<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: inbound https inspection workin partially only? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160618#M28343</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean Mobile Access Blade is enabled on this gateway, but not used in this scenario (thats why i mentioned ist as "not involved" in my initial post).&lt;/P&gt;&lt;P&gt;GW running 81.10 Take66.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Oct 2022 18:33:41 GMT</pubDate>
    <dc:creator>mp2012</dc:creator>
    <dc:date>2022-10-27T18:33:41Z</dc:date>
    <item>
      <title>inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160445#M28337</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see following behaviour:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;https inspection inbound to a webserver --&amp;gt;&amp;nbsp; uploading eicar av test file --&amp;gt; prevented : fine&lt;/LI&gt;&lt;LI&gt;https inspection inbound to a exchange server --&amp;gt;&amp;nbsp;uploading eicar av test file (just a mail via web ui) --&amp;gt; &lt;STRONG&gt;&lt;U&gt;not&lt;/U&gt;&lt;/STRONG&gt; detected&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;both got rules with dest&amp;nbsp; server cert imported, both log as inspected traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;That is on 81.10 IPS/AV/antibot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kind regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2022 11:22:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160445#M28337</guid>
      <dc:creator>mp2012</dc:creator>
      <dc:date>2022-10-26T11:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160482#M28338</link>
      <description>&lt;P&gt;Can you confirm HTTPS Inspection was done on the entire communication?&lt;BR /&gt;Also, is Mobile Access Blade involved with Exchange?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Oct 2022 16:10:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160482#M28338</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-26T16:10:12Z</dc:date>
    </item>
    <item>
      <title>Re: inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160519#M28339</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I tested the less complex scenario via Client/Browser accessing the outlook web app, so only one destination fqdn and ip address (the VIP) is involved.&lt;/P&gt;&lt;P&gt;mobile aacess blade not involved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kind regards,&lt;/P&gt;&lt;P&gt;mp2012&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 04:22:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160519#M28339</guid>
      <dc:creator>mp2012</dc:creator>
      <dc:date>2022-10-27T04:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160602#M28340</link>
      <description>&lt;P&gt;Please confirm yes or no that you are using Mobile Access Blade because your answer is unclear on this fact.&lt;BR /&gt;Also, you say the VIP is used, does that mean you are using NAT to expose your Exchange server via the Cluster IP?&lt;/P&gt;
&lt;P&gt;In the past, we've had EICAR not flagged in specific circumstances:&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk44781&amp;amp;partition=Advanced&amp;amp;product=Anti-Virus" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk44781&amp;amp;partition=Advanced&amp;amp;product=Anti-Virus&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;It might be worth a TAC case.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 16:35:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160602#M28340</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-27T16:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160608#M28341</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sorry misunderstood. So yes, Mobile Access Blade is enabled and active on this gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Complete communication path that is:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;external client --&amp;gt; perimeter gw with https inspection rule --&amp;gt; Load Balancer VIP rev.proxy --&amp;gt; reverse proxy servers --&amp;gt;&amp;nbsp; Load Balancer VIP exchange --&amp;gt; exchange servers&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;maybe goin to remove the rev.proxy setup if we're satisfied withe the https decryption setup.&lt;/P&gt;&lt;P&gt;Same setup works on sharepoint, but surprisingly its blocked as "Trojan.Win32.Mitaka.TC.a"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kind regards,&lt;/P&gt;&lt;P&gt;mp2012&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 17:36:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160608#M28341</guid>
      <dc:creator>mp2012</dc:creator>
      <dc:date>2022-10-27T17:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160609#M28342</link>
      <description>&lt;P&gt;If you're using Mobile Access Blade, HTTPS Inspection isn't relevant as the connection is terminating on the gateway anyway.&lt;BR /&gt;It also change the inspection flow a bit and what blades are supported.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104577&amp;amp;partition=Basic&amp;amp;product=Mobile" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104577&amp;amp;partition=Basic&amp;amp;product=Mobile&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AV should be supported, though, which means EICAR should be flagged.&lt;BR /&gt;What version/JHF is the gateway?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 17:54:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160609#M28342</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-27T17:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160618#M28343</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mean Mobile Access Blade is enabled on this gateway, but not used in this scenario (thats why i mentioned ist as "not involved" in my initial post).&lt;/P&gt;&lt;P&gt;GW running 81.10 Take66.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 18:33:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160618#M28343</guid>
      <dc:creator>mp2012</dc:creator>
      <dc:date>2022-10-27T18:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: inbound https inspection workin partially only?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160623#M28344</link>
      <description>&lt;P&gt;Ok.&lt;BR /&gt;I think your best bet here is to involve the TAC.&lt;BR /&gt;Under certain conditions that may not be relevant anymore, EICAR was not flagged as malicious.&lt;BR /&gt;I don't think these conditions apply anymore, though, as they are for older versions running Traditional AV.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 19:19:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/inbound-https-inspection-workin-partially-only/m-p/160623#M28344</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-27T19:19:22Z</dc:date>
    </item>
  </channel>
</rss>

