<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection in R80.40 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162202#M28811</link>
    <description>&lt;P&gt;Like I (and others said), on Outbound inspection you can have a single certificate, so you could do an CA or sub-CA that would be trusted by all 3 of your domains members/clients and should be good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Inbound, if you intend to inspect traffic that is coming for WebServer Domain A and WebServer Domain B, you can have those individually - obviously &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enjoy,&lt;/P&gt;</description>
    <pubDate>Wed, 16 Nov 2022 09:55:24 GMT</pubDate>
    <dc:creator>Sorin_Gogean</dc:creator>
    <dc:date>2022-11-16T09:55:24Z</dc:date>
    <item>
      <title>HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161851#M28728</link>
      <description>&lt;P&gt;I am trying to setup https inspection in the environment where i have 3 separate domains and a zone which do not use any certificates like the proxy server.&lt;/P&gt;&lt;P&gt;I was wondering if its possible to upload 3 independent wildcard domain based certificates in Checkpoint and map them in the https rule base.. does GW allow multiple certificates to be uploaded ? or it has to be one certificate only ?&lt;/P&gt;&lt;P&gt;What are my options for a zone which does not use any certificates.&lt;/P&gt;&lt;P&gt;Any help is appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 11:16:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161851#M28728</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-11-11T11:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161853#M28729</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65123" target="_blank" rel="noopener"&gt;sk65123 - HTTPS Inspection FAQ&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108202&amp;amp;partition=Basic&amp;amp;product=HTTPS" target="_blank"&gt;sk108202: Best Practices - &lt;STRONG&gt;HTTPS&lt;/STRONG&gt; Inspection&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 11:48:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161853#M28729</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-11T11:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161858#M28731</link>
      <description>&lt;P&gt;It is possible to use several wildcard certificates for inbound inspection, check for Additional Settings when you view HTTPS Inspection policy.&lt;/P&gt;&lt;P&gt;Not sure what you mean by a Zone without certificates but it is also possible to bypass traffic that should not be https inspected.&lt;/P&gt;&lt;P&gt;There are two options, bypass or inspect in https inspect rules. If you use inspect on a rule you must choose a certificate.&lt;/P&gt;&lt;P&gt;I saw GW Albrecht already sent links to documentation, please take a look at it. They are pretty clear and understandable.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 16:56:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161858#M28731</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2022-11-11T16:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161859#M28732</link>
      <description>&lt;P&gt;Here is the short answer...&lt;/P&gt;
&lt;P&gt;For OUTBOUND https inspection -&amp;gt; No, ONLY one cert&lt;/P&gt;
&lt;P&gt;For INBOUND -&amp;gt; Yes, you can have multiple&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 12:52:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161859#M28732</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-11T12:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161872#M28737</link>
      <description>&lt;P&gt;HTTPS Inspection generates certificates on the fly which are signed by a Certificate Authority (CA).&lt;BR /&gt;Wildcard certificates cannot be used as they are not CA keys.&amp;nbsp;&lt;BR /&gt;Only a single Certificate Authority for outbound HTTPS Inspection is allowed per gateway/virtual system.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 16:28:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161872#M28737</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-11T16:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161879#M28743</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For us to better understand your set-up, can you elaborate a bit more on "&lt;SPAN&gt;setup https inspection in the environment where we have 3 separate domains&lt;/SPAN&gt;" - more on the last part of the phrase.&lt;/P&gt;
&lt;P&gt;In our company where we implemented HTTPS Inspection, we have a Root CA (smth.int) that has 3 sub CA's like ( regionEU.smth.int,&amp;nbsp;regionNA.smth.int and&amp;nbsp;regionAP.smth.int) . But the delegated sub-CA we installed on the CheckPoint, was generated by the Root CA (smth.int) so all clients from the regions will trust it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hopefully it will clarify your question, but please come back with the asked details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2022 17:21:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/161879#M28743</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-11-11T17:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162099#M28783</link>
      <description>&lt;P&gt;Thanks for the reply..&lt;/P&gt;&lt;P&gt;we actually have 3 separate domains running in the environment which use their own independent certificate sets. I was wondering if i can upload multiple certificates in checkpoint referencing each domain such that i can map those certificates in separate https rules for inbound/outbound communication.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 09:21:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162099#M28783</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-11-15T09:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162100#M28784</link>
      <description>&lt;P&gt;Thanks for the reply.. so outbound supports only one certificate which cannot be a wilcard ? are multiple certificates supported for inbound ?&lt;/P&gt;&lt;P&gt;i came across a link which suggested using wildcard certificates for https inspection.i am not sure about the use case though .i will try linking that article here&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 09:23:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162100#M28784</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-11-15T09:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162101#M28785</link>
      <description>&lt;P&gt;Thanks for the reply..there is a zone where servers aren't using any certificates..so my query was if i want to enable https inspection for those , do i need to use any default certificate or it cant be done and i need to use a bypass rule.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2022 09:25:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162101#M28785</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2022-11-15T09:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection in R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162202#M28811</link>
      <description>&lt;P&gt;Like I (and others said), on Outbound inspection you can have a single certificate, so you could do an CA or sub-CA that would be trusted by all 3 of your domains members/clients and should be good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Inbound, if you intend to inspect traffic that is coming for WebServer Domain A and WebServer Domain B, you can have those individually - obviously &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enjoy,&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 09:55:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-in-R80-40/m-p/162202#M28811</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-11-16T09:55:24Z</dc:date>
    </item>
  </channel>
</rss>

