<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection Bypass in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/223886#M42970</link>
    <description>&lt;DIV class="ai-chatbot-conversation-assistant-text css-1lxqfct"&gt;
&lt;P&gt;For run (and research purposes), I asked &lt;A href="https://support.checkpoint.com/ai" target="_blank"&gt;AI Copilot&lt;/A&gt; this question.&lt;BR /&gt;Here's a more verbose answer:&lt;/P&gt;
&lt;P&gt;To handle bypassing HTTPS inspection for URLs with wildcards, such as the one you provided, you can use the following approach:&lt;/P&gt;
&lt;H3&gt;Solution: Bypass HTTPS Inspection Using Wildcards&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Create a Custom Application/Site Object:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Open SmartConsole.&lt;/LI&gt;
&lt;LI&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Security Policies&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Application/Site&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Shared Objects&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Application/Site&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Name the object (e.g.,&lt;CODE&gt;AmazonS3Wildcard&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;URL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;field, enter the wildcard URL:&lt;CODE&gt;*.s3.eu-west-1.amazonaws.com&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to save the object.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Create an HTTPS Inspection Bypass Rule:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In SmartConsole, go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Security Policies&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;HTTPS Inspection&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Add a new rule at the top of the policy:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;: Bypass Amazon S3&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;: Any (or specify the relevant source if needed)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Destination&lt;/STRONG&gt;: Add the&lt;CODE&gt;AmazonS3Wildcard&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;object created earlier.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Services&lt;/STRONG&gt;: HTTPS (or specify the relevant HTTPS services)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;: Bypass&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to save the rule.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Install the Policy:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Install the Access Control policy to apply the changes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Example Rule Configuration&lt;/H3&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Source&lt;/TH&gt;
&lt;TH&gt;Destination&lt;/TH&gt;
&lt;TH&gt;Services&lt;/TH&gt;
&lt;TH&gt;Action&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Any&lt;/TD&gt;
&lt;TD&gt;AmazonS3Wildcard&lt;/TD&gt;
&lt;TD&gt;HTTPS&lt;/TD&gt;
&lt;TD&gt;Bypass&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H3&gt;Important Notes:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Wildcard Handling&lt;/STRONG&gt;: Ensure that the wildcard pattern correctly matches the URLs you intend to bypass.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Policy Order&lt;/STRONG&gt;: Place the bypass rule at the top of the HTTPS Inspection policy to ensure it is matched before other rules.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Testing&lt;/STRONG&gt;: After applying the policy, test accessing the URL to confirm that the bypass is working as expected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By following these steps, you should be able to bypass HTTPS inspection for URLs with wildcards effectively. If you encounter any issues, please refer to the relevant Check Point documentation or contact Check Point support for further assistance.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="css-1lj4tcw"&gt;
&lt;DIV class="css-1ggc6ok"&gt;
&lt;DIV&gt;BE AWARE&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="css-rtx1wd"&gt;Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ai-chatbot-references css-g9n3fs"&gt;
&lt;DIV class="css-131f8vm"&gt;Learn more:&lt;/DIV&gt;
&lt;DIV class="css-zs1iv6"&gt;
&lt;OL class="css-3yupri"&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk112066" target="_blank" rel="noopener"&gt;sk112066 - How to troubleshoot an HTTPS Inspection issue&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk122158" target="_blank" rel="noopener"&gt;sk122158 - Bypass by URL in HTTPS Inspection does not work when the site certificate is invalid&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk178386" target="_blank" rel="noopener"&gt;sk178386 - Users cannot submit data to ELSTER (German tax authority) when HTTPS Inspection is enabled&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 16 Aug 2024 19:42:54 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-08-16T19:42:54Z</dc:date>
    <item>
      <title>HTTPS Inspection Bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222467#M42629</link>
      <description>&lt;P&gt;Running into an issue where I need to bypass HTTPS inspection (R81.10 JHF 150); however, this is the URL:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://eka-prod-xxx.s3-eu-west-1.amazonaws.com" target="_blank"&gt;https://eka-prod-xxx.s3-eu-west-1.amazonaws.com&lt;/A&gt;&amp;nbsp;- xxx is the wildcard. Is there a good way to handle this?&lt;/P&gt;
&lt;P&gt;The full URL in this case ended up being:&lt;/P&gt;
&lt;P&gt;eka-prod-survey-binaries-active-bucket-e1lw1wtq8m9jg38i.s3.eu-west-1.amazonaws.com&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 14:02:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222467#M42629</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-08-01T14:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222472#M42633</link>
      <description>&lt;P&gt;I just tested in the lab and worked fine, added to bypass rule like below.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27067i894EA13D919D6DB8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 14:23:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222472#M42633</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-01T14:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222497#M42637</link>
      <description>&lt;P&gt;&lt;A href="https://eka-prod-xxx.s3-eu-west-1.amazonaws.com/" target="_blank"&gt;https://eka-prod-xxx.s3-eu-west-1.amazonaws.com/&lt;/A&gt;&amp;nbsp;isn't the actual URL it is using though, XXX is a placeholder for&amp;nbsp;numerous other names.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-08-01 10_38_11-192.168.183.205-R81.10-SmartConsole.png" style="width: 578px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27076iD648ADFCA60098DF/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-08-01 10_38_11-192.168.183.205-R81.10-SmartConsole.png" alt="2024-08-01 10_38_11-192.168.183.205-R81.10-SmartConsole.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I could add the highlighted URL to resolve the issue, but that section is dynamic and will be something else later. That's why I need to be able to do some sort of wildcard for the XXX portion of&amp;nbsp;&lt;A href="https://eka-prod-xxx.s3-eu-west-1.amazonaws.com/" target="_blank"&gt;https://eka-prod-xxx.s3-eu-west-1.amazonaws.com/.&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 15:41:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222497#M42637</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-08-01T15:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222498#M42638</link>
      <description>&lt;P&gt;Easy peasy...just add *eka-prod* as wild card, thats what I did, no issues.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 15:50:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222498#M42638</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-01T15:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222502#M42639</link>
      <description>&lt;P&gt;Ah, perfect, thanks! I forgot about the * wildcard option within custom Application/Site.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-08-01 11_09_59-192.168.183.205-R81.10-SmartConsole.png" style="width: 561px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27077i902BF3CA2EB25D33/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-08-01 11_09_59-192.168.183.205-R81.10-SmartConsole.png" alt="2024-08-01 11_09_59-192.168.183.205-R81.10-SmartConsole.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 16:12:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222502#M42639</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-08-01T16:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222505#M42640</link>
      <description>&lt;P&gt;All good...we are here to help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 16:14:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/222505#M42640</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-01T16:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Bypass</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/223886#M42970</link>
      <description>&lt;DIV class="ai-chatbot-conversation-assistant-text css-1lxqfct"&gt;
&lt;P&gt;For run (and research purposes), I asked &lt;A href="https://support.checkpoint.com/ai" target="_blank"&gt;AI Copilot&lt;/A&gt; this question.&lt;BR /&gt;Here's a more verbose answer:&lt;/P&gt;
&lt;P&gt;To handle bypassing HTTPS inspection for URLs with wildcards, such as the one you provided, you can use the following approach:&lt;/P&gt;
&lt;H3&gt;Solution: Bypass HTTPS Inspection Using Wildcards&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Create a Custom Application/Site Object:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Open SmartConsole.&lt;/LI&gt;
&lt;LI&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Security Policies&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Application/Site&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Shared Objects&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Application/Site&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Name the object (e.g.,&lt;CODE&gt;AmazonS3Wildcard&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;URL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;field, enter the wildcard URL:&lt;CODE&gt;*.s3.eu-west-1.amazonaws.com&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to save the object.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Create an HTTPS Inspection Bypass Rule:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In SmartConsole, go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Security Policies&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Click on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;HTTPS Inspection&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Add a new rule at the top of the policy:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;: Bypass Amazon S3&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;: Any (or specify the relevant source if needed)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Destination&lt;/STRONG&gt;: Add the&lt;CODE&gt;AmazonS3Wildcard&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;object created earlier.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Services&lt;/STRONG&gt;: HTTPS (or specify the relevant HTTPS services)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;: Bypass&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;OK&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to save the rule.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Install the Policy:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Install the Access Control policy to apply the changes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Example Rule Configuration&lt;/H3&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Source&lt;/TH&gt;
&lt;TH&gt;Destination&lt;/TH&gt;
&lt;TH&gt;Services&lt;/TH&gt;
&lt;TH&gt;Action&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Any&lt;/TD&gt;
&lt;TD&gt;AmazonS3Wildcard&lt;/TD&gt;
&lt;TD&gt;HTTPS&lt;/TD&gt;
&lt;TD&gt;Bypass&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;H3&gt;Important Notes:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Wildcard Handling&lt;/STRONG&gt;: Ensure that the wildcard pattern correctly matches the URLs you intend to bypass.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Policy Order&lt;/STRONG&gt;: Place the bypass rule at the top of the HTTPS Inspection policy to ensure it is matched before other rules.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Testing&lt;/STRONG&gt;: After applying the policy, test accessing the URL to confirm that the bypass is working as expected.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By following these steps, you should be able to bypass HTTPS inspection for URLs with wildcards effectively. If you encounter any issues, please refer to the relevant Check Point documentation or contact Check Point support for further assistance.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="css-1lj4tcw"&gt;
&lt;DIV class="css-1ggc6ok"&gt;
&lt;DIV&gt;BE AWARE&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="css-rtx1wd"&gt;Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ai-chatbot-references css-g9n3fs"&gt;
&lt;DIV class="css-131f8vm"&gt;Learn more:&lt;/DIV&gt;
&lt;DIV class="css-zs1iv6"&gt;
&lt;OL class="css-3yupri"&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk112066" target="_blank" rel="noopener"&gt;sk112066 - How to troubleshoot an HTTPS Inspection issue&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk122158" target="_blank" rel="noopener"&gt;sk122158 - Bypass by URL in HTTPS Inspection does not work when the site certificate is invalid&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk178386" target="_blank" rel="noopener"&gt;sk178386 - Users cannot submit data to ELSTER (German tax authority) when HTTPS Inspection is enabled&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 16 Aug 2024 19:42:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-Bypass/m-p/223886#M42970</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-16T19:42:54Z</dc:date>
    </item>
  </channel>
</rss>

