<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection Probe Bypass on R80.20, should I enable? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-on-R80-20-should-I-enable/m-p/31342#M6532</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Hi Alessandro&lt;/P&gt;&lt;P class=""&gt;Is it SNI domains your are trying to access?&lt;/P&gt;&lt;P class=""&gt;Did you try to analyze and inspect domains via https://www.ssllab.com? It will show you certicate type and which encryption is enabled.&lt;/P&gt;&lt;P class=""&gt;I had to enable some encryption protocol levels when using probe bypass.&lt;/P&gt;&lt;P class=""&gt;Best regards&lt;/P&gt;&lt;P class=""&gt;Kim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Feb 2019 17:01:48 GMT</pubDate>
    <dc:creator>Kim_Moberg</dc:creator>
    <dc:date>2019-02-07T17:01:48Z</dc:date>
    <item>
      <title>HTTPS Inspection Probe Bypass on R80.20, should I enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-on-R80-20-should-I-enable/m-p/31341#M6531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, I´m using R80.20 Take 33, when I enable the flag&amp;nbsp;enhanced_ssl_inspection some sites don´t open in browsers like chrome (version 58 or 71)... example: &lt;A href="http://www.uol.com,"&gt;www.uol.com,&lt;/A&gt;&amp;nbsp;&lt;A href="http://www.bitcointrade.com.br"&gt;www.bitcointrade.com.br&lt;/A&gt;...etc... any tips or sugestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alessandro&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2019 14:02:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-on-R80-20-should-I-enable/m-p/31341#M6531</guid>
      <dc:creator>Alessandro_Marr</dc:creator>
      <dc:date>2019-02-07T14:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass on R80.20, should I enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-on-R80-20-should-I-enable/m-p/31342#M6532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Hi Alessandro&lt;/P&gt;&lt;P class=""&gt;Is it SNI domains your are trying to access?&lt;/P&gt;&lt;P class=""&gt;Did you try to analyze and inspect domains via https://www.ssllab.com? It will show you certicate type and which encryption is enabled.&lt;/P&gt;&lt;P class=""&gt;I had to enable some encryption protocol levels when using probe bypass.&lt;/P&gt;&lt;P class=""&gt;Best regards&lt;/P&gt;&lt;P class=""&gt;Kim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2019 17:01:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-on-R80-20-should-I-enable/m-p/31342#M6532</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-02-07T17:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection Probe Bypass on R80.20, should I enable?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-on-R80-20-should-I-enable/m-p/46725#M9031</link>
      <description>&lt;P&gt;The behaviour has been changed, please look at sk104717:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In R80.10, before Jumbo Hotfix Accumulator for R80.10&amp;nbsp;Take 189, the probing feature is set, by default, to Fail Open.&lt;/LI&gt;&lt;LI&gt;From Take 189, the default behavior is changed to Fail Close.&lt;/LI&gt;&lt;LI&gt;You can return to the behavior as it was before Take 189, by setting bypass_on_enhanced_ssl_inspection 1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;To set the default to Fail Open:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Run: fw ctl set int bypass_on_enhanced_ssl_inspection 1&lt;/LI&gt;&lt;LI&gt;In $FWDIR/modules/fwkern.conf, add this line: bypass_on_enhanced_ssl_inspection=1&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;The probing feature may fail in the following scenarios (and therefore it is not recommended):&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Server requires an SNI extension in the SSL "Client hello" packet.&lt;/LI&gt;&lt;LI&gt;Missing cipher - The Security Gateway does not support any of the server allowed ciphers.&lt;/LI&gt;&lt;LI&gt;The server presents an incorrect certificate when SNI is not provided&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;To disable probing (Recommended):&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Run: fw ctl set int enhanced_ssl_inspection 0&lt;/LI&gt;&lt;LI&gt;In $FWDIR/modules/fwkern.conf, add this line: enhanced_ssl_inspection=0&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 13 Mar 2019 10:04:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Probe-Bypass-on-R80-20-should-I-enable/m-p/46725#M9031</guid>
      <dc:creator>Emanuele_Lorenz</dc:creator>
      <dc:date>2019-03-13T10:04:59Z</dc:date>
    </item>
  </channel>
</rss>

