<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zoom, HTTPS inspection and performance in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98095#M19200</link>
    <description>&lt;P&gt;We expect that Zoom will be using a lot.&amp;nbsp; We have proxy server behind the Gateway that user use so they have to be routed through the gateway. At this moment on the VPN clients&amp;nbsp; / Remote Access bookmark on the firewall it is marked "Allow VPN clients to route traffic through this gateway". How can I exclude only Zoom traffic from being routed through VPN gateway ?&lt;/P&gt;</description>
    <pubDate>Fri, 02 Oct 2020 15:41:36 GMT</pubDate>
    <dc:creator>marcinw</dc:creator>
    <dc:date>2020-10-02T15:41:36Z</dc:date>
    <item>
      <title>Zoom, HTTPS inspection and performance</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98091#M19198</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Owing to Covid19 many users in my network have moved to VPN remote access, many of them use ZOOM for videoconferences, I am wondering from security point of view if it is ok I if exclude this traffic from HTTPS inspection to increase the performance of the firewall&amp;nbsp; (checkpoint 5100) ? Second question will it increase the performance significantly, is it worth to do that ? Any opinions welcome&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 14:33:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98091#M19198</guid>
      <dc:creator>marcinw</dc:creator>
      <dc:date>2020-10-02T14:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zoom, HTTPS inspection and performance</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98092#M19199</link>
      <description>&lt;P&gt;Most certainly it will improve performance, by how much depends on how much Zoom is used.&lt;BR /&gt;What would increase your performance even more is not "routing all traffic" through the VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 15:26:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98092#M19199</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-02T15:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: Zoom, HTTPS inspection and performance</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98095#M19200</link>
      <description>&lt;P&gt;We expect that Zoom will be using a lot.&amp;nbsp; We have proxy server behind the Gateway that user use so they have to be routed through the gateway. At this moment on the VPN clients&amp;nbsp; / Remote Access bookmark on the firewall it is marked "Allow VPN clients to route traffic through this gateway". How can I exclude only Zoom traffic from being routed through VPN gateway ?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 15:41:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98095#M19200</guid>
      <dc:creator>marcinw</dc:creator>
      <dc:date>2020-10-02T15:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: Zoom, HTTPS inspection and performance</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98099#M19202</link>
      <description>&lt;P&gt;You’d have to create an encryption domain that includes everything but Zoom IPs.&lt;BR /&gt;There are scripts that do this for Office 365 here: &amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167000" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167000&lt;/A&gt;&lt;BR /&gt;I imagine they could be adapted for Zoom also.&lt;/P&gt;
&lt;P&gt;But like I said, I’m not a fan of “Route All Traffic” anyway.&lt;BR /&gt;There are better solutions that protect the endpoints even when they are not connected to VPN.&lt;BR /&gt;This is why we include Remote Access VPN as part of SandBlast Agent.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2020 16:16:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Zoom-HTTPS-inspection-and-performance/m-p/98099#M19202</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-02T16:16:23Z</dc:date>
    </item>
  </channel>
</rss>

