</link>
      <description>&lt;P&gt;That makes sense - thanks - will update my post!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 12:27:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150922#M24559</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2022-06-15T12:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150924#M24560</link>
      <description>&lt;P&gt;I think a year ago we had a TAC case because of some problems with HTTPS inspection and they confirmed the any/any-bypass rule to be good. Maybe a SK with such a Rulebase Order would be a great idea&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 12:36:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150924#M24560</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2022-06-15T12:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150945#M24563</link>
      <description>&lt;P&gt;As I said, there is a long discussion. For small and medium-sized environments, any-any can be okay. However, we have indications from actual field deployments with lots of HTTPS traffic, that under certain conditions any-any can lead to excessive and unnecessary tagging, hence my note.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Just to clarify, it is quite hard to define a single size fits all best practices guidance in security. For example, having a stealth rule up in your policy is considered a best practice, but it also causes breakage of acceleration templates and may lead to severe performance degradation, depending on that rule position and amount of traffic crossing your security GW.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I myself was recommending the any-any-bypass HTTPSi rule for years. I do not do that anymore, as I have seen the cases when this practice is no longer considered "the best".&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 13:59:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150945#M24563</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-06-15T13:59:11Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150957#M24565</link>
      <description>&lt;P&gt;In the case of our client, we only carry out exit inspection for its internal networks. However, we see that it is inspecting internal traffic, and is generating alerts. This is appearing to affect consumer services.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MicrosoftTeams-image (4).png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16930iF03B8D8231C4A35F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MicrosoftTeams-image (4).png" alt="MicrosoftTeams-image (4).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:24:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150957#M24565</guid>
      <dc:creator>Julian_Sanchez</dc:creator>
      <dc:date>2022-06-15T14:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150958#M24566</link>
      <description>&lt;P&gt;Only 443 should be on the ports to be inspected? We also have bypass rules for specific networks but many times this fails.&lt;/P&gt;&lt;P&gt;Additionally, would a CoreXL configuration be needed? We are working with 15600 equipment and in version R80.10 we did not have the problems with Inpection.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:26:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150958#M24566</guid>
      <dc:creator>Julian_Sanchez</dc:creator>
      <dc:date>2022-06-15T14:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150959#M24567</link>
      <description>&lt;P&gt;Do you want to inspect internal HTTPS Traffic or only external Traffic? Please share your rulebase if possible. Also note that the gateway itself has to reach the destination in order to validate the certificate etc. Maybe that's missing?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:31:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150959#M24567</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2022-06-15T14:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150961#M24568</link>
      <description>&lt;P&gt;I only want to inspect external traffic. In R80.10 we dont have this issue, and in R81.10 with the same rules we are getting that alert and I think is inspection internal traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, we have a specific rule with OCSP service to validate the certificates.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rules-Bypass.PNG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16931iCA64B01DDF985AA2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Rules-Bypass.PNG" alt="Rules-Bypass.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Due to the problems of HTTPS Inspection we did a bypass to Internet, because we getting slowness in all network. We dont have inspect to Interntal traffic, and it's the strange why we are getting an alert between internal traffic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:42:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150961#M24568</guid>
      <dc:creator>Julian_Sanchez</dc:creator>
      <dc:date>2022-06-15T14:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150962#M24569</link>
      <description>&lt;P&gt;Show us the rule that says Inspect, and also the bypass rule at the bottom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:44:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150962#M24569</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-06-15T14:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150965#M24570</link>
      <description>&lt;P&gt;Maybe the "Internet" object is broken or not correctly defined. Have you tried to work with negating a group with all RFC1918 networks? Here are some thoughts about different options:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Management/Properly-defining-the-Internet-within-a-security-policy/td-p/10561" target="_blank"&gt;Properly defining the Internet within a security p... - Check Point CheckMates&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:45:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150965#M24570</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2022-06-15T14:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150966#M24571</link>
      <description>&lt;P&gt;And this is the configuration in HTTPs Ispection&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="validation https.PNG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16932i525C26C0CE00063E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="validation https.PNG" alt="validation https.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:46:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150966#M24571</guid>
      <dc:creator>Julian_Sanchez</dc:creator>
      <dc:date>2022-06-15T14:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150967#M24572</link>
      <description>&lt;P&gt;The Internet object is predefined for Check Point in SmartConsole, it can be used only in App Control or URL Filtering and in HTTPs Inspection. For another rules I use a negate group with RFC1918 networks. But I am going to test.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:49:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150967#M24572</guid>
      <dc:creator>Julian_Sanchez</dc:creator>
      <dc:date>2022-06-15T14:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150971#M24573</link>
      <description>&lt;P&gt;In this moment we have all rules inspect disabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https rules disabled.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16933i8907043D68DE84E1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="https rules disabled.png" alt="https rules disabled.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rules https.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16934iA112DF8F68924C0E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="rules https.png" alt="rules https.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="example rules.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16935i3C0270A72F463B2D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="example rules.png" alt="example rules.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you see the most rules are in bypass and the inspect rules are disabled due to the fact that&amp;nbsp; we have slowness in all networks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 14:56:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150971#M24573</guid>
      <dc:creator>Julian_Sanchez</dc:creator>
      <dc:date>2022-06-15T14:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150973#M24574</link>
      <description>&lt;P&gt;Yes, I know but the Internet object is calculated based on the Gateways topology. If for any reason your internal networks are declared as external or DMZ you can have exactly this problem.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jun 2022 15:10:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/150973#M24574</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2022-06-15T15:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: BEST PRACTICES HTTPS INSPECTION R81.10</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/151112#M24605</link>
      <description>&lt;P&gt;Can you connect to the destination server on port 443 from the gateway?&lt;BR /&gt;That happens as part of SNI verification and if this is blocked for some reason, it would explain the error.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jun 2022 00:09:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/BEST-PRACTICES-HTTPS-INSPECTION-R81-10/m-p/151112#M24605</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-06-17T00:09:53Z</dc:date>
    </item>
  </channel>
</rss>

