<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Update Services with HTTPS inspection enabled in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62928#M84167</link>
    <description>An short update.&lt;BR /&gt;Check Point have managed to reproduce this issue in their labs and RnD currently working on it..&lt;BR /&gt;Looking forward to see an soon resolution on this issue. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
    <pubDate>Tue, 17 Sep 2019 09:38:25 GMT</pubDate>
    <dc:creator>Kim_Moberg</dc:creator>
    <dc:date>2019-09-17T09:38:25Z</dc:date>
    <item>
      <title>Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61637#M84160</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;we are having issues accessing Windows Update with HTTPs Inspection enabled (Check Point R80.20 with Take 87) and "&lt;EM&gt;Bypass HTTPS inspection of traffic to well-known software update services&lt;/EM&gt;" option checked.&lt;/P&gt;&lt;P&gt;If, from browser, I try to surf to &lt;STRONG&gt;&lt;A href="https://slscr.update.microsoft.com" target="_blank"&gt;https://slscr.update.microsoft.com&lt;/A&gt;&lt;/STRONG&gt;, instead of getting "403 - Forbidden: Access is denied.", I get the "&lt;SPAN&gt;ERR_CONNECTION_RESET" error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any advice ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Luca&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2019 11:44:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61637#M84160</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-02T11:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61656#M84161</link>
      <description>&lt;P&gt;Hi Luca&lt;/P&gt;&lt;P&gt;I am seeing the similar issues while running R80.20 Take 80.&lt;/P&gt;&lt;P&gt;it was blocking windows update for Windows 10 Ver 1903 while doing https inspection but as soon I am using an uninspected subnet it worked.&lt;/P&gt;&lt;P&gt;on the working subnet I was usning wireshark to search and filter for Server HELLO messages to find domains which Windows update CDN (Content Domain Network) was being used by it.&lt;/P&gt;&lt;P&gt;I am though not 100% through yet.. because I have bypass the following hosts on layer 7 but also tried to bypass on ip on layer 4 in the OSI model.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The hosts are which also include some other Microsoft services:&lt;/P&gt;&lt;P&gt;ams15s32-in-f3\.1e100\.net&lt;BR /&gt;wdcp\.microsoft\.com&lt;BR /&gt;wns\.windows\.com&lt;BR /&gt;wdcpalt\.microsoft\.com&lt;BR /&gt;update\.microsoft\.com&lt;BR /&gt;download\.microsoft\.com&lt;BR /&gt;windowsupdate\.microsoft\.com&lt;BR /&gt;download\.windowsupdate\.com&lt;BR /&gt;wustat\.windows\.com&lt;BR /&gt;ntservicepack\.microsoft\.com&lt;BR /&gt;stats\.microsoft\.com&lt;BR /&gt;wns\.windows\.com&lt;BR /&gt;nexus\.officeapps\.live\.com&lt;BR /&gt;fe2\.update\.microsoft\.com&lt;BR /&gt;delivery\.mp\.microsoft\.com&lt;BR /&gt;vortex-win\.data\.microsoft\.com&lt;BR /&gt;cp601-prod\.do\.dsp\.mp\.microsoft\.com&lt;BR /&gt;geover-prod\.do\.dsp\.mp\.microsoft\.com&lt;BR /&gt;big\.telemetry\.microsoft\.com&lt;BR /&gt;ctldl\.windowsupdate\.com&lt;BR /&gt;audownload\.windowsupdate\.nsatc\.net&lt;BR /&gt;au\.download\.windowsupdate\.com\.hwcdn\.net&lt;BR /&gt;slscr\.update\.microsoft\.com&lt;BR /&gt;sfdataservice\.microsoft\.com&lt;BR /&gt;windowsupdate\.com&lt;BR /&gt;windows\.com&lt;BR /&gt;slscr\.update\.microsoft\.com&lt;BR /&gt;slscr\.update\.microosft\.com\.akadns\.net&lt;BR /&gt;v10\.events\.data\.microsoft\.com&lt;BR /&gt;v10\.event\.data\.microsoft\.com\.aria\.akadns\.net&lt;BR /&gt;onecollector\.cloudapp\.aria\.akadns\.net&lt;BR /&gt;fe2cr\.update\.microsoft\.com&lt;BR /&gt;fe2cr\.update\.microsoft\.com\.akadns\.net&lt;/P&gt;&lt;P&gt;Did you create a TAC on this issue?&lt;/P&gt;&lt;P&gt;Am I missing some host to get it to work?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;&amp;nbsp;do you have any experience with this issue?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2019 15:29:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61656#M84161</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-09-02T15:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61715#M84162</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9262"&gt;@Kim_Moberg&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;thank you for your reply. I didn't create any TAC yet; I just shared the problem here for finding any useful information before going to open a support ticket.&lt;/P&gt;&lt;P&gt;We have different behavior, depending on Windows 10 build version, but in all cases, they cannot access Windows Update services. I didn't find an official Microsoft documentation listing all URLs used by Software Updates, but only:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;A title="Windows 10, version 1903, connection endpoints for non-Enterprise editions" href="https://docs.microsoft.com/en-us/windows/privacy/windows-endpoints-1903-non-enterprise-editions" target="_blank" rel="noopener"&gt;Windows 10, version 1903, connection endpoints for non-Enterprise editions&lt;/A&gt;&amp;nbsp;(not only SU)&lt;/LI&gt;&lt;LI&gt;&lt;A title="Step 2: Configure WSUS" href="https://docs.microsoft.com/en-us/windows-server/administration/windows-server-update-services/deploy/2-configure-wsus" target="_blank" rel="noopener"&gt;Step 2: Configure WSUS&lt;/A&gt; (it is more related to WSUS)&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I tried to create a bypass rule containing all URLs listed in the article at point 2, but it doesn't work either.&lt;BR /&gt;Maybe creating a bypass rule containing IP address could solve the issue, but it isn't so flexible (they could change frequently).&lt;/P&gt;&lt;P&gt;At this point, if no other has a solution to this, I can proceed to open a TAC.&lt;/P&gt;&lt;P&gt;Bye,&lt;BR /&gt;Luca&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2019 13:09:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61715#M84162</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-03T13:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61750#M84163</link>
      <description>Update: I opened a TAC. I'll give you more information asap.</description>
      <pubDate>Tue, 03 Sep 2019 13:07:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/61750#M84163</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-03T13:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62895#M84164</link>
      <description>Do you have any update about this issue?</description>
      <pubDate>Mon, 16 Sep 2019 19:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62895#M84164</guid>
      <dc:creator>Leonardo_Tessar</dc:creator>
      <dc:date>2019-09-16T19:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62911#M84165</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/12944"&gt;@Leonardo_Tessar&lt;/a&gt;,&lt;BR /&gt;I have just a quick update regarding this issue (not yet solved).&lt;/P&gt;&lt;P&gt;First of all, support asked me to manual update the Trusted CA list; f&lt;SPAN&gt;or some reason, it wasn't up-to-date, even if the option "&lt;EM&gt;Notify when a Trusted CA and Blacklist update file is available for installation&lt;/EM&gt;" on SmartDashboard is selected:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;sk132812 steps 1 - 4 to force list update (if you have doubts that the list updated).&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Check the list at &amp;nbsp;/opt/CPshrd-R80.20/database/&lt;/SPAN&gt;&lt;SPAN&gt;downloads/TRUSTED_CA/2.0/2.3/&lt;/SPAN&gt;&lt;SPAN&gt;updateFile.zip is up to date&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Download the list to admin PC&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Upload it manually through SmartDashboard&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Install Policy&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;The updateFile.zip at point 2 doesn't update, file timestamp was old May 13 (a deep investigation will be needed). So they provide me the file via SFTP and after uploaded it manually on SmartDashboard (points 4 - 5), about 94 Trusted CA were updated and 3 removed. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;However, it didn't resolve the issue. I'm waiting for further steps.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Bye,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 06:40:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62911#M84165</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-17T06:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62921#M84166</link>
      <description>&lt;P&gt;Hi Luca&lt;/P&gt;&lt;P&gt;I also created a TAC and received the same step-by-step to update the root certificate list.&lt;/P&gt;&lt;P&gt;Still windows update services doesn't work after the suggested solution and waiting for R&amp;amp;D to update the next step.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 08:24:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62921#M84166</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-09-17T08:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62928#M84167</link>
      <description>An short update.&lt;BR /&gt;Check Point have managed to reproduce this issue in their labs and RnD currently working on it..&lt;BR /&gt;Looking forward to see an soon resolution on this issue. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Tue, 17 Sep 2019 09:38:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62928#M84167</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-09-17T09:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62930#M84168</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9262"&gt;@Kim_Moberg&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;thank you for the update.&lt;BR /&gt;I didn't get any feedback yet - maybe they are waiting for feedback from R&amp;amp;D.&lt;/P&gt;&lt;P&gt;Bye,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 09:46:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62930#M84168</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-17T09:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62942#M84169</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9262"&gt;@Kim_Moberg&lt;/a&gt;&amp;nbsp;When you used Wireshark did you only the client hello going and then a connection reset?&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can please try to enable the probe bypass feature to check if that solves the issue? You can enable this on the fly, try this on non business hour to avoid possible SNI issues&lt;/P&gt;&lt;P&gt;None of these commands requires a reboot or cpstop/cpstart&lt;BR /&gt;Enable on the fly&lt;BR /&gt;[Expert@HostName]# fw ctl set int enhanced_ssl_inspection 1&lt;BR /&gt;Disable on the fly&lt;BR /&gt;[Expert@HostName]# fw ctl set int enhanced_ssl_inspection 0&lt;/P&gt;&lt;P&gt;If it's not working it's maybe because probe bypass is working on fail close, you can change this to fail open with the following:&lt;BR /&gt;[Expert@HostName]#fw ctl set int bypass_on_enhanced_ssl_inspection 1&lt;BR /&gt;To change it back to normal:&lt;BR /&gt;[Expert@HostName]#fw ctl set int bypass_on_enhanced_ssl_inspection 0&lt;/P&gt;&lt;P&gt;If you want more information you can check&amp;nbsp;sk104717 - &lt;EM&gt;Improvements in HTTPS Inspection Bypass mechanism - Probe Bypass&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 12:45:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62942#M84169</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2019-09-17T12:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62955#M84170</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/28479"&gt;@FedericoMeiners&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;thank you for your feedback. I'll try this late evening.&lt;/P&gt;&lt;P&gt;Just to add this other information: before switching between probe bypass enabled/disabled on-the-fly, I usually clear the CN cache with command&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;fw tab -t cptls_server_cn_cache -x -y&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This to avoid any "false" results. The support suggested to me that command in an old ticket (related to Check Point R80.10).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Luca&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2019 13:33:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/62955#M84170</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-17T13:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63012#M84171</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we are replicate the issue and working with RnD to solve it, as current WA you will need to bypass the domains in the SSLi RB.&lt;/P&gt;
&lt;P&gt;This issue only happen on Windows 10 clients.&lt;/P&gt;
&lt;P&gt;i will update once we will have resolution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 07:52:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63012#M84171</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2019-09-18T07:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63013#M84172</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14307"&gt;@Ilya_Yusupov&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;thank you for your feedback.&lt;/P&gt;&lt;P&gt;I'm pretty ignorant, so, please, can you explain to me what "&lt;SPAN&gt;SSLi RB" means? I can imagine it has to do with SSL; some by-pass rule ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you again.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 08:01:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63013#M84172</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-18T08:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63016#M84173</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20373"&gt;@lucafabbri365&lt;/a&gt;&amp;nbsp; - i will contact you offline.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 08:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63016#M84173</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2019-09-18T08:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63071#M84174</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20373"&gt;@lucafabbri365&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14307"&gt;@Ilya_Yusupov&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R&amp;amp;D were able to reproduce this error and found out&amp;nbsp;&lt;SPAN&gt;Microsoft changed its servers to support only ECDSA cipher suites.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Firewall by default, does not propose ECDSA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You have to enabled ECDSA and update https_inspection_white_list.bin&lt;/P&gt;&lt;P&gt;Please contact TAC to get the solution. It worked for me on R80.20 AC&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 14:52:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63071#M84174</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-09-18T14:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63077#M84175</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9262"&gt;@Kim_Moberg&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;I received feedback from support with the same procedure.&lt;/P&gt;&lt;P&gt;I'll update you, here, asap.&lt;/P&gt;&lt;P&gt;Bye,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 15:35:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63077#M84175</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-18T15:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63079#M84176</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20373"&gt;@lucafabbri365&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good to hear.&lt;/P&gt;&lt;P&gt;You might experience the command cpstop;cpstart fails and your cluster sync dont work.&lt;/P&gt;&lt;P&gt;then go once again with cpstart and you cluster will be running again..&lt;/P&gt;&lt;P&gt;I experienced this on both members in my cluster after the update. So cpstart is way to go &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Let me know how the result is.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 15:40:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63079#M84176</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-09-18T15:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63081#M84177</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9262"&gt;@Kim_Moberg&lt;/a&gt;,&lt;BR /&gt;I was thinking, instead of cpstop and cpstart, to reboot each node.&lt;/P&gt;&lt;P&gt;However I'll try them at first.&lt;/P&gt;&lt;P&gt;Bye,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 15:49:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63081#M84177</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-18T15:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63084#M84178</link>
      <description>I assume there will be a public SK for this shortly ? so that everyone else knows what is going on?</description>
      <pubDate>Wed, 18 Sep 2019 16:12:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63084#M84178</guid>
      <dc:creator>Peter_Lyndley</dc:creator>
      <dc:date>2019-09-18T16:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Update Services with HTTPS inspection enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63118#M84179</link>
      <description>&lt;P&gt;Hello all,&lt;BR /&gt;just a quick update:&lt;/P&gt;&lt;P&gt;1. Into one Check Point node, we enabled &lt;STRONG&gt;ECDSA&lt;/STRONG&gt; and update &lt;STRONG&gt;https_inspection_white_list.bin&lt;/STRONG&gt; (as suggested by support)&lt;BR /&gt;2. Into the other node, we enabled &lt;STRONG&gt;ECDSA&lt;/STRONG&gt; only (as discussed and suggested by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14307"&gt;@Ilya_Yusupov&lt;/a&gt;, privately)&lt;/P&gt;&lt;P&gt;Both solutions seem to work. So it shouldn't need to replace *.bin file.&lt;/P&gt;&lt;P&gt;I'm waiting for confirmation.&lt;/P&gt;&lt;P&gt;Bye,&lt;BR /&gt;Luca&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 06:56:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Windows-Update-Services-with-HTTPS-inspection-enabled/m-p/63118#M84179</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2019-09-19T06:56:35Z</dc:date>
    </item>
  </channel>
</rss>

