<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: web filtering with https inspection disabled in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65401#M83447</link>
    <description>&lt;P&gt;&lt;FONT color="#000000"&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/35365"&gt;@pedkha1&lt;/a&gt;,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;R80.30/R80.20&amp;nbsp; with enabled HTTPS interception:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If the https interseption is enabled, the parameter&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;host&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;from http&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;can be used for the url because the traffic is analyzed by active streaming.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Check Point Active Streaming (CPAS) allow the changing of data, we play the role of “man in the middle”. CPAS breaks the connection into two parts using our own stack – this mean, we are responsible for all the stack work (dealing with options, retransmissions, timers etc.). An application is register to CPAS when a connection start and supply callbacks for event handler and read handler. Several protocols uses CPAS, for example: HTTPS, VoIP (SIP, Skinny/SCCP, H.323, etc.), Security Servers processes, etc.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CPAS breaks the HTTPS connection into two parts using our own stack – this mean, we are responsible for all the stack work (dealing with options, retransmissions, timers etc.)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More read here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Content-Inspection/td-p/41665" target="_self"&gt;R80.x Security Gateway Architecture (Content Inspection)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;R80.30/R80.20 without enabled HTTPS interception:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If the https interseption is disabled,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SNI is used&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to recognize the virtual URL for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;application control&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;and&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;url filtering&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;More read here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/general-topics/10433/1/URL%20Filtering%20using%20SNI%20for%20HTTPS%20websites.pdf" target="_self"&gt;URL Filtering using SNI for HTTPS websites.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 20 Oct 2019 20:51:56 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2019-10-20T20:51:56Z</dc:date>
    <item>
      <title>web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65352#M83443</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;I want to do web filtering for my wifi guest users and but it doesent work.&lt;/P&gt;&lt;P&gt;https inspection disabled for the Guest subnet so how can i achieve it without https inspection&lt;/P&gt;&lt;P&gt;I added below rule to WF and still i can see traffic is passing through&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 18 Oct 2019 17:10:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65352#M83443</guid>
      <dc:creator>pedkha1</dc:creator>
      <dc:date>2019-10-18T17:10:02Z</dc:date>
    </item>
    <item>
      <title>Re: web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65357#M83444</link>
      <description>Not sure what happened to the rule you're using.&lt;BR /&gt;In any case, please describe what you expect to happen versus what is actually happening.&lt;BR /&gt;If the traffic is being accepted when it should be dropped (or vice versa), what rule is it being accepted on instead and what is that rule?&lt;BR /&gt;Also what version/JHF level?&lt;BR /&gt;&lt;BR /&gt;In general, if you are doing App Control/URL Filtering without HTTPS Inspection, R80.30 will be a much better choice as we can filter on Verified SNI.</description>
      <pubDate>Fri, 18 Oct 2019 23:18:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65357#M83444</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-18T23:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65371#M83445</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;thanks for the answer, we are at sw level r80.20M1 and i expect to be dropped in place of accept.&lt;/P&gt;&lt;P&gt;i simply want to filter harmful sites for a subnet that belong to guest users.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Oct 2019 17:19:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65371#M83445</guid>
      <dc:creator>pedkha1</dc:creator>
      <dc:date>2019-10-19T17:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65372#M83446</link>
      <description>The more specifics you can provide about the rule, the sites actually being accessed, etc, the more we can help.&lt;BR /&gt;&lt;BR /&gt;R80.20.M1 is not a gateway release, what about your gateway?&lt;BR /&gt;Also, we do not jumbo hotfixes for R80.20.M1 and highly recommend upgrading to R80.30.</description>
      <pubDate>Sat, 19 Oct 2019 18:06:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65372#M83446</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-19T18:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65401#M83447</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/35365"&gt;@pedkha1&lt;/a&gt;,&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;R80.30/R80.20&amp;nbsp; with enabled HTTPS interception:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If the https interseption is enabled, the parameter&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;host&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;from http&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;can be used for the url because the traffic is analyzed by active streaming.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Check Point Active Streaming (CPAS) allow the changing of data, we play the role of “man in the middle”. CPAS breaks the connection into two parts using our own stack – this mean, we are responsible for all the stack work (dealing with options, retransmissions, timers etc.). An application is register to CPAS when a connection start and supply callbacks for event handler and read handler. Several protocols uses CPAS, for example: HTTPS, VoIP (SIP, Skinny/SCCP, H.323, etc.), Security Servers processes, etc.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;CPAS breaks the HTTPS connection into two parts using our own stack – this mean, we are responsible for all the stack work (dealing with options, retransmissions, timers etc.)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More read here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-x-Security-Gateway-Architecture-Content-Inspection/td-p/41665" target="_self"&gt;R80.x Security Gateway Architecture (Content Inspection)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;R80.30/R80.20 without enabled HTTPS interception:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If the https interseption is disabled,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SNI is used&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to recognize the virtual URL for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;application control&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;and&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;url filtering&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;More read here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/fyrhh23835/attachments/fyrhh23835/general-topics/10433/1/URL%20Filtering%20using%20SNI%20for%20HTTPS%20websites.pdf" target="_self"&gt;URL Filtering using SNI for HTTPS websites.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2019 20:51:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65401#M83447</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-10-20T20:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65472#M83448</link>
      <description>&lt;P&gt;thanks for the email and document.&lt;/P&gt;&lt;P&gt;the reason i didn't upgrade to r80.30 IS because when we upgraded to R80.20 ,we face too many issues and software bugs and i am not sure if R80.30 is stable at this point or not.&lt;/P&gt;&lt;P&gt;so using SNI is the best idea for my question&lt;/P&gt;&lt;P&gt;do you know if R80.30 has the same issues like R80.20 ?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 16:28:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65472#M83448</guid>
      <dc:creator>pedkha1</dc:creator>
      <dc:date>2019-10-21T16:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65827#M83449</link>
      <description>R80.30 is the generally recommended release at this point, particularly with the latest recommended JHF.</description>
      <pubDate>Thu, 24 Oct 2019 17:18:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65827#M83449</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-24T17:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: web filtering with https inspection disabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65828#M83450</link>
      <description>&lt;P&gt;thanks and great&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 17:20:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/web-filtering-with-https-inspection-disabled/m-p/65828#M83450</guid>
      <dc:creator>pedkha1</dc:creator>
      <dc:date>2019-10-24T17:20:52Z</dc:date>
    </item>
  </channel>
</rss>

