<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Https Inspection on R80.40 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Https-Inspection-on-R80-40/m-p/125885#M23197</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;it will only be applied according to the HTTPS Inspection Policy. So if you create an any --&amp;gt; any bypass no traffic will be inspected. You can then create a rule only for the desired source --&amp;gt; destination as you would in any normal access control rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Marcel&lt;/P&gt;</description>
    <pubDate>Fri, 06 Aug 2021 15:10:24 GMT</pubDate>
    <dc:creator>Marcel_Gramalla</dc:creator>
    <dc:date>2021-08-06T15:10:24Z</dc:date>
    <item>
      <title>Https Inspection on R80.40</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Https-Inspection-on-R80-40/m-p/125873#M23193</link>
      <description>&lt;P&gt;I am looking to enable https inspection on my R80.40 Cluster.. however i want to enable inspection only for a particular source -&amp;gt; destination...my query is that if i enable https inspection on the Gateways then is inspection applied on only that traffic which is defined in https inspection policy ? or all the traffic starts getting inspected once the option is enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 11:26:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Https-Inspection-on-R80-40/m-p/125873#M23193</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2021-08-06T11:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on R80.40</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Https-Inspection-on-R80-40/m-p/125885#M23197</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;it will only be applied according to the HTTPS Inspection Policy. So if you create an any --&amp;gt; any bypass no traffic will be inspected. You can then create a rule only for the desired source --&amp;gt; destination as you would in any normal access control rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Marcel&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 15:10:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Https-Inspection-on-R80-40/m-p/125885#M23197</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2021-08-06T15:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on R80.40</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Https-Inspection-on-R80-40/m-p/125895#M23199</link>
      <description>&lt;P&gt;The any any bypass rule at the bottom of the HTTPS Inspection policy is also best practice.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 16:51:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Https-Inspection-on-R80-40/m-p/125895#M23199</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-06T16:51:10Z</dc:date>
    </item>
  </channel>
</rss>

