<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Any workaround for this in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74906#M15170</link>
    <description>&lt;P&gt;Currently our Guestnet (for Wifi) cannot stops people from accessing “naughty” HTTPS websites because the checkpoint can’t decrypt the outbound HTTPS traffic from non-corporate devices.&lt;/P&gt;&lt;P&gt;Is there any way to get around this problem? As manually forcing guest users to install our Checkpoint certificate is not feasible / not enforceable, what other options do we have? (reading my mind out aloud, if we upgrade our GWs to R80.20, will SNI fix / bypass this issue so the URL inspection / categorization can be used?)&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Hunt&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2020 04:07:59 GMT</pubDate>
    <dc:creator>HUNT_LEE</dc:creator>
    <dc:date>2020-02-12T04:07:59Z</dc:date>
    <item>
      <title>Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74906#M15170</link>
      <description>&lt;P&gt;Currently our Guestnet (for Wifi) cannot stops people from accessing “naughty” HTTPS websites because the checkpoint can’t decrypt the outbound HTTPS traffic from non-corporate devices.&lt;/P&gt;&lt;P&gt;Is there any way to get around this problem? As manually forcing guest users to install our Checkpoint certificate is not feasible / not enforceable, what other options do we have? (reading my mind out aloud, if we upgrade our GWs to R80.20, will SNI fix / bypass this issue so the URL inspection / categorization can be used?)&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Hunt&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 04:07:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74906#M15170</guid>
      <dc:creator>HUNT_LEE</dc:creator>
      <dc:date>2020-02-12T04:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74907#M15171</link>
      <description>Either upgrade to R80.20 with the recent JHF that has the SNI fix or use R80.30+ which also includes it.</description>
      <pubDate>Wed, 12 Feb 2020 04:13:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74907#M15171</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-12T04:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74912#M15172</link>
      <description>&lt;P&gt;Adding to what PhoneBoy wrote you can also refer to&amp;nbsp;&lt;SPAN&gt;sk163594 -&amp;nbsp;What's new in HTTPS Inspection starting from R80.20:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk163594" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk163594&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;Starting in R80.20 and R80.30&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;latest&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Jumbo Hotfix Accumulators, HTTPS Inspection offers important new features in the domains of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;security&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;usability&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To take advantage of these new capabilities, upgrade to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk137592" target="_blank" rel="noopener"&gt;R80.20 Jumbo Hotfix Accumulator Take 118&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(and higher), or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk153152" target="_blank" rel="noopener"&gt;R80.30 Jumbo Hotfix Accumulator Take 111&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(and higher)."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 07:07:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74912#M15172</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2020-02-12T07:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74915#M15173</link>
      <description>&lt;P&gt;Hunt_Lee,&lt;/P&gt;
&lt;P&gt;you're right, as&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;mentioned SNI with URL-Filter is your solution without HTTPS-inspection.&lt;/P&gt;
&lt;P&gt;Don't forget to enable "categorize HTTPS websites"&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="APPCL_HTTPS.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4410i52779A0457A93D19/image-size/medium?v=v2&amp;amp;px=400" role="button" title="APPCL_HTTPS.png" alt="APPCL_HTTPS.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 07:14:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/74915#M15173</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-02-12T07:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75057#M15198</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;If i install a public CA certificate (e.g. Verisign, GoDaddy) onto my CheckPoint, and change all the outbound rules to used this new certificate for outbound traffic.&lt;/P&gt;&lt;P&gt;Would then my guest users traffic be able to be inspected by CheckPoint? Or would they still need to install this CA certificate manually by themselves (which is not enforceable).&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Hunt&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 05:15:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75057#M15198</guid>
      <dc:creator>HUNT_LEE</dc:creator>
      <dc:date>2020-02-13T05:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75059#M15199</link>
      <description>&lt;P&gt;Yes, that's possible. If you use an SUB-CA issued from a root CA which is trusted by your client devices everything would be fine.&lt;/P&gt;
&lt;P&gt;Any certificate issued from a trusted CA or trusted sub CA will be trusted on you clients. All depends on the trusted root CAs on your clients. You can use the defaults from Windows, Linux, MACs, Android, IOS etc. already installed on your clients or you can install your own. But with your own you have to touch these devices.&lt;/P&gt;
&lt;P&gt;Wolfgang.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 06:27:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75059#M15199</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-02-13T06:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75203#M15238</link>
      <description>No globally trusted Certificate Authority would issue you a sub-CA for this purpose.&lt;BR /&gt;Any time such certificates do manage to get out in the wild, they tend to get banned fairly quickly and generate bad press for the organizations involved.</description>
      <pubDate>Thu, 13 Feb 2020 19:41:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75203#M15238</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-13T19:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75219#M15243</link>
      <description>No Verisign or GoDaddy alike company will give you a Sub CA as that would mean you do not need them anymore to generate certificates.&lt;BR /&gt;Most often used Sub-CA is from a Microsoft Certificate server. All Windows machines that trust your AD will also trust that Certificate.&lt;BR /&gt;&lt;BR /&gt;The Guest users still need to trust your AD - CA, or you need to bypass their traffic from HTTPS decryption, based on source network.</description>
      <pubDate>Thu, 13 Feb 2020 22:09:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75219#M15243</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-02-13T22:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75222#M15246</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;If i have a&amp;nbsp;*.mycompany.com.au certificate issued by Digicert, can i use this certificate as wouldn't the public users trusted the cert issued by a CA like Digicert?&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Hunt&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 22:55:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75222#M15246</guid>
      <dc:creator>HUNT_LEE</dc:creator>
      <dc:date>2020-02-13T22:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75225#M15247</link>
      <description>The certificate used must be a Certificate Authority certificate capable of signing certificates.&lt;BR /&gt;What you have is a wildcard certificate, which cannot be used for outbound HTTPS Inspection.</description>
      <pubDate>Thu, 13 Feb 2020 23:52:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75225#M15247</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-13T23:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: Any workaround for this</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75240#M15249</link>
      <description>&lt;P&gt;Hunt,&lt;/P&gt;
&lt;P&gt;I very much apologize for misunderstanding my writing. Yes, the guys here are really right, you can't by such SUB-CA.&lt;/P&gt;
&lt;P&gt;I have one customer they did this, but they are the owner of one of these Root-CAs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17364"&gt;@Maarten_Sjouw&lt;/a&gt;&amp;nbsp;mentioned you have to follow their suggestions and implement your owned Sub-CA.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2020 07:10:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Any-workaround-for-this/m-p/75240#M15249</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-02-14T07:10:39Z</dc:date>
    </item>
  </channel>
</rss>

