<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS inspection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98686#M78188</link>
    <description>&lt;P&gt;identity awareness is fine, i just checked. the computer is responding to the correct user in AD.&lt;/P&gt;&lt;P&gt;app control says, traffic accepted, and https inspection log say Inspected. and still cant reach the site&lt;/P&gt;</description>
    <pubDate>Fri, 09 Oct 2020 21:56:42 GMT</pubDate>
    <dc:creator>msantos</dc:creator>
    <dc:date>2020-10-09T21:56:42Z</dc:date>
    <item>
      <title>HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98664#M78184</link>
      <description>&lt;P&gt;Hi checkmates, im looking to configure Https Inspection for web control and that sort of things.&lt;/P&gt;&lt;P&gt;My question is, now that i have it enabled, some of my users need the access for example to youtube, and if im blocking streams with the https inspection policy, the user can´t access the site.&lt;/P&gt;&lt;P&gt;is there any way to make some exceptions, how does this work with best practices.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 15:19:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98664#M78184</guid>
      <dc:creator>msantos</dc:creator>
      <dc:date>2020-10-09T15:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98667#M78185</link>
      <description>&lt;P&gt;Yes you can make exceptions in your application control policy. Do you have identity awareness configured? If so you can create Access role objects mapped to user groups on your domain and use those objects in the source of your application control rule. You can also make object groups of specific hosts if you don't have Identity awareness and can't implement it for some reason. Those permit rules need to be above your more broadly defined drop rules.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 16:04:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98667#M78185</guid>
      <dc:creator>Jessie_Rich</dc:creator>
      <dc:date>2020-10-09T16:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98673#M78186</link>
      <description>&lt;P&gt;i think i tried that, i mean in the url filtering policy, i do have identity awareness and i have access role objects mapped to AD users as you say. ill try to figure out if any other policy is blocking me, i have checked several times and find nothing, but still ill check it again.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 17:08:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98673#M78186</guid>
      <dc:creator>msantos</dc:creator>
      <dc:date>2020-10-09T17:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98674#M78187</link>
      <description>&lt;P&gt;You should check an make sure you aren't getting any errors with identity awareness and users are getting matched to their PCs correctly. What does the log for the blocked person show?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 17:37:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98674#M78187</guid>
      <dc:creator>Jessie_Rich</dc:creator>
      <dc:date>2020-10-09T17:37:19Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98686#M78188</link>
      <description>&lt;P&gt;identity awareness is fine, i just checked. the computer is responding to the correct user in AD.&lt;/P&gt;&lt;P&gt;app control says, traffic accepted, and https inspection log say Inspected. and still cant reach the site&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 21:56:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98686#M78188</guid>
      <dc:creator>msantos</dc:creator>
      <dc:date>2020-10-09T21:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98692#M78189</link>
      <description>&lt;P&gt;Let's start with the basics: version/JHF in use?&lt;BR /&gt;Screenshots of precisely what you've configured would be helpful.&lt;BR /&gt;Screenshots and/or more precise descriptions of the behavior when it's not working would also be helpful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Oct 2020 01:40:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98692#M78189</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-10T01:40:37Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98848#M78190</link>
      <description>&lt;P&gt;HTTPS Inspection may only block sites with invalid certificates, and even that is configurable in the properties. Appropriate URLF/APC rule should allow or drop for specific user groups.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You can either share some screenshots here, or go directly to a TAC case with this.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 11:39:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/98848#M78190</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-10-12T11:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/99033#M78191</link>
      <description>&lt;P&gt;hi, i was checking all the thins you all told me to check.&lt;/P&gt;&lt;P&gt;so i installed las JHF available, check URLF rules, and use access role.&lt;/P&gt;&lt;P&gt;im still having the same issue, i want to permit youtube on certain users, but block all other streams sites.&lt;/P&gt;&lt;P&gt;im working with one test user, and youtube is blocked, but other sites not hehe, funny.&lt;/P&gt;&lt;P&gt;i upload some screenshots i made about current config.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8435iA0B55DF6E832003A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="1.JPG" alt="1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8433iFF88151EC37D1CBB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2.JPG" alt="2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8436i25CF42F809D3EAE9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="3.JPG" alt="3.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8438iD6FF87E3A7C34858/image-size/medium?v=v2&amp;amp;px=400" role="button" title="4.JPG" alt="4.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8434iF0EA596EF254802D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="5.JPG" alt="5.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="6.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8437iCBFFAA2209AED506/image-size/medium?v=v2&amp;amp;px=400" role="button" title="6.JPG" alt="6.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="7.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8432i1BF5525CC746F9ED/image-size/medium?v=v2&amp;amp;px=400" role="button" title="7.JPG" alt="7.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;       &lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 21:54:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/99033#M78191</guid>
      <dc:creator>msantos</dc:creator>
      <dc:date>2020-10-13T21:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inspection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/99058#M78192</link>
      <description>&lt;P&gt;Firstly, there is no URLF filtering policy rule blocking the youtube for regular users. Why? Another issue, why are you only inspecting certain categories? How clean-up rule looks in HTTPSi layer?&lt;BR /&gt;&lt;BR /&gt;Clearly, you are facing a config issue that can be easily fixed.&lt;BR /&gt;&lt;BR /&gt;To fix:&lt;BR /&gt;1. leave just one single rule for HTTPSi to inspect:&lt;BR /&gt;&lt;BR /&gt;Internal networks -&amp;gt; Internet-Any category-Inspect-Log&lt;/P&gt;
&lt;P&gt;followed by a cleanup rule:&lt;/P&gt;
&lt;P&gt;any - any- any- bypass-none&lt;/P&gt;
&lt;P&gt;Then create AC/URLF rules in the Network Security:&lt;BR /&gt;Good Users - Any - YouTube-Accept (no limit)&lt;/P&gt;
&lt;P&gt;Any - Any - Youtube - Drop / UserCheck Message&lt;BR /&gt;&lt;BR /&gt;Check if it works.&lt;/P&gt;
&lt;P&gt;Media stream is not the right category here&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 07:16:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inspection/m-p/99058#M78192</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-10-14T07:16:02Z</dc:date>
    </item>
  </channel>
</rss>

