<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enforcing TLS level with Inbound HTTPS Inspection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277110#M46194</link>
    <description>&lt;P&gt;Good Catch, indeed it is T183.&lt;/P&gt;
&lt;P&gt;Gateways are slated for upgrade to R82 in the next month - I will definitely make a note to see if the findings are still valid.&lt;/P&gt;</description>
    <pubDate>Tue, 19 May 2026 13:28:27 GMT</pubDate>
    <dc:creator>Ruan_Kotze</dc:creator>
    <dc:date>2026-05-19T13:28:27Z</dc:date>
    <item>
      <title>Enforcing TLS level with Inbound HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277102#M46190</link>
      <description>&lt;P&gt;Good Day,&lt;/P&gt;
&lt;P&gt;I have an interesting scenario and my research is giving me conflicting answers.&lt;/P&gt;
&lt;P&gt;I am publishing a webserver through an R81.10 T190 gateway (Managed by an R82 SMS).&amp;nbsp; Inbound HTTPS inspection has been configured and is working well.&amp;nbsp; There is one interesting aspect to my the https inspection rulebase.&amp;nbsp; The webserver has a single IP but hosts multiple websites sitting on different domains (thus I cannot make use of wildcard certificates).&amp;nbsp; In order to get inspection working I've had to add a custom application definition to the the inspection policy, like so:&lt;/P&gt;
&lt;DIV id="tinyMceEditorRuan_Kotze_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditorRuan_Kotze_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditorRuan_Kotze_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-05-19 142557.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34262iF48C0912ABC21AF0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2026-05-19 142557.png" alt="Screenshot 2026-05-19 142557.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;This works well and allows me to inspect all sites.The backend webserver is hardened and configured to reject all TLS versions below 1.2.&lt;/P&gt;
&lt;P&gt;My challenge is as soon as I enable inspection security scanners flag the sites as accepting connections TLS 1.0 and higher.&lt;/P&gt;
&lt;P&gt;Here is where things get curious - running cipher_util and selecting SSL Inspection is only showing me TLS 1.2 and TLS 1.3 ciphers.&amp;nbsp; In the old days we could set the&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;ssl_min_ver&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp; using GuiDBedit, but I believe that has been deprecated. For what it's worth the setting there is TLS1.0 and TLS1.2 for ssl_min_ver and ssl_max_ver respectively.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Why would my gateway be offering these deprecated ciphers (considering it's disabled on the back-end site), and how to correct it?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;BR /&gt;Ruan&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 12:55:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277102#M46190</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2026-05-19T12:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing TLS level with Inbound HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277104#M46191</link>
      <description>&lt;P&gt;Quick Update,&lt;/P&gt;
&lt;P&gt;3 new datapoints:&lt;BR /&gt;The gateways still obeys the&amp;nbsp;ssl_min_ver parameter. I raised the min_ver to 1.1 and this reflected in my scan result.&lt;BR /&gt;Conversely, ssl_max_ver is not obeyed. Despite it set to 1.2 (no option exists for 1.3) scans correctly show the website as offering 1.3&lt;BR /&gt;Setting the access policy Service to TLS1.2 (as opposed to HTTPS) surprisingly has no impact on scan result.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Ruan&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 13:15:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277104#M46191</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2026-05-19T13:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing TLS level with Inbound HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277109#M46193</link>
      <description>&lt;P&gt;please share correct version number and take number T183 is latest version for R81.10 that is now EOL&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 13:25:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277109#M46193</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-05-19T13:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing TLS level with Inbound HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277110#M46194</link>
      <description>&lt;P&gt;Good Catch, indeed it is T183.&lt;/P&gt;
&lt;P&gt;Gateways are slated for upgrade to R82 in the next month - I will definitely make a note to see if the findings are still valid.&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 13:28:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277110#M46194</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2026-05-19T13:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Enforcing TLS level with Inbound HTTPS Inspection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277124#M46195</link>
      <description>&lt;P&gt;I would upgrade first and then see what ssllabs will report regarding ssl ciphers after that follow indeed the cipher tool. Note there are many changes done in R82 for https inspection:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 542px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34265i3504EFF68C98DB5C/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 14:52:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Enforcing-TLS-level-with-Inbound-HTTPS-Inspection/m-p/277124#M46195</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-05-19T14:52:04Z</dc:date>
    </item>
  </channel>
</rss>

