<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Inspection - High Utilization in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187197#M34489</link>
    <description>&lt;P&gt;There will definitely be a significant amount of overhead incurred due to the overhead of HTTPS encrypt/decrypt operations, this is not really avoidable or offloadable into silicon/hardware at this time.&lt;/P&gt;
&lt;P&gt;Traffic must be accepted by the Firewall/Network policy layer before the HTTPS Inspection Policy is examined, and it is matched against the pre-NAT packet IP addresses, just like the Firewall/Network policy layer.&lt;/P&gt;
&lt;P&gt;Overhead will also increase due to there now being more decrypted traffic for the various blades to inspect, whereas before HTTPS Inspection the traffic was encrypted between client and server and could not be inspected at all.&amp;nbsp; This can be mitigated somewhat by configuring the Blades column of the HTTPS Inspection policy to limit what blades inspect which decrypted traffic, but this is rarely employed.&lt;/P&gt;
&lt;P&gt;However a truly amazing amount of overhead can be saved by properly ordering your HTTPS Inspection Policy rules to avoid the invocation of Medium Path Active Streaming for Bypass actions wherever possible.&amp;nbsp; It is a bit complicated to explain, so here are the current pages related to this topic from my &lt;A href="http://www.maxpowerfirewalls.com/gw-optimization-course.html" target="_blank" rel="noopener"&gt;R81.20 Gateway Performance Optimization Course&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21830i421CC669E307D58B/image-size/large?v=v2&amp;amp;px=999" role="button" title="https1.png" alt="https1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21831i1C0A78CD3692C64F/image-size/large?v=v2&amp;amp;px=999" role="button" title="https2.png" alt="https2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21832i1884982606C2608A/image-size/large?v=v2&amp;amp;px=999" role="button" title="https3.png" alt="https3.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https4.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21833i9C7ED9BC693A9A80/image-size/large?v=v2&amp;amp;px=999" role="button" title="https4.png" alt="https4.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jul 2023 15:05:53 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2023-07-21T15:05:53Z</dc:date>
    <item>
      <title>SSL Inspection - High Utilization</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187108#M34457</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;I enable &amp;nbsp;SSLinspection for outbound, then facing high utilization from 30% to 65%. is it normal?&lt;/P&gt;&lt;P&gt;From this im trying to tuning the current configuration because too many policy and some of the policy is duplicate.&lt;/P&gt;&lt;P&gt;In the CP, what is going to check first? Access Control Policy or HTTP Inspection?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Access Control &amp;gt; HTTP Inspection &amp;gt; Threat Prevention. is it correct?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and last, does anyone know how to anticipate HSTS error after enable HTTP Inpsection? because some of web got this error message and cant open. Thanks!!&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 16:28:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187108#M34457</guid>
      <dc:creator>Fabz</dc:creator>
      <dc:date>2023-07-20T16:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection - High Utilization</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187109#M34458</link>
      <description>&lt;P&gt;Your best bet is to use below sk to troubleshoot, as well as wstlsd debug:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk112066" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk112066&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Whats your utilization when https inspection is off?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 16:49:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187109#M34458</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-07-20T16:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection - High Utilization</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187130#M34463</link>
      <description>&lt;P&gt;Yes there is an overhead involved depending on your traffic mix &amp;amp; configuration.&lt;/P&gt;
&lt;P&gt;To start review your HTTPS inspection policy - refer:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Setup/td-p/83504#M27820" target="_blank"&gt;https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Setup/td-p/83504#M27820&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Policy-Rule-Order/td-p/128681#M27952" target="_blank"&gt;https://community.checkpoint.com/t5/Management/HTTPS-Inspection-Policy-Rule-Order/td-p/128681#M27952&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;From there investigating further with HCP might yield additional clues.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 23:27:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187130#M34463</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-07-20T23:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Inspection - High Utilization</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187197#M34489</link>
      <description>&lt;P&gt;There will definitely be a significant amount of overhead incurred due to the overhead of HTTPS encrypt/decrypt operations, this is not really avoidable or offloadable into silicon/hardware at this time.&lt;/P&gt;
&lt;P&gt;Traffic must be accepted by the Firewall/Network policy layer before the HTTPS Inspection Policy is examined, and it is matched against the pre-NAT packet IP addresses, just like the Firewall/Network policy layer.&lt;/P&gt;
&lt;P&gt;Overhead will also increase due to there now being more decrypted traffic for the various blades to inspect, whereas before HTTPS Inspection the traffic was encrypted between client and server and could not be inspected at all.&amp;nbsp; This can be mitigated somewhat by configuring the Blades column of the HTTPS Inspection policy to limit what blades inspect which decrypted traffic, but this is rarely employed.&lt;/P&gt;
&lt;P&gt;However a truly amazing amount of overhead can be saved by properly ordering your HTTPS Inspection Policy rules to avoid the invocation of Medium Path Active Streaming for Bypass actions wherever possible.&amp;nbsp; It is a bit complicated to explain, so here are the current pages related to this topic from my &lt;A href="http://www.maxpowerfirewalls.com/gw-optimization-course.html" target="_blank" rel="noopener"&gt;R81.20 Gateway Performance Optimization Course&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21830i421CC669E307D58B/image-size/large?v=v2&amp;amp;px=999" role="button" title="https1.png" alt="https1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21831i1C0A78CD3692C64F/image-size/large?v=v2&amp;amp;px=999" role="button" title="https2.png" alt="https2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21832i1884982606C2608A/image-size/large?v=v2&amp;amp;px=999" role="button" title="https3.png" alt="https3.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https4.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21833i9C7ED9BC693A9A80/image-size/large?v=v2&amp;amp;px=999" role="button" title="https4.png" alt="https4.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jul 2023 15:05:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-Inspection-High-Utilization/m-p/187197#M34489</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-07-21T15:05:53Z</dc:date>
    </item>
  </channel>
</rss>

