<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection Probe Bypass: To enable or not to enable? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22880#M4540</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Following Arron's question and having read and re-read&amp;nbsp;&lt;A _jive_internal="true" data-userid="45360" data-username="awilk99fbe18d-5cf1-4543-9936-535b8747c024" href="https://community.checkpoint.com/people/awilk99fbe18d-5cf1-4543-9936-535b8747c024" style="color: #e45785; background-color: #ffffff; border: 0px; font-weight: 200; text-decoration: underline; font-size: 1.286rem;"&gt;Albert Wilkes&lt;/A&gt;'s excellent document. I had both the requirement and inclination to carry out testing on my own test systems and then over the last four months on various live sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The attached&amp;nbsp;10 page document contains my findings and the relevant technicalities. The introduction and summary are clear:&lt;STRONG&gt; in almost all cases, disabling probe bypass made things a LOT better! That said, there are factors that can obfuscate this universally (in&amp;nbsp;my experiences) positive result until they are addressed.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My document uses various test sites (13 in the first instance) and one of those, Skype gets a good four or five pages of the document. Summary: I now have Skype working well on a number of sites with HTTPS enabled on those computers using URL based bypasses only (no IP address or ranges).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will also be posting this in the main thread about getting Skype to work with HTTPS inspection enabled, these two things being so inextricably linked I could not separate them in to two documents.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My document and the CSV file with the URLs for Skype are available in the 'Documents section of 'GeneralProductTopics' - The document is named 'Making Skype work properly with HTTPS inspection enabled coupled with To Probe Bypass or Not To Probe Bypass 1oct18' and the current CSV is&amp;nbsp;SkypeURLs Version 2.3 August 2018.csv.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Sep 2018 11:52:16 GMT</pubDate>
    <dc:creator>John_Fenoughty</dc:creator>
    <dc:date>2018-09-14T11:52:16Z</dc:date>
    <item>
      <title>HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22864#M4524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've heard&amp;nbsp;of mixed results on probe bypass for HTTPS Inspection and I wanted to get feedback.&amp;nbsp; To me, it seems like this is a better way of deploying HTTPS Inspection to minimize problems with bypassing traffic from inspection, but it is not something that's enabled by default which makes it seem like it should only be used if necessary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know of probe bypass causing more issues than it solves?&amp;nbsp; Or vice versa?&amp;nbsp; I know one solution doesn't fit all environments, but I'm wondering if there is a recommendation one way or another.&amp;nbsp; To me, I think it's something that is better enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the SK:&amp;nbsp;&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104717&amp;amp;partition=General&amp;amp;product=HTTPS" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104717&amp;amp;partition=General&amp;amp;product=HTTPS"&gt;HTTPS Inspection Enhancements in R77.30 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aaron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 19:53:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22864#M4524</guid>
      <dc:creator>Aaron_Vivadelli</dc:creator>
      <dc:date>2018-01-11T19:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22865#M4525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Aaron,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Probe Bypass should be enabled if the legislation in your country prevent you from inspecting some traffic (banking and financial categories mainly) using HTTPS inspection. In this case, you bypass HTTPS inspection for those categories and you enable Probe Bypass to avoid that the first packet of the connection is still HTTPS inspected despite your policy. And how is the HTTPS site categorized without HTTPS inspection and with Probe Bypass enabled ? Well, you may use the 'categorize HTTPS websites' functionality but there are limitations (sites using Wilcard certificates, UserCheck). See sk92743 for more details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 11:05:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22865#M4525</guid>
      <dc:creator>Alain_Ikula</dc:creator>
      <dc:date>2018-01-12T11:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22866#M4526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for responding Alain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I work for a US based VAR&amp;nbsp;and&amp;nbsp;perform many&amp;nbsp;integrations for our customers of all CP products.&amp;nbsp; All of my customers are sensitive about decrypting financial and healthcare related sites, which is why I&amp;nbsp;feel probe bypass is a good thing to implement at all my customers.&amp;nbsp; I wanted to get feedback from others though because I heard varying recommendations surrounding if this feature causes more problems than benefits.&amp;nbsp; I think there have been a number of fixes in recent JHFs though (at least for R77.30).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually I like to deploy HTTPS Inspection with a gradual approach (even recommended in the HTTPS Inspection Best Practices SK), but bypassing rules are theoretically ineffective without Probe Bypass enabled since the first packet is still decrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess I'm looking to see if anyone has had specific issues with Probe Bypass enabled where they were better off turning it off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aaron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jan 2018 15:08:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22866#M4526</guid>
      <dc:creator>Aaron_Vivadelli</dc:creator>
      <dc:date>2018-01-12T15:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22867#M4527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've tried it a couple times and always end up disabling it because there are too many incompatibilities.&amp;nbsp; The biggest one is outlined in sk104717:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Limitations of HTTPS Inspection Bypass Mechanism &lt;EM&gt;with enabled&lt;/EM&gt; Probe Bypass:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;HTTPS Inspection will not work for sites that require SNI extension in the SSL "Client hello" packet.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It really is a shame because I too do not want to be inspecting people's traffic.&amp;nbsp; I only want to prevent them from going to specific domains.&amp;nbsp; So far this seems to be impossible with checkpoint as https categorization is also flawed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2018 16:09:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22867#M4527</guid>
      <dc:creator>Matt_Snead</dc:creator>
      <dc:date>2018-01-16T16:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22868#M4528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may want to use the App Control Signature Tool in this case.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103051" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103051"&gt;Signature Tool for custom Application Control and URL Filtering applications&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2018 23:48:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22868#M4528</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-16T23:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22869#M4529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you explain where this would help or which of Matt's statements your suggestion refers to (categorization, probe bypass?)? Are you saying you can (or have to) use the &lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;App Control Signature Tool to create a (non-IP based) pattern to bypass&amp;nbsp;&lt;/SPAN&gt;websites that require SNI even if probe bypass is enabled? My customer found that he can only do a bypass by IP which is also mentioned in&amp;nbsp;sk112066 which is why I am evaluating to disable probe bypass and use the CP as a proxy which&amp;nbsp;should improve things as per the bottom section of&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk92888&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2018 15:53:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22869#M4529</guid>
      <dc:creator>Albert_Wilkes</dc:creator>
      <dc:date>2018-03-14T15:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22870#M4530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically what you're doing is creating an App Control Signature that is looking for the SNI.&lt;/P&gt;&lt;P&gt;It does not solve the Probe Bypass issue, but it does give you a way to allow access to specific websites without being required to enable HTTPS Inspection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2018 19:54:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22870#M4530</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-14T19:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22871#M4531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I’m confused... probe bypass is an enhancement to https inspection. What do you mean by, “without being required to enable https inspection?” &amp;nbsp;Are you referring to people who don’t use https inspection at all? &amp;nbsp;In which case your solution is simply one to allow a blocked https site through? &amp;nbsp;E.g. nothing to do with https inspection or probe bypass, per say? &amp;nbsp;Pretty sure that’s not what this thread was about.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2018 02:16:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22871#M4531</guid>
      <dc:creator>Matt_Snead</dc:creator>
      <dc:date>2018-03-15T02:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22872#M4532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My comment was in response to this statement you made above:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;It really is a shame because I too do not want to be inspecting people's traffic.&amp;nbsp; I only want to prevent them from going to specific domains.&amp;nbsp;&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If you don't want to be inspecting people's traffic (i.e. enable HTTPS Inspection) but want a way to prevent people from going to specific domains...you can create a custom signature for those domains.&lt;/P&gt;&lt;P&gt;This does not require enabling HTTPS Inspection&amp;nbsp;at all (and thus not needing probe bypass).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that clarifies things.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2018 05:37:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22872#M4532</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-15T05:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22873#M4533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Сan someone explain me the principle of Probe Bypass work?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 11:08:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22873#M4533</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-05-11T11:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22874#M4534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Limitations of HTTPS Inspection Bypass Mechanism&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;without&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Probe Bypass:&lt;/P&gt;&lt;UL style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;LI&gt;Every first connection to a site is inspected even if it should have been bypassed according to the policy.&lt;/LI&gt;&lt;LI&gt;Non-Browser Applications connections are dropped when HTTPS Inspection is enabled (even if bypass is configured).&lt;/LI&gt;&lt;LI&gt;Client certificate connections are dropped when HTTPS Inspection is enabled (even if bypass is configured).&lt;/LI&gt;&lt;/UL&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Improvements introduced by Probe Bypass:&lt;/P&gt;&lt;UL style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;LI&gt;Bypass mechanism was improved to better reflect policy and resolve the above limitations:&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;Stop the inspection of the first connection to bypassed sites.&lt;/LI&gt;&lt;LI&gt;Allow bypass of Non-Browser Applications connections.&lt;/LI&gt;&lt;LI&gt;Allow Bypass of connections to servers that require client certificate.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;New probing mechanism eliminates the need to inspect the first connection to an IP address unless it is required by the policy.&lt;/LI&gt;&lt;/UL&gt;&lt;P style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Limitations of HTTPS Inspection Bypass Mechanism&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;with enabled&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Probe Bypass:&lt;/P&gt;&lt;UL style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;LI&gt;HTTPS Inspection will not work for sites that require SNI extension in the SSL "Client hello" packet.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104717" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104717"&gt;HTTPS Inspection Enhancements in R77.30 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2018 14:24:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22874#M4534</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-11T14:24:23Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22875#M4535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my article might&amp;nbsp;a bit of insight into the technicalities of probe bypass. In short probe bypass opens a connection to the server based on the destination even before taking the decision on whether to bypass the inspection or not. A single SYN request on the client to fw side is sufficient to start an SSL negotiation on the fw to server side as can be seen in the case where it breaks when SNI is required&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/7621"&gt;HTTPS inspection real life examples and caveats in R77.30&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2018 08:31:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22875#M4535</guid>
      <dc:creator>Albert_Wilkes</dc:creator>
      <dc:date>2018-05-14T08:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22876#M4536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reply. I understand limitations and improvements, but I want to understand the mechanism of probe bypass work. How is the bypass done if the connection is not inspected?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2018 19:55:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22876#M4536</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-05-15T19:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22877#M4537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Read the article &lt;A href="https://community.checkpoint.com/migrated-users/45360"&gt;Albert Wilkes&lt;/A&gt;‌ linked above, it shows what happens when enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2018 20:06:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22877#M4537</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-15T20:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22878#M4538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please read my update below. It starts a probe / ssl negotiation to the destination before it even responds to the client with a SYN/ACK. Let me know&amp;nbsp;in case there are any questions after reading the below and linked article&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 May 2018 08:48:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22878#M4538</guid>
      <dc:creator>Albert_Wilkes</dc:creator>
      <dc:date>2018-05-16T08:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22879#M4539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great work! Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2018 07:47:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22879#M4539</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-05-17T07:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22880#M4540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Following Arron's question and having read and re-read&amp;nbsp;&lt;A _jive_internal="true" data-userid="45360" data-username="awilk99fbe18d-5cf1-4543-9936-535b8747c024" href="https://community.checkpoint.com/people/awilk99fbe18d-5cf1-4543-9936-535b8747c024" style="color: #e45785; background-color: #ffffff; border: 0px; font-weight: 200; text-decoration: underline; font-size: 1.286rem;"&gt;Albert Wilkes&lt;/A&gt;'s excellent document. I had both the requirement and inclination to carry out testing on my own test systems and then over the last four months on various live sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The attached&amp;nbsp;10 page document contains my findings and the relevant technicalities. The introduction and summary are clear:&lt;STRONG&gt; in almost all cases, disabling probe bypass made things a LOT better! That said, there are factors that can obfuscate this universally (in&amp;nbsp;my experiences) positive result until they are addressed.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My document uses various test sites (13 in the first instance) and one of those, Skype gets a good four or five pages of the document. Summary: I now have Skype working well on a number of sites with HTTPS enabled on those computers using URL based bypasses only (no IP address or ranges).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will also be posting this in the main thread about getting Skype to work with HTTPS inspection enabled, these two things being so inextricably linked I could not separate them in to two documents.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My document and the CSV file with the URLs for Skype are available in the 'Documents section of 'GeneralProductTopics' - The document is named 'Making Skype work properly with HTTPS inspection enabled coupled with To Probe Bypass or Not To Probe Bypass 1oct18' and the current CSV is&amp;nbsp;SkypeURLs Version 2.3 August 2018.csv.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2018 11:52:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22880#M4540</guid>
      <dc:creator>John_Fenoughty</dc:creator>
      <dc:date>2018-09-14T11:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22881#M4541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great post, thanks for sharing.&amp;nbsp; Checkpoint really needs to get their S together and keep on top of changing technologies if they want to keep customers.&amp;nbsp; Their security practices are top-notch, but their general filtering/inspection policies are way behind.&amp;nbsp; Couple that with the many issues with emerging SSL ciphers/elliptical curves and it's becoming an common nuisance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2018 13:26:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22881#M4541</guid>
      <dc:creator>Matt_Snead</dc:creator>
      <dc:date>2018-09-14T13:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22882#M4542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for putting this together!&lt;/P&gt;&lt;P&gt;It'd be great if you could upload this as a document to &lt;A href="https://community.checkpoint.com/space/2030"&gt;General Product Topics&lt;/A&gt;‌, which will make it easier to find.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2018 14:38:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22882#M4542</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-14T14:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass: To enable or not to enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22883#M4543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the extensive explanation of the Probe Bypass feature. I have created the Application/Site Group with all the Skype related objects, but when I try to use this object&amp;nbsp;in the https inspection policy under "Site Category", I get the following error:&lt;/P&gt;&lt;P&gt;"HTTPS Inspection: rule 1. In 'Site Category' column,&amp;nbsp; applications or groups with applications are not supported."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Oct 2018 09:31:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-To-enable-or-not-to-enable/m-p/22883#M4543</guid>
      <dc:creator>Marcel_Wildenbe</dc:creator>
      <dc:date>2018-10-01T09:31:39Z</dc:date>
    </item>
  </channel>
</rss>

