<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection &amp; Categorization on R77.30 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37381#M7923</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default, the "Website Categorization Mode" is set to "Background" which means that initial web requests will be allowed even if categorization has not been obtained &amp;amp; cached yet.&amp;nbsp; If you set it to "Hold" (see attached screenshot) the user will not be able to start loading content until it has been categorized (and possibly blocked).&amp;nbsp; If you go this route make sure that all DNS servers configured in the firewall's Gaia OS config are defined properly and responding quickly, or users may suffer long delays trying to load up a new website whose categorization has not yet been cached by the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In regards to the delay incurred by HTTPS Inspection itself (as opposed to the categorization process discussed above), this feature does cause a process space "trip" on the firewall in R80.10 and earlier.&amp;nbsp; Techniques to minimize the performance impact of the trip in regards to HTTPS Inspection are covered extensively in Chapter 10 of the second edition of my book, and can be roughly summarized as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Make sure Gaia is running in 64-bit mode&lt;/LI&gt;&lt;LI&gt;Use firewall hardware whose processor supports AES-NI&lt;/LI&gt;&lt;LI&gt;Tune the firewall to ensure sufficient free CPU cycles are available on the Firewall Worker cores for the wstlsd/pkxld processes&lt;/LI&gt;&lt;LI&gt;Avoid use of "Any" in the HTTPS Inspection Policy&lt;/LI&gt;&lt;LI&gt;Load the latest GA jumbo hotfix&lt;/LI&gt;&lt;LI&gt;Beware using APCL Limits in conjunction with HTTPS Inspection (sk70600)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="66979" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66979_categorize.jpg" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Jul 2018 14:11:54 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2018-07-09T14:11:54Z</dc:date>
    <item>
      <title>HTTPS Inspection &amp; Categorization on R77.30</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37380#M7922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've noticed a strange behavior when enabling HTTPS inspection, would like to confirm if anyone has seen a similar problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When HTTPS inspection is enabled, page blocking by categorization takes much longer to apply. For e.g. when accessing betting sites over HTTPS or pages with image galleries, the page loads fine and its contents load. Smartview Tracker shows the page contents as blocked but they are loading fine on browser. After retrying approx 30 seconds to 1 minute later, the page is then correctly blocked and Usercheck page is shown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it normal for categorization to take longer on HTTPS inspection or for pages to load successfully for so long? Is there any way to troubleshoot what is happening to cause this delay?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without HTTPS inspection, pages are blocked almost instantly. Maybe the first time they load partially (images etc don't load) but immediately after the first refresh they are fully blocked (no Usercheck which is normal). With HTTPS inspection, even after the first few refreshes the pages still load. This has been tested with various sites and different categories and the behavior is same.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2018 10:29:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37380#M7922</guid>
      <dc:creator>Bharat_B</dc:creator>
      <dc:date>2018-07-09T10:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection &amp; Categorization on R77.30</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37381#M7923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default, the "Website Categorization Mode" is set to "Background" which means that initial web requests will be allowed even if categorization has not been obtained &amp;amp; cached yet.&amp;nbsp; If you set it to "Hold" (see attached screenshot) the user will not be able to start loading content until it has been categorized (and possibly blocked).&amp;nbsp; If you go this route make sure that all DNS servers configured in the firewall's Gaia OS config are defined properly and responding quickly, or users may suffer long delays trying to load up a new website whose categorization has not yet been cached by the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In regards to the delay incurred by HTTPS Inspection itself (as opposed to the categorization process discussed above), this feature does cause a process space "trip" on the firewall in R80.10 and earlier.&amp;nbsp; Techniques to minimize the performance impact of the trip in regards to HTTPS Inspection are covered extensively in Chapter 10 of the second edition of my book, and can be roughly summarized as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Make sure Gaia is running in 64-bit mode&lt;/LI&gt;&lt;LI&gt;Use firewall hardware whose processor supports AES-NI&lt;/LI&gt;&lt;LI&gt;Tune the firewall to ensure sufficient free CPU cycles are available on the Firewall Worker cores for the wstlsd/pkxld processes&lt;/LI&gt;&lt;LI&gt;Avoid use of "Any" in the HTTPS Inspection Policy&lt;/LI&gt;&lt;LI&gt;Load the latest GA jumbo hotfix&lt;/LI&gt;&lt;LI&gt;Beware using APCL Limits in conjunction with HTTPS Inspection (sk70600)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="66979" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66979_categorize.jpg" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2018 14:11:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37381#M7923</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-07-09T14:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection &amp; Categorization on R77.30</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37382#M7924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tim, thank you for the answer. To reply to the points:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL style="color: #333333; background-color: #ffffff; border: 0px; padding: 0px 0px 0px 30px;"&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Make sure Gaia is running in 64-bit mode&lt;UL&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Already in 64-bit mode&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Use firewall hardware whose processor supports AES-NI&lt;UL&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Hardware is 5400, doesn't look like it supports AES-NI as per&amp;nbsp;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/6617-aes-ni"&gt;This Community post&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Tune the firewall to ensure sufficient free CPU cycles are available on the Firewall Worker cores for the wstlsd/pkxld processes&lt;UL&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Firewall is free enough, running at approx 15% CPU&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Avoid use of "Any" in the HTTPS Inspection Policy&lt;UL&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Any in HTTP/HTTPS to inspect after the bypass rules. Is this relevant?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Load the latest GA jumbo hotfix&lt;UL&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Already installed T302&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Beware using APCL Limits in conjunction with HTTPS Inspection (sk70600)&lt;UL&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0.5ex 0px;"&gt;Checked&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While the blocking eventually happens, the management is not very confident of the solution and believe some blocked content may be slipping through. The worse part is that the logs show the content as "blocked" but the page is actually loading fine in the background for the first few minutes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 07:04:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37382#M7924</guid>
      <dc:creator>Bharat_B</dc:creator>
      <dc:date>2018-07-12T07:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection &amp; Categorization on R77.30</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37383#M7925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So is content still "slipping through" even with website categorization set to Hold?&amp;nbsp; It shouldn't be and anything you are seeing to the contrary could just be cached data in the browser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main reason to avoid using "Any" in your HTTPS Inspection Policy is to keep LAN-speed traffic between internal networks from accidentally getting sucked into HTTPS Inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also sounds like the 5400 with its 2 cores may be a bit underpowered for what you are trying to do.&amp;nbsp; What does the output of the "enabled_blades" and "free -m" commands run on the firewall show?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 14:29:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-Inspection-Categorization-on-R77-30/m-p/37383#M7925</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-07-12T14:29:34Z</dc:date>
    </item>
  </channel>
</rss>

