<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HTTPS Inspections for traffic in the VPN tunnel in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263223#M51672</link>
    <description>&lt;P&gt;Good afternoon!&lt;/P&gt;&lt;P&gt;We use a distributed network of CheckPoint 1535 devices connected in a mesh VPN. All devices are managed via CPSM.&lt;BR /&gt;When enabling the HTTPS Inspections policy on devices in the regions, traffic destined for the central office network is not included in the HTTPS Inspections policy. In the logs, these requests display the error: HTTPS Validation: The probe was unable to establish a TCP connection to the destination. Description: Bypassing request as configured in the engine settings of HTTPS Inspection.&lt;BR /&gt;Requests from the central office network that should not be routed to the VPN correctly traverse the HTTPS Inspections policy chain.&lt;BR /&gt;&amp;nbsp;The internet access chain for the client looks like this (&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;SPAN class=""&gt;Bypass&lt;/SPAN&gt; &lt;SPAN class=""&gt;option&lt;/SPAN&gt;&lt;SPAN&gt; is &lt;/SPAN&gt;&lt;SPAN class=""&gt;enabled&lt;/SPAN&gt;&lt;SPAN&gt; in the &lt;/SPAN&gt;&lt;SPAN class=""&gt;HTTPS&lt;/SPAN&gt; &lt;SPAN class=""&gt;Inspection&lt;/SPAN&gt; &lt;SPAN class=""&gt;rules&lt;/SPAN&gt; &lt;SPAN class=""&gt;for&lt;/SPAN&gt; &lt;SPAN class=""&gt;such&lt;/SPAN&gt; &lt;SPAN class=""&gt;traffic&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;:&lt;BR /&gt;Client -&amp;gt; CP1535Branch -&amp;gt; meshVPN -&amp;gt; CP3600HQ -&amp;gt; HQ-Service (HTTPS)&lt;BR /&gt;In this chain, I get the error:&lt;/P&gt;&lt;P&gt;HTTPS Validation: The probe was unable to establish a TCP connection to the destination&lt;/P&gt;&lt;P&gt;Description: Bypassing request as configured in engine settings of HTTPS Inspection&lt;/P&gt;&lt;P&gt;Client -&amp;gt; CP1535Branch-&amp;gt; Internet&lt;BR /&gt;HTTPS works correctly in this chain.&lt;/P&gt;&lt;P&gt;How can I diagnose this problem? Could this be because the regional office's CheckPoint is attempting to access the central office nodes without encapsulating the traffic in the VPN?&lt;/P&gt;</description>
    <pubDate>Wed, 19 Nov 2025 14:45:25 GMT</pubDate>
    <dc:creator>startlook</dc:creator>
    <dc:date>2025-11-19T14:45:25Z</dc:date>
    <item>
      <title>HTTPS Inspections for traffic in the VPN tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263223#M51672</link>
      <description>&lt;P&gt;Good afternoon!&lt;/P&gt;&lt;P&gt;We use a distributed network of CheckPoint 1535 devices connected in a mesh VPN. All devices are managed via CPSM.&lt;BR /&gt;When enabling the HTTPS Inspections policy on devices in the regions, traffic destined for the central office network is not included in the HTTPS Inspections policy. In the logs, these requests display the error: HTTPS Validation: The probe was unable to establish a TCP connection to the destination. Description: Bypassing request as configured in the engine settings of HTTPS Inspection.&lt;BR /&gt;Requests from the central office network that should not be routed to the VPN correctly traverse the HTTPS Inspections policy chain.&lt;BR /&gt;&amp;nbsp;The internet access chain for the client looks like this (&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;SPAN class=""&gt;Bypass&lt;/SPAN&gt; &lt;SPAN class=""&gt;option&lt;/SPAN&gt;&lt;SPAN&gt; is &lt;/SPAN&gt;&lt;SPAN class=""&gt;enabled&lt;/SPAN&gt;&lt;SPAN&gt; in the &lt;/SPAN&gt;&lt;SPAN class=""&gt;HTTPS&lt;/SPAN&gt; &lt;SPAN class=""&gt;Inspection&lt;/SPAN&gt; &lt;SPAN class=""&gt;rules&lt;/SPAN&gt; &lt;SPAN class=""&gt;for&lt;/SPAN&gt; &lt;SPAN class=""&gt;such&lt;/SPAN&gt; &lt;SPAN class=""&gt;traffic&lt;/SPAN&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;:&lt;BR /&gt;Client -&amp;gt; CP1535Branch -&amp;gt; meshVPN -&amp;gt; CP3600HQ -&amp;gt; HQ-Service (HTTPS)&lt;BR /&gt;In this chain, I get the error:&lt;/P&gt;&lt;P&gt;HTTPS Validation: The probe was unable to establish a TCP connection to the destination&lt;/P&gt;&lt;P&gt;Description: Bypassing request as configured in engine settings of HTTPS Inspection&lt;/P&gt;&lt;P&gt;Client -&amp;gt; CP1535Branch-&amp;gt; Internet&lt;BR /&gt;HTTPS works correctly in this chain.&lt;/P&gt;&lt;P&gt;How can I diagnose this problem? Could this be because the regional office's CheckPoint is attempting to access the central office nodes without encapsulating the traffic in the VPN?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 14:45:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263223#M51672</guid>
      <dc:creator>startlook</dc:creator>
      <dc:date>2025-11-19T14:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspections for traffic in the VPN tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263226#M51673</link>
      <description>&lt;P&gt;Are any of those sites not inspected included in bypass policy?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 16:06:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263226#M51673</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-19T16:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspections for traffic in the VPN tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263262#M51683</link>
      <description>&lt;P&gt;Hello, Andy.&lt;BR /&gt;Yes, the bypass policy fully specifies the branch network (source) and the head office network (destination). The problem is that traffic from a host in a remote office does not fall into this rule, but is marked as "Error" with the error "The probe was unable to establish a TCP connection to the destination."&lt;/P&gt;&lt;P&gt;I suspect that the node on the network at the headquarters is unreachable by the CheckPoint device itself on the branch. When the HTTPS Inspections policy is enabled, the device itself sends a request to the node on behalf of the client. This node is unreachable via VPN from the device itself (it's only reachable by clients behind it). Could this be the cause of the problem? Do I need to somehow change the VPN Domain settings so that nodes on the headquarters network can be reached from the branch&amp;nbsp; device itself CheckPoint?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 06:34:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263262#M51683</guid>
      <dc:creator>startlook</dc:creator>
      <dc:date>2025-11-20T06:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspections for traffic in the VPN tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263289#M51689</link>
      <description>&lt;P&gt;In my mind, as long as that node is subjected to its traffic being inspected by the CP firewall and right inspection certs are trueted on it, there is no reason why this would not work.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 12:04:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263289#M51689</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-20T12:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspections for traffic in the VPN tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263341#M51711</link>
      <description>&lt;P&gt;Part of performing HTTPS Inspection requires the gateway to reach out to the destination server to verify SNI.&lt;BR /&gt;If the gateway can't do this, you'll get this error.&lt;/P&gt;
&lt;P&gt;If the gateway is attempting to reach out to the server without going through the VPN, you should clearly see this in a tcpdump on the external interface.&lt;BR /&gt;If the destination is in the encryption domain, it should go over the VPN.&lt;BR /&gt;If it isn't it might be a bug and TAC should be engaged.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 16:10:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-Inspections-for-traffic-in-the-VPN-tunnel/m-p/263341#M51711</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-11-20T16:10:16Z</dc:date>
    </item>
  </channel>
</rss>

