<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apple services not working with HTTPS inspection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/181128#M33129</link>
    <description>&lt;P&gt;I am always 100% honest with people...no point BS-ing and pretending. Truth has to be told, as it will always come out. Hey, here is the best example...everyone knows who late Steve Jobs was. Did he lie and try to portray Apple as greatest company in the world back in the day? Of course he did not, because he knew the truth...so what did he do? He invented the phone that revolutionized the world and propelled Apple to first trillion $ company in the world. I think I rest my case : - )&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/803"&gt;@Austin_Ponten&lt;/a&gt;&amp;nbsp;If you need help with this, always happy to do remote session mate.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Tue, 16 May 2023 14:57:41 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-05-16T14:57:41Z</dc:date>
    <item>
      <title>Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180867#M33067</link>
      <description>&lt;P&gt;Hi, First post so I will do my best &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The environment is R80.40 Take196&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue:&lt;/P&gt;&lt;P&gt;We are trying to perform HTTPS Inspection for our trusted client networks for a customer. The problem arises when Apple per their post here&amp;nbsp;&lt;A href="https://support.apple.com/en-us/HT210060" target="_blank"&gt;https://support.apple.com/en-us/HT210060&lt;/A&gt;&amp;nbsp;state "&lt;SPAN&gt;Attempts to perform content inspection on encrypted communications between Apple devices and services will result in a dropped connection to preserve platform security and user privacy."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, we created exceptions for this in the policy. I followed the guidelines listed in these:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Apple-and-HTTPS-Inspection/m-p/176059/highlight/true#M32177" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Apple-and-HTTPS-Inspection/m-p/176059/highlight/true#M32177&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk108191" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk108191&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk112994" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk112994&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The First two links did not help, as the redirects via AKAMAI Tech did not get caught by the Bypass exceptions no matter how many *apple.com domains or certificates were added.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The last link where in step 3 it states to:&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Create a Network object that specifies the relevant AKAMAI network (based on the example above - 88.221.0.0/16)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Does in fact make the exception for inspection work, but my client nor I find this as a valid solution as Apple is not the only tenant for AKAMAI Tech.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question I present to the community is: How can I perform content inspection on ONLY Apple-related traffic WITHOUT compromising my internal client networks?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can provide additional information if needed, and thanks for reading my first post &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 08:26:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180867#M33067</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T08:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180877#M33068</link>
      <description>&lt;P&gt;I woud suggest to contact TAC to get an official solution !&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 09:38:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180877#M33068</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-05-15T09:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180886#M33071</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/803"&gt;@Austin_Ponten&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you be more specific on the problem you're seeing?&lt;/P&gt;
&lt;P&gt;I was setting up recently several Apple Cache servers and you can see below the firewall rules we have for those boxes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(we have HTTPS Inspection enabled for ALL HTTPS 443 traffic)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20906i0BD8F27C2F245437/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The custom objects are below (no REGEXP):&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="25%"&gt;apple.com object&lt;/TD&gt;
&lt;TD width="12.5%"&gt;c.apple.news object&lt;/TD&gt;
&lt;TD width="12.5%"&gt;App Store Object&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="25%"&gt;*.apple.com&lt;BR /&gt;.apple.com&lt;BR /&gt;.icloud.com&lt;BR /&gt;*.icloud.com&lt;BR /&gt;appleid.cdn-apple.com&lt;BR /&gt;.cdn-apple.com&lt;BR /&gt;*.cdn-apple.com&lt;/TD&gt;
&lt;TD width="12.5%"&gt;c.apple.news &lt;BR /&gt;.apple.news&lt;BR /&gt;*.apple.news &lt;/TD&gt;
&lt;TD width="12.5%"&gt;
&lt;P&gt;apps.mzstatic.com&lt;BR /&gt;*.mzstatic.com&lt;BR /&gt;.mzstatic.com&lt;BR /&gt;.icloud-content.com&lt;BR /&gt;*.icloud-content.com&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With all those settings, I can tell you that I see the Apple Cache machines, being able to communicate with Apple Cloud, and the packages are downloaded/validated without any issues.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 10:49:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180886#M33071</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-05-15T10:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180890#M33072</link>
      <description>&lt;P&gt;Hi thanks for the quick reply. Yes, I initially went to TAC to get help and after a bit of testing and labbing gave me the following answer "&lt;SPAN&gt;Unfortunately, without having the proper ranges for AKAMAI, it is trickier to find a way to bypass only the specific services without the knowledge of the specific IP addresses for AKAMAI." and closed the case.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-A&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 11:30:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180890#M33072</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T11:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180891#M33073</link>
      <description>&lt;P&gt;Hi, Thanks for your quick reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I followed your suggestions to a T as a test for our implementation, but for us, our Mac users cannot initiate a software update, run iTunes, download or search apps in the store etc. (all Apple-related user content).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The thing is, that out of 10 connection attempts, I would say maybe 1-2 will actually work as the traffic is not redirected via AKAMAI and the user is able to reach iTunes or the App Store using the exceptions I had made either from your suggestion or a combination of 17.0.0.0/8, domains, and certificate additions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is slightly different I guess than those Apple cache machines I'm afraid..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 11:36:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180891#M33073</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T11:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180894#M33074</link>
      <description>&lt;P&gt;I worked for some time with customer who has 95% of their environment Mac books and Mac minis, so Im fairly familiar with this. Sadly, I dont have access to their environment currently, so will see if I can find some screenshots/notes about how we made this work. I do recall we added whatever we could find when searching Apple in updatable objects for https inspection bypass, and then also added all Apple IP ranges to be allowed as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 11:49:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180894#M33074</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-15T11:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180897#M33075</link>
      <description>&lt;P&gt;So all is clear - official solution is to use IPs / IP Ranges.&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 11:58:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180897#M33075</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-05-15T11:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180899#M33076</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/803"&gt;@Austin_Ponten&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't remember any&amp;nbsp;&lt;SPAN&gt;AKAMAI&amp;nbsp;addressing while looking for the Apple traffic permissions .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The example I give you, with Apple Cache, as you addressed issues with Apple traffic, and Apple Cache is ONLY Apple traffic - packages and updates .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;On those failure, can you show some logs - I really don't&amp;nbsp;get it why ppl are so shy in showing logs&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt; - as those can point us other to other ideas.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:18:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180899#M33076</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-05-15T12:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180904#M33077</link>
      <description>&lt;P&gt;K, found it from my notes...so here is what we bypassed and worked fine.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20909i4A4455660725C89C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; Sadly, you cant add much from updatable objects, as this is only thing that pops up and in all honestly, its utterly useless.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_3.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20910iBA22FAE583380B04/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_3.png" alt="Screenshot_3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:30:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180904#M33077</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-15T12:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180905#M33078</link>
      <description>&lt;P&gt;Not useless, but only usable on SMB appliances ! Akamai has an Updateable Object...&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:34:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180905#M33078</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-05-15T12:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180906#M33079</link>
      <description>&lt;P&gt;I had client tell me before they had TAC add it for them for SMB as well and it did absolutely nothing. Anyway, you are correct, Akamai updatable object is there, so that may help, for sure.&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:37:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180906#M33079</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-15T12:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180910#M33080</link>
      <description>&lt;P&gt;Hi, It is more out of laziness that I wasn't showing any logs as I don't have access to a test Mac user readily. I did procure a history log from last week's testing that displays the problem at hand.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It shows the user attempting to reach Software updates from Apple, but the destination is akamaitechnologies.com which gets inspected since it is not defined in the Bypass exceptions for Apple and then it is dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-A&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:49:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180910#M33080</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T12:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180911#M33081</link>
      <description>&lt;P&gt;Just create custom app category and add *akamai* and make sure its allowed in regular layer, as well as https inspection policy and test.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:52:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180911#M33081</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-15T12:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180912#M33082</link>
      <description>&lt;P&gt;That might work yes, but the whole point that I am trying to do is to avoid this "any any" rule, As far as I am aware Apple is not the only company that uses Akamai as a CDN and I would like to not create a larger exception than needed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know what specific customers they have, but my first Google result is&amp;nbsp;&lt;A href="https://www.appsruntheworld.com/customers-database/products/view/akamai-cdn" target="_blank"&gt;https://www.appsruntheworld.com/customers-database/products/view/akamai-cdn&lt;/A&gt;&lt;/P&gt;&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 12:56:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180912#M33082</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T12:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180913#M33083</link>
      <description>&lt;P&gt;I have done a variant of this, including the custom objects that&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/16983"&gt;@Sorin_Gogean&lt;/a&gt;&amp;nbsp;had suggested, but not the exact looking one as yours, I will add this to the policy and see if there is any change. You only had this destination custom app object in the rule then?&lt;/P&gt;&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 13:01:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180913#M33083</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T13:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180914#M33084</link>
      <description>&lt;P&gt;Yep and I forgot *icloud*, it was there as well.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 13:02:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180914#M33084</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-15T13:02:18Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180918#M33086</link>
      <description>&lt;P&gt;I see, so your issue was not with the firewall access permissions, but the HTTPS Inspection part.&lt;/P&gt;
&lt;P&gt;On our side we're having this rule - see below - and on the Custom Applications we're setting a 2nd category "HTTPS_Inspection_Bypass" that is set here not to be inspected.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20912i7059EC322070A070/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You DO NOT NEED to except AKAMAI as you think, since all calls are done towards apple.com or similar domains, like I showed you in the previous screenshots/tabels .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 13:17:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180918#M33086</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2023-05-15T13:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180921#M33087</link>
      <description>&lt;P&gt;Interesting. Yes I have the Custom App object for Apple, but what is in the custom category HTTPS_Inspection_Bypass that you use to catch Apple-related traffic that I might be missing?&lt;/P&gt;&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 13:39:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180921#M33087</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T13:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180922#M33088</link>
      <description>&lt;P&gt;I tried this and removed all my other bypass rules that I was testing with and such, and the first test worked! I won't call the Nobel org just yet, but if this does end up lasting the next 24 hours I will almost have more questions than answers...&lt;/P&gt;&lt;P&gt;Thanks for the input!&lt;/P&gt;&lt;P&gt;-A&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 13:41:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180922#M33088</guid>
      <dc:creator>Austin_Ponten</dc:creator>
      <dc:date>2023-05-15T13:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Apple services not working with HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180923#M33089</link>
      <description>&lt;P&gt;Glad to hear. BUT, here is what I will tell you...with customer I was talking about, we made exact same rules in ordered layer (where fw and url/app[ control blades were enabled, as they came from Cisco, so did not feel comfortable with multiple ordered layers) and https inspection policy, meaning we bypassed that custom object with 17.0.0.0/8 range, *apple*, *itunes* and *icloud* and all worked fine. I dont have access to their environment, as they feel comfortable fixing their own CP issues now and dealing with TAC if needed, but Im happy to take screenshots in my lab to demonstrate, as it would be very similar to how they have it.&lt;/P&gt;
&lt;P&gt;Let me know if thats needed, but if not, keep us posted.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 13:46:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Apple-services-not-working-with-HTTPS-inspection/m-p/180923#M33089</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-15T13:46:11Z</dc:date>
    </item>
  </channel>
</rss>

