<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection over IPv6 on R82 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230933#M44461</link>
    <description>&lt;P&gt;Maybe a little more context here: I've got a bonded interface with 2 VLANs. VLAN 10 is a connection I am receiving the prefix on, VLAN 100 is the connection where I am distributing it.&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;set dhcp6 server enable&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;set dhcp6 client client-mode prefix-delegation&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;set dhcp6 prefix-delegation method dhcpv6&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;add dhcp6 prefix-delegation assign-to bond0.100&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;set dhcp6 prefix-delegation request-from bond0.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;The address (&lt;SPAN&gt;2001:a61:30b2:bb10:21c:7fff:fe88:996f) is the address seen on the bond0.100 interface,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;show interface bond0.100&lt;BR /&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;ipv6-address&amp;nbsp;&lt;SPAN&gt;2001:a61:30b2:bb10:21c:7fff:fe88:996f&lt;/SPAN&gt;/64&lt;BR /&gt;...&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Clients get their IPv6 addresses on bond0.100. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;I tested a little more, this happens on every website which does not get bypassed due to policy. Every "new" site - first time a client tries to open and waits for 15 seconds, then the site gets bypassed, subsequent attempts - the inspection is bypassed immediately.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 27 Oct 2024 21:53:59 GMT</pubDate>
    <dc:creator>oa_munich</dc:creator>
    <dc:date>2024-10-27T21:53:59Z</dc:date>
    <item>
      <title>HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230824#M44438</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;As R82 was released, I tried it out on a test gateway. My goal was to try IPv6 prefix delegation, which was introduced in R82 - I successfully received and distributed a prefix.&lt;/P&gt;&lt;P&gt;While trying this out, I encountered a strange issue with HTTPS inspection, when the inspection occurs via IPv6. See attached screenshots.&lt;/P&gt;&lt;P&gt;A client&amp;nbsp;(2001:a61:30b2:bb10:445a:95fe:caf:8ed5) initiates a connection to a website (2606:4700::6813:df4f).&lt;/P&gt;&lt;P&gt;In the screenshot, you can see that the firewall accepts the connection initiated by the firewall itself, i.e. the probe (first screenshot, lowest row). After a noticeable timeout (initial connection at 16:38:22, client connects at 16:38:38 - 15 seconds), the client is permitted to connect, and no inspection takes place.&amp;nbsp; The log shows that&amp;nbsp;"The probe was unable to establish a TCP connection to the destination". I explicitly permitted the IPv6 address of the firewall to connect anywhere, cp2-ipv6-prefix (2001:a61:30b2:bb10:21c:7fff:fe88:996f).&lt;/P&gt;&lt;P&gt;If IPv6 is disabled, HTTPS inspection is working as expected, there is no generic configuration error, and the issue seems to be related to the way the probe initiates the connection via IPv6.&lt;/P&gt;&lt;P&gt;Any suggestions where to dig to understand why is this happening?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 16:06:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230824#M44438</guid>
      <dc:creator>oa_munich</dc:creator>
      <dc:date>2024-10-25T16:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230858#M44445</link>
      <description>&lt;P&gt;Do you see the gateway probe the destination via tcpdump or similar?&lt;BR /&gt;Guessing it's a bug and a TAC case will likely be necessary.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 20:39:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230858#M44445</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-25T20:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230882#M44450</link>
      <description>&lt;P&gt;I ran a packet capture on an upstream router and saw probe packets. Will get TAC to take a look, thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 26 Oct 2024 12:01:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230882#M44450</guid>
      <dc:creator>oa_munich</dc:creator>
      <dc:date>2024-10-26T12:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230921#M44457</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/117290"&gt;@oa_munich&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it happen for all web sites or only for a specific one?&lt;/P&gt;
&lt;P&gt;I tried in my lab and it looks fine, i am getting inspection with IPv6.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&lt;/P&gt;</description>
      <pubDate>Sun, 27 Oct 2024 19:20:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230921#M44457</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2024-10-27T19:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230930#M44460</link>
      <description>&lt;P&gt;It happens with a handful websites I've tested with, e.g. fast.com, whatismyip.com and a few more.&lt;/P&gt;&lt;P&gt;Are you assigning IPv6 address through prefix delegation?&lt;/P&gt;</description>
      <pubDate>Sun, 27 Oct 2024 20:01:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230930#M44460</guid>
      <dc:creator>oa_munich</dc:creator>
      <dc:date>2024-10-27T20:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230933#M44461</link>
      <description>&lt;P&gt;Maybe a little more context here: I've got a bonded interface with 2 VLANs. VLAN 10 is a connection I am receiving the prefix on, VLAN 100 is the connection where I am distributing it.&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;set dhcp6 server enable&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;set dhcp6 client client-mode prefix-delegation&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;set dhcp6 prefix-delegation method dhcpv6&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;add dhcp6 prefix-delegation assign-to bond0.100&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;set dhcp6 prefix-delegation request-from bond0.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;The address (&lt;SPAN&gt;2001:a61:30b2:bb10:21c:7fff:fe88:996f) is the address seen on the bond0.100 interface,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;show interface bond0.100&lt;BR /&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;ipv6-address&amp;nbsp;&lt;SPAN&gt;2001:a61:30b2:bb10:21c:7fff:fe88:996f&lt;/SPAN&gt;/64&lt;BR /&gt;...&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Clients get their IPv6 addresses on bond0.100. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;I tested a little more, this happens on every website which does not get bypassed due to policy. Every "new" site - first time a client tries to open and waits for 15 seconds, then the site gets bypassed, subsequent attempts - the inspection is bypassed immediately.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Oct 2024 21:53:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230933#M44461</guid>
      <dc:creator>oa_munich</dc:creator>
      <dc:date>2024-10-27T21:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230935#M44462</link>
      <description>&lt;P&gt;I find this super interesting...may test it some time this week in R82 lab.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 02:06:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230935#M44462</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-28T02:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230938#M44464</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;the IPv6 delegation should not be related here, can you share with which browser are you testing it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 07:39:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230938#M44464</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2024-10-28T07:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230944#M44468</link>
      <description>&lt;P&gt;Chrome and Brave (Chromium based) on an Android phone and a Mac.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 08:12:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230944#M44468</guid>
      <dc:creator>oa_munich</dc:creator>
      <dc:date>2024-10-28T08:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230948#M44471</link>
      <description>&lt;P&gt;I tried several times to replicate this in my lab and i don't see any issues&lt;/P&gt;
&lt;P&gt;as you can see below i tried fast.com and it got inspected.&lt;/P&gt;
&lt;P&gt;If you have time today and would like to have a session with me it will be great so we can go over together with you and see what's is the problem.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fastcom.JPG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28218i8E289B97016039A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="fastcom.JPG" alt="fastcom.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 08:52:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/230948#M44471</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2024-10-28T08:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/232597#M44931</link>
      <description>&lt;P&gt;Updating the thread with the findings on this case.&lt;/P&gt;
&lt;P&gt;First it was very interesting case so&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/117290"&gt;@oa_munich&lt;/a&gt;&amp;nbsp;thanks for sharing.&lt;/P&gt;
&lt;P&gt;Second after we build same topology in our lab, we found out that our topology is missing a route on the router side of link local address of the GW.&lt;/P&gt;
&lt;P&gt;Explanation - In such topology we have interface external one which has only IPv6 link local address, the traffic is routed via default route to fe80 address of the router, when we initiating in our case local conn from the GW tcp conn, we are doing NAT so the traffic is flows with fe80 link local address, then the router receive the connection and doing NAT to get out to the internet, the router will get the reply then in his dst post NAT we will have fe80 of the GW hence it required to add route of the fe80 address of the GW via dev near side to the GW on the router.&lt;/P&gt;
&lt;P&gt;The above will resolve the issue.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/117290"&gt;@oa_munich&lt;/a&gt;&amp;nbsp;- feel free to update me here or in private if that's didn't work for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2024 15:15:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/232597#M44931</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2024-11-13T15:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/233221#M45099</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14307"&gt;@Ilya_Yusupov&lt;/a&gt;&amp;nbsp;and the team for spending time with me and ultimately getting to the bottom of this. One minor correction to the above statement: as the external facing interface gets only a link-local address, the upstream router _must_ do static NAT of the gateway link-local address to a public ipv6 address. As the downstream interface did receive a public ipv6 address from prefix delegation, I got stuck in thinking that as the gateway had received a public ipv6 address, nothing else was required.&lt;/P&gt;&lt;P&gt;So, step 1 would be to add translation of the link-local ipv6 address to a public ipv6 address on the upstream router.&lt;/P&gt;&lt;P&gt;Step 2 would be to ensure proper routing as suggested above.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 10:50:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/233221#M45099</guid>
      <dc:creator>oa_munich</dc:creator>
      <dc:date>2024-11-20T10:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection over IPv6 on R82</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/233235#M45104</link>
      <description>&lt;P&gt;This is why I tell everyone how great you are! You helped me the same way with very COMPLICATED issue and it showed you truly cared and would not give up until it was solved.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 11:53:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspection-over-IPv6-on-R82/m-p/233235#M45104</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-20T11:53:20Z</dc:date>
    </item>
  </channel>
</rss>

