<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS Inspection on SMB in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9830#M222</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So&amp;nbsp;it works better for you with probe bypass off?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For me it seems to work better when I turn it off.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 Dec 2018 14:26:01 GMT</pubDate>
    <dc:creator>Pedro_Espindola</dc:creator>
    <dc:date>2018-12-27T14:26:01Z</dc:date>
    <item>
      <title>HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9815#M207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, how is it at the moment for those of you using it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Last time I tried it, users just could not reach some of the sites. I recall some peculiar SSL error in the logs.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Nov 2018 18:46:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9815#M207</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-11-27T18:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9816#M208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would help if you could provide information you saw in the logs, describe the behaviors you saw in more detail, etc.&lt;/P&gt;&lt;P&gt;Also is the appliance locally managed or centrally managed?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 05:20:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9816#M208</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-28T05:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9817#M209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can't quite remember what it was exactly other than I set everything to bypass (even cleanup rule) and there was a log message with something like "empty_ssl_response". I may try it again during next weekend and get more details.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is centrally managed 1470.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I have not opened this thread to discuss particular problem, more like to get your feedback. There are related discussions here on CheckMates but they are more about R80.xx gateways.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 06:05:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9817#M209</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-11-28T06:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9818#M210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Empty SSL Connection most likely means you haven't installed the necessary CA key into the trusted root store on your browser.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk107755" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk107755"&gt;A log with an "empty_ssl_conn" entry in the HTTPS Validation field appears in SmartView Tracker&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, I totally understand wanting to get feedback.&lt;/P&gt;&lt;P&gt;HTTPS Inspection in general has been discussed in numerous threads for non-SMB appliances.&lt;/P&gt;&lt;P&gt;Most of the issues would be similar for SMB appliances, I would expect.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 07:15:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9818#M210</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-28T07:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9819#M211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had some performance issues at first due to memory leak, but it was fixed and all works well. Here is what I did:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Enable probe bypass mechanism as described in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104717&amp;amp;partition=General&amp;amp;product=HTTPS#Improvements%20in%20HTTPS%20Inspection%20Bypass%20mechanism"&gt;sk104717&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Enable P384 support as described in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110883&amp;amp;partition=Advanced&amp;amp;product=HTTPS"&gt;sk110883&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In locally managed appliances I still have to configure many exceptions for pages that might fail to load. For some unknown reason, pages that fail in locally managed SMBs work well in centrally managed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 15:19:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9819#M211</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-11-28T15:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9820#M212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx mate, very valuable info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Didn't know SK104717 is applicable for SMB as well. But now that you mentioned it, I checked and there is indeed &lt;STRONG&gt;enhanced_ssl_inspection&lt;/STRONG&gt; parameter in the kernel. Did you implement all SK steps or only part of them ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesn't look like I have to do anything for SK110883 because starting from R77.20.80 it is already integrated?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 17:39:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9820#M212</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-11-28T17:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9821#M213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you still have to perform the ckp_regedit steps in the SK from expert mode.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 19:12:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9821#M213</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-28T19:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9822#M214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran these commands and rebooted appliance. Hopefully that is enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cp $CPDIR/registry/HKLM_registry.data $CPDIR/registry/HKLM_registry.data.BAK&lt;/P&gt;&lt;P&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CPTLS_ACCEPT_ECDHE 1&lt;/P&gt;&lt;P&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CPTLS_PROPOSE_ECDHE 1&lt;/P&gt;&lt;P&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CPTLS_ACCEPT_ECDSA 1&lt;/P&gt;&lt;P&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CPTLS_PROPOSE_ECDSA 1&lt;/P&gt;&lt;P&gt;ckp_regedit -a SOFTWARE\\CheckPoint\\FW1 CPTLS_EC_P384 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2018 04:29:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9822#M214</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-11-29T04:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9823#M215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Question... Are Linux update repositories included in "known software update services" list ? Because it does not look like they are.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2018 04:46:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9823#M215</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-11-29T04:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9824#M216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, they're not.&lt;/P&gt;&lt;P&gt;The list is here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98655" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98655"&gt;Check Point or Windows signatures update fails when HTTPS Inspection enabled on Security Gateway&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2018 04:57:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9824#M216</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-29T04:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9825#M217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx, I'll bypass them for now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2018 05:08:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9825#M217</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-11-29T05:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9826#M218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using HTTPS Inspection with success so far but I faced strange problem. When I try to access certain Web sites (&lt;STRONG&gt;varna-airport.bg&lt;/STRONG&gt; for example) I am getting&amp;nbsp;&lt;SPAN style="font-size: 15px;"&gt;ERR_CONNECTION_TIMED_OUT from browsers. And indeed telnet to port 443 on that host gives same error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I bypass this site by destination IP or URL it does not work. But if I bypass it by source IP then it works fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is nothing relevant in the logs. Have any of you faced similar problem and how did solve it ?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Dec 2018 05:02:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9826#M218</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-21T05:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9827#M219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you do a tcpdump on the outside interface when you attempt to access this site, what do you see?&lt;/P&gt;&lt;P&gt;My guess is that the TLS negotiation might be failing.&lt;/P&gt;&lt;P&gt;The fact there is no logs about this is problematic and might be worth a TAC case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Dec 2018 22:30:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9827#M219</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-12-21T22:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9828#M220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could it be a redirect which is sending you to another IP which is not bypassed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Dameon said, capture with TCPDUMP and look for redirect codes or TLS errors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see why it would timeout, though. Normally there should be other kinds of error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Dec 2018 18:08:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9828#M220</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-12-22T18:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9829#M221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx for your comments. I disabled&amp;nbsp;&lt;STRONG&gt;enhanced_ssl_inspection&lt;/STRONG&gt; and it started to work again.&amp;nbsp;&lt;STRONG style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Dec 2018 05:27:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9829#M221</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-24T05:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9830#M222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So&amp;nbsp;it works better for you with probe bypass off?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For me it seems to work better when I turn it off.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2018 14:26:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9830#M222</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-12-27T14:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9831#M223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, seems to work better when it is off. Otherwise some sites just time out and users are not happy about it.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2018 15:40:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9831#M223</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-12-27T15:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9832#M224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A friendly reminder guys...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to bypass site by IP address, make sure relevant row in the HTTPS Inspecton policy is on the top before any other inspection rules. Otherwise it won't have effect. Logical but easy to miss &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2019 17:01:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9832#M224</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2019-01-17T17:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9833#M225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Talking about rule order, I am unable to rearrange SSL inspection exception rules in locally managed appliances. I drag and drop, but they go back to the order they were created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How about you?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2019 18:47:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9833#M225</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2019-01-17T18:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS Inspection on SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9834#M226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not have locally managed one so cannot say. But may be as a workaround you can export configuration in cli rearrange rules and then import it again?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2019 03:52:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/HTTPS-Inspection-on-SMB/m-p/9834#M226</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2019-01-18T03:52:51Z</dc:date>
    </item>
  </channel>
</rss>

