<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection on Small Business Security Appliances in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44269#M1789</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some clarification on how exceptions are handled in the HTTPS policy as this section is a bit brief in the video. Exceptions can be added in 2 places:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1) As a category in the Access Policy -&amp;gt; SSL Inspection -&amp;gt; Policy window.&lt;/P&gt;&lt;OL&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;Enable Bypass (other categories and sites)&lt;/LI&gt;&lt;LI&gt;Click other categories and sites to open SSL Inspection Bypass Other&lt;/LI&gt;&lt;LI&gt;Advantage: included as a category/site in the predefined SSL Inspection Bypass policy.&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-centered j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61696_https-8a.png" style="width: 620px; height: 394px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/P&gt;&lt;P&gt;(2) As a new exception in the&amp;nbsp;Access Policy -&amp;gt; SSL Inspection -&amp;gt; Exceptions window.&lt;/P&gt;&lt;OL&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;Click New&lt;/LI&gt;&lt;LI&gt;Create a policy for specific traffic, e.g. from Trusted networks to the DMZ network for the service HTTPS.&lt;/LI&gt;&lt;LI&gt;Advantage: provides granular control.&lt;/LI&gt;&lt;LI&gt;Best Practice Tip 1: Do not use ANY as the service for the custom exception. Instead choose HTTPS as the service to avoid a performance impact.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Best Practice Tip 2: Since exceptions are for a specific scope, do not define the source scope as ANY especially if you define a category or a site in this exception. If the appliance has a wireless network which is bypassed by default from the policy page (see 1 above), then defining a category/site based exception with the wireless network in it (as scope) will force the appliance to check the first packet of each new connection for the DN of the certificates and will effectively disable the default wireless bypass (see 1 above).&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;IMG alt="" class="jive-image image-2 j-img-centered j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61697_https-8b.png" style="width: 620px; height: 394px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Jan 2018 17:37:38 GMT</pubDate>
    <dc:creator>DeletedUser</dc:creator>
    <dc:date>2018-01-04T17:37:38Z</dc:date>
    <item>
      <title>HTTPS Inspection on Small Business Security Appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44263#M1783</link>
      <description>&lt;IFRAME class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fz0QqMpYHmDc%3Ffeature%3Doembed&amp;amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dz0QqMpYHmDc&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fz0QqMpYHmDc%2Fhqdefault.jpg&amp;amp;key=dbd8e071ec924c24aed29db4738a7e1c&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="854" height="480" scrolling="no" frameborder="0" allowfullscreen=""&gt;&lt;/IFRAME&gt;&lt;P&gt;Starting with the &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120473"&gt;R77.20.70 firmware&lt;/A&gt; released in November of 2017, &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121214"&gt;HTTPS inspection&lt;/A&gt; improves categorization of applications and URLs and detection of threats such as exploits, viruses and bot communications. In addition HTTPS inspection improves sandboxing detection of zero-day threats in files. Watch our video to find out how-to enable HTTPS inspection on the 700 Small Business Security Appliance.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 20:10:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44263#M1783</guid>
      <dc:creator>DeletedUser</dc:creator>
      <dc:date>2017-12-19T20:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on Small Business Security Appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44264#M1784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any measure of the impact of SSL on the 700 and 1400 family?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2017 03:44:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44264#M1784</guid>
      <dc:creator>Pablo_Barriga</dc:creator>
      <dc:date>2017-12-20T03:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on Small Business Security Appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44265#M1785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice video BOB!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2017 10:06:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44265#M1785</guid>
      <dc:creator>Jony_Fischbein</dc:creator>
      <dc:date>2017-12-20T10:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on Small Business Security Appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44266#M1786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a customer with 12 users, and it was a NO for them&amp;nbsp;with a 1450.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CPU usage was less than 10% with SSL Inspection and throughput was rather low, but SFWD RSS memory usage would increase very fast and sfwd would restart, causing cluster failover every 2 hours. Increasing RSS memory limit to 300MB also increased this time to about 4 hours before failover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Support responded that&amp;nbsp;this is normal behavior for this model. Maybe with the 1470 or&amp;nbsp; the 1490 that have more memory it will work well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Dec 2017 13:28:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44266#M1786</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2017-12-22T13:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on Small Business Security Appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44267#M1787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pedro,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cluster failover every 2-4 hours in not normal behavior for 1450 appliance.&lt;/P&gt;&lt;P&gt;Please contact support again, and tell them that SMB R&amp;amp;D wants to investigate it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Dec 2017 10:40:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44267#M1787</guid>
      <dc:creator>Miri_Ofir</dc:creator>
      <dc:date>2017-12-27T10:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on Small Business Security Appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44268#M1788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problems, Miri. I will reopen the case then. Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Dec 2017 19:53:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44268#M1788</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2017-12-28T19:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on Small Business Security Appliances</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44269#M1789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some clarification on how exceptions are handled in the HTTPS policy as this section is a bit brief in the video. Exceptions can be added in 2 places:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1) As a category in the Access Policy -&amp;gt; SSL Inspection -&amp;gt; Policy window.&lt;/P&gt;&lt;OL&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;Enable Bypass (other categories and sites)&lt;/LI&gt;&lt;LI&gt;Click other categories and sites to open SSL Inspection Bypass Other&lt;/LI&gt;&lt;LI&gt;Advantage: included as a category/site in the predefined SSL Inspection Bypass policy.&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-centered j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61696_https-8a.png" style="width: 620px; height: 394px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/P&gt;&lt;P&gt;(2) As a new exception in the&amp;nbsp;Access Policy -&amp;gt; SSL Inspection -&amp;gt; Exceptions window.&lt;/P&gt;&lt;OL&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;Click New&lt;/LI&gt;&lt;LI&gt;Create a policy for specific traffic, e.g. from Trusted networks to the DMZ network for the service HTTPS.&lt;/LI&gt;&lt;LI&gt;Advantage: provides granular control.&lt;/LI&gt;&lt;LI&gt;Best Practice Tip 1: Do not use ANY as the service for the custom exception. Instead choose HTTPS as the service to avoid a performance impact.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Best Practice Tip 2: Since exceptions are for a specific scope, do not define the source scope as ANY especially if you define a category or a site in this exception. If the appliance has a wireless network which is bypassed by default from the policy page (see 1 above), then defining a category/site based exception with the wireless network in it (as scope) will force the appliance to check the first packet of each new connection for the DN of the certificates and will effectively disable the default wireless bypass (see 1 above).&lt;/LI&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P&gt;&lt;IMG alt="" class="jive-image image-2 j-img-centered j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61697_https-8b.png" style="width: 620px; height: 394px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Jan 2018 17:37:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-Small-Business-Security-Appliances/m-p/44269#M1789</guid>
      <dc:creator>DeletedUser</dc:creator>
      <dc:date>2018-01-04T17:37:38Z</dc:date>
    </item>
  </channel>
</rss>

