<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Updates Blocked Without Firewall Log in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61269#M12409</link>
    <description>&lt;P&gt;Heiko, I'm not seeing how your responses or the doc pertain to my questions.&lt;/P&gt;&lt;P&gt;To be more specific: why, when I had "Drop traffic from servers with: Untrusted server certificate" unchecked, was the traffic being blocked (without a block log) when machines tried to access Windows Updates without updated "Trusted CAs"?&lt;/P&gt;&lt;P&gt;This is not due to applications "certificate pinning" as after updating the Trusted CAs in Check Point, everything started working as expected.&lt;/P&gt;</description>
    <pubDate>Mon, 26 Aug 2019 18:49:09 GMT</pubDate>
    <dc:creator>B_P</dc:creator>
    <dc:date>2019-08-26T18:49:09Z</dc:date>
    <item>
      <title>Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60757#M12314</link>
      <description>&lt;P&gt;HTTPS Inspection logs an inspect&lt;/P&gt;&lt;P&gt;IPS logs a detect&lt;/P&gt;&lt;P&gt;Firewall logs nothing&lt;/P&gt;&lt;P&gt;Client gets a "couldn't connect" error&lt;/P&gt;&lt;P&gt;tcpdump &amp;amp; fwmon shows some communication&lt;/P&gt;&lt;P&gt;HTTPS Inspection has "Bypass HTTPS ... for software update services" checked&lt;/P&gt;&lt;P&gt;R80.30&lt;/P&gt;&lt;P&gt;?????&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 15:42:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60757#M12314</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2019-08-20T15:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60759#M12315</link>
      <description>&lt;P&gt;Well, maybe you should start by providing more information besides the things that you can't see.&lt;/P&gt;&lt;P&gt;Which rule does allow the connection to the Windows update servers? Which blades are being used?&lt;/P&gt;&lt;P&gt;In addition to that, if you really shouldn't see anything at all and for the case where you are sure that the traffic is actually reaching the gateway try "fw ctl zdebug + drop | grep &amp;lt;source_ip&amp;gt;".&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 16:08:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60759#M12315</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-08-20T16:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60761#M12316</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23736"&gt;@Maik&lt;/a&gt;App &amp;amp; URL blades are active as well. As I mentioned earlier tcpdump and fwmon show traffic (reaching the gateway and even the destination internet server responding).&lt;/P&gt;&lt;P&gt;tcpdump does not show any drops for the traffic.&lt;/P&gt;&lt;P&gt;The firewall rule that allows it is a rule that allows http/https traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2019 16:30:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60761#M12316</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2019-08-20T16:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60802#M12327</link>
      <description>&lt;P&gt;Did you confirm whether...&lt;/P&gt;&lt;P&gt;&amp;gt; the rule actually gets hits when this traffic is initiated (maybe a different rule gets used) [verify with logging ...]?&lt;/P&gt;&lt;P&gt;&amp;gt; the inbound and outbound traffic, that you already captured, looks the same or if some parts are missing (maybe IPS is kicking in)?&lt;/P&gt;&lt;P&gt;&amp;gt; what does "fw ctl zdebug + drop | grep &amp;lt;src ip&amp;gt;" show? Can you confirm any drops, related to this traffic, at all?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 06:14:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60802#M12327</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-08-21T06:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60880#M12350</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23736"&gt;@Maik&lt;/a&gt;the problem is the logging -- there is none with the Firewall. Only the HTTPS Inspection and IPS Inspection show logs (IPS is detect only).&lt;/P&gt;&lt;P&gt;The inbound/outbound traffic looks fine but it doesn't show up in the log.&lt;/P&gt;&lt;P&gt;zdebug drop does not show any drops for the traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 16:13:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60880#M12350</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2019-08-21T16:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60917#M12358</link>
      <description>&lt;P&gt;Well I guess logging is enabled? Its quite hard to give any advice regarding an issue if no information about the config and only what does not work is present. Maybe you can share screenshots of related rules (obfuscated if required).&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 06:46:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60917#M12358</guid>
      <dc:creator>Maik</dc:creator>
      <dc:date>2019-08-22T06:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60989#M12374</link>
      <description>&lt;P&gt;Yes, logging is enabled.&lt;/P&gt;&lt;P&gt;HTTPS Inspection shows "Untrusted Certificate" in the log. However, "Drop traffic from servers with: Untrusted server certificate" is unchecked under HTTPS Inspection &amp;gt; HTTPS Validation. But, it appears the HTTPS Inspection isn't actually doing that -- rather it is in fact dropping the traffic or not handling it properly.&lt;/P&gt;&lt;P&gt;In the end, it was resolved by updating the Trusted CAs that don't automatically update for some reason.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 21:45:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/60989#M12374</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2019-08-22T21:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61264#M12406</link>
      <description>&lt;P&gt;Can anyone explain why the firewall is behaving this way? HTTPS Inspection has "Drop traffic from servers with: Untrusted server certificate" &lt;EM&gt;unchecked&lt;/EM&gt;. Why was it blocked and why was there not a log saying it was blocked?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 15:40:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61264#M12406</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2019-08-26T15:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61267#M12407</link>
      <description>&lt;DIV class="solutionEditableField"&gt;
&lt;P&gt;After enabling HTTPS Inspection on the Security Gateway, some resources that use HTTPS protocol (like Microsoft Lync) fail to connect.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="solutionFieldDiv cp_h2_black"&gt;Cause&lt;/DIV&gt;
&lt;DIV class="solutionEditableField cp_text"&gt;
&lt;P&gt;There are two main scenarios, which can cause this kind of problem:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Inspect Rule&lt;/EM&gt;:&lt;/STRONG&gt; In the HTTPS Inspection policy, there is a rule related to the application, which specifies that it should be inspected.&amp;nbsp; In this case, the application might fail the connection because HTTPS Inspection presents its own certificate (instead of the original site's certificate), which is signed by a dedicated CA.&amp;nbsp; For browsers like Google Chrome and Internet Explorer, it is possible to make them trust the Security Gateway's CA certificate, but for some user applications this is problematic, or even impossible. &lt;BR /&gt;&lt;BR /&gt;Currently, there is no solution besides bypassing the application as described below in the &lt;STRONG&gt;Solution&lt;/STRONG&gt; section.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Bypass Rule&lt;/EM&gt;:&lt;/STRONG&gt; In the HTTPS Inspection policy, there is a category-based rule related to the application, which specifies that it should be bypassed.&amp;nbsp; Currently, in order to bypass a site, HTTPS Inspection must know, which IP address is used by the site, so it can decide whether to inspect it or not. The correlation between the site's URL and its IP address is done on the first connection. The bypass mechanism is based on inspecting the site once and saving the IP address in the cache for bypassing it the next time a connection is opened to the same destination. Some user applications may fail to connect the first time due to attempted HTTPS inspection. The application should connect on the second attempt once the HTTPS bypass is in place. &lt;BR /&gt;&lt;BR /&gt;If an error occurs during the SSL handshake, the Bypass based on categories will not work, the site will not be saved as bypassed and it will continue to be inspected. In such case, the application will always fail the connection.&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;More read here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108202" target="_self"&gt;Best Practices - HTTPS Inspection&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 18:39:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61267#M12407</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-08-26T18:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61268#M12408</link>
      <description>&lt;P&gt;Several HTTPS web sites and applications might not work properly when HTTPS Inspection is enabled on Security Gateway.&lt;/P&gt;
&lt;P&gt;More read here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112214" target="_self"&gt;sk112214&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 18:31:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61268#M12408</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-08-26T18:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Updates Blocked Without Firewall Log</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61269#M12409</link>
      <description>&lt;P&gt;Heiko, I'm not seeing how your responses or the doc pertain to my questions.&lt;/P&gt;&lt;P&gt;To be more specific: why, when I had "Drop traffic from servers with: Untrusted server certificate" unchecked, was the traffic being blocked (without a block log) when machines tried to access Windows Updates without updated "Trusted CAs"?&lt;/P&gt;&lt;P&gt;This is not due to applications "certificate pinning" as after updating the Trusted CAs in Check Point, everything started working as expected.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2019 18:49:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Windows-Updates-Blocked-Without-Firewall-Log/m-p/61269#M12409</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2019-08-26T18:49:09Z</dc:date>
    </item>
  </channel>
</rss>

