- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
A user needs to access a site which has a revoked certificate.
I accept to access on it, he does not need to authenticate or add any sensitive datas on it.
HTTPS inspection is not activate, but url filtering yes and it shows as Detect the revoked certificate
IPS and antivirus blades are activated as well.
The same pc connected to a different Internet connection can surf on it.
Categorizsed HTTPS website is activated as well, on general properties.
How can I grant user access to this site?
You posted this question in Harmony Browse space, yet you're asking this as if this is going through a gateway.
Confirm the product and versions/JHF in use.
In any case, by default, we validate the certificate ourselves and deny access if the certificate is revoked.
This can be changed.
In R82, this can be done in SmartConsole:
In R81.20 and earlier, it must be done in SmartDashboard:
In either case, it requires publishing and installing the Access Policy to take effect.
I think that server certificate setting is only applicable though if they have https inspection enabled?
Andy
It's also used as part of Verified SNI.
Thank you for the information.
My version is R81.20 Take 99.
So even if HTTPS inspection has not been configured, the default option "Revoked server certificate" is performed, so it drop the communication.
Checking log, it shows only Detect and this let me think that the behaviour is not to block it, but just to inform, but I'm wrong.
If I'm going to disable this option, I understand it is global for all sites, I was hoping there was a way to create an exception.
Perhaps I was mistaken that this setting is used for Verified SNI.
It definitely is for HTTPS Inspection, and yes this is a global setting.
No action is required here, but that explains the error.
I would definitely see if you can install R81.20 with recommended jumbo hotfix 105 and see if that fixes the issue.
Andy
I have noticed, for domains where I upgraded from R81.20 to R81.20, the install option is not enabled by default.
On domains where the firewall have been installed on R81.20, this option is enabled by default.
Thats right.
Do you have screenshot of it?
Andy
Try to make bypass rule above the current https inspection rule. Instead of url use the ip of the relevant website.
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY