<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Https Inspection on SMB (centraly managed) in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149618#M6880</link>
    <description>&lt;P&gt;The load of these machines is really low reach a maximum of 20%.&lt;BR /&gt;Let's say that disabled features is not a way I appreciate, surely I will investigate with the TAC, but I wanted to understand if others have found stability with some precautions, maybewith a particolar version of the firmware etc....&lt;/P&gt;</description>
    <pubDate>Fri, 27 May 2022 12:17:47 GMT</pubDate>
    <dc:creator>lrossi89</dc:creator>
    <dc:date>2022-05-27T12:17:47Z</dc:date>
    <item>
      <title>Https Inspection on SMB (centraly managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149348#M6862</link>
      <description>&lt;P&gt;Hi everyone,&lt;BR /&gt;I would like to share this scenario:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;(MGMT) Smart-1cloud (Cloud)&lt;/LI&gt;&lt;LI&gt;(Gateway) SMB 1800 (Cently Managed)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;BR /&gt;We activated the HTTPS Inspection.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;We find difficulty in making regex (they don't seem to work like those on normal Gaia)&lt;OL&gt;&lt;LI&gt;is there a right way to write?&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Https Inspection Blade randomly goes in Freez also with the latest firmware R80.20.40 and block all the communication to internet (only for subnet under https insepction)&lt;OL&gt;&lt;LI&gt;Has anyone had the opportunity to make a similar installation with activating ALL THE BLADE and having stability in the installation?&lt;/LI&gt;&lt;LI&gt;can anyone suggest a stable firmware with all blades active?&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 24 May 2022 15:51:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149348#M6862</guid>
      <dc:creator>lrossi89</dc:creator>
      <dc:date>2022-05-24T15:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on SMB (centraly managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149367#M6866</link>
      <description>&lt;P&gt;Hey,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We got HTTP Inspection enabled on our boxes too (R80.40 and afterwards R81) - but are bigger than your SMB1800 - and we didn't had any issues like you say.&lt;/P&gt;&lt;P&gt;Can you show your HTTPS policies ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Don't understand the HTTPS and RegExp part, were you defining Custom Applications ?&lt;/P&gt;&lt;P&gt;(I remember reading somewhere that RegExp is not recommended in some situations as it's CPU intensive)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why you activated all blades, are you using all those features - just askin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 19:50:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149367#M6866</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-05-24T19:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on SMB (centraly managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149400#M6867</link>
      <description>&lt;P&gt;It should be the same as regular Gaia in terms of regex.&lt;BR /&gt;I would engage the TAC to address both these issues.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 02:40:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149400#M6867</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-05-25T02:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on SMB (centraly managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149415#M6868</link>
      <description>&lt;P&gt;Using HTTPS inspection causes high(er) load on GWs - especially on SMB appliances with a small hardware footprint. If more traffic has to be processed, it may be needed to exclude parts of the traffic from TP or disable some blades features to avaoid high load or freeze.&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 07:38:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149415#M6868</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-05-25T07:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on SMB (centraly managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149616#M6878</link>
      <description>&lt;P&gt;I also with Gaia Normal, everything works regularly.&lt;BR /&gt;The problem seems to be on the SMB software.&lt;/P&gt;&lt;P&gt;Active all the blades because I personally as an approach I try to maintain the security level is the highest possible&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:11:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149616#M6878</guid>
      <dc:creator>lrossi89</dc:creator>
      <dc:date>2022-05-27T12:11:48Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on SMB (centraly managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149617#M6879</link>
      <description>&lt;P&gt;I will certainly do it, but I would expect something precise and stable as on the normal Gaia, since it is not a new functionality&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:13:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149617#M6879</guid>
      <dc:creator>lrossi89</dc:creator>
      <dc:date>2022-05-27T12:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Https Inspection on SMB (centraly managed)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149618#M6880</link>
      <description>&lt;P&gt;The load of these machines is really low reach a maximum of 20%.&lt;BR /&gt;Let's say that disabled features is not a way I appreciate, surely I will investigate with the TAC, but I wanted to understand if others have found stability with some precautions, maybewith a particolar version of the firmware etc....&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:17:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Https-Inspection-on-SMB-centraly-managed/m-p/149618#M6880</guid>
      <dc:creator>lrossi89</dc:creator>
      <dc:date>2022-05-27T12:17:47Z</dc:date>
    </item>
  </channel>
</rss>

