- Products
- Learn
- Local User Groups
- Partners
- More
Secure Your AI Transformation
9 April @ 12pm SGT / 3pm CET / 2PM EDT
AI Security Masters E6: When AI Goes Wrong -
Hallucinations, Jailbreaks, and the Curious Behavior of AI Agents
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
When HTTPS Inspection “breaks,” it is rarely a single root cause. In the field, failures almost always map to one of these buckets:
Endpoint trust chain (Gateway CA / internal CA not trusted)
Application incompatibility (certificate pinning, mTLS, strict TLS requirements)
Transport outside the expected path (QUIC/HTTP3 over UDP/443)
Network interference (explicit/auth proxy, PAC, upstream SSL inspection)
Capacity/crypto overhead under load (CPU, handshake pressure, aggressive policy scope)
Unexpected bypass (rules/updatable objects/limitations) → “looks like it’s not inspecting”
TAC rule: don’t change configuration until you have minimum evidence and you’ve isolated variables (one change at a time).
Before any change (especially bypass rules and debug):
Take a configuration backup and document the baseline.
Run in a controlled maintenance window, ideally with console access.
Document every change to support rollback.
If this is a cluster, plan to collect evidence from all members, because the handshake may occur on any node.
Open an HTTPS site and inspect the certificate presented by the browser:
Issuer = Gateway CA / internal CA → outbound inspection is active
Issuer = public CA → bypass/no inspection/wrong scope
Certificate error → trust chain issue on the endpoint
TAC best practice: test with two browsers (Chrome/Edge and Firefox). Firefox can behave differently depending on trust-store behavior.
The Gateway CA must be trusted on endpoints:
Windows: Trusted Root Certification Authorities
macOS: Keychain (System trust)
Typical signals: NET::ERR_CERT_AUTHORITY_INVALID, chain warnings, “connection not private.”
Recommended evidence: a screenshot of the certificate (Issuer/Subject/Validity) and the browser error.
Requires the Gateway CA to be trusted on endpoints.
The gateway dynamically re-signs certificates.
Requires the server certificate (and private key association, when applicable to your deployment model) to be correctly imported/assigned under the HTTPS Inspection certificate handling in SmartConsole (HTTPS Inspection → Certificates, as applicable).
Common symptom: an internal published service fails only when inbound inspection is enabled.
QUIC/HTTP3 uses UDP/443.
It can behave differently than TCP/443 and complicate inspection troubleshooting.
TAC test (variable isolation):
Temporarily block UDP/443 to force TCP/443, then compare behavior:
If the issue disappears, you’ve isolated QUIC as a major variable.
If it persists, move on.
The application expects a specific certificate/CA and rejects the Gateway CA.
Symptom: consistent failure for specific domains/apps, not for the whole Internet.
TAC treatment:
Use a domain-scoped bypass (minimum scope + governance: owner/justification/review date).
Avoid global bypass.
If you have explicit proxy, authenticated proxy, PAC, or upstream SSL inspection, you may see:
certificate rewriting (double inspection → symptoms similar to trust failure)
authentication loops
timeouts/resets under peak load
inconsistent behavior by subnet/group (PAC-driven routing)
TAC tip: compare the same test from:
corporate network (with proxy/PAC) vs hotspot/4G (no proxy)
$FWDIR/log/wstlsd.elg* (TLS handshake / inspection path)
/var/log/messages (daemon/system errors)
SmartLog on Management (where applicable)
tail -f $FWDIR/log/wstlsd.elg*
wstlsd.elg* (practical patterns)Always correlate with the exact test timestamp.
Look for patterns such as:
TLS handshake failures / negotiation mismatch (version/cipher/protocol)
Certificate validation failures (untrusted CA, incomplete chain, time/OCSP/CRL impacts)
Timeouts / resets tied to specific destinations (often pinning/incompatibility signatures)
Unexpected bypass indicators (traffic not intercepted as expected)
TAC method: timestamp → domain → handshake stage → error → confirm via controlled retest.
TAC warning: debug can generate high log volume and affect performance. Use a maintenance window.
for PROC in $(pidof wstlsd); do fw debug $PROC on TDERROR_ALL_ALL=5; done
Reproduce the issue (record URL + timestamp).
for PROC in $(pidof wstlsd); do fw debug $PROC off TDERROR_ALL_ALL=0; done
tail -n 2000 $FWDIR/log/wstlsd.elg* > /var/log/wstlsd_last2k.txt
tail -n 2000 /var/log/messages > /var/log/messages_last2k.txt
Hypothesis: Gateway CA/internal CA not trusted on endpoints.
Action: validate trust store (Windows Trusted Root / macOS Keychain) and CA deployment (GPO/MDM).
Hypothesis: pinning/mTLS/strict TLS requirements.
Action: domain-scoped bypass with governance.
Hypothesis: QUIC/HTTP3 variable.
Action: test UDP/443 block; document the decision and baseline.
Hypothesis: CPU/crypto/handshake overhead under load.
Action: validate via cpview/system metrics; rollout by rings; tune scope and exceptions.
Gradual rollout (pilot → waves) with KPIs (tickets, failures, performance).
Exception governance: owner + justification + review date + record in change control (ticketing/spreadsheet).
One change at a time and document for rollback.
Periodic bypass audit to find undocumented exceptions.
In proxy environments: document the full chain and avoid double inspection where possible.
Gateway version + Jumbo take
Browser(s) + version (Chrome/Edge/Firefox)
URL(s) + exact timestamp
Symptom (cert error / timeout / app break / slow / not inspecting)
Gateway CA installed? (yes/no)
CA distribution method: GPO / MDM / manual
Proxy/PAC/auth proxy present? (yes/no + details)
QUIC tested? UDP/443 blocked? (yes/no + result)
Logs: wstlsd.elg* snippet for the test window + /var/log/messages
sk108202 — Best Practices — HTTPS Inspection
https://support.checkpoint.com/results/sk/sk108202
sk112066 — How to troubleshoot an HTTPS Inspection issue
https://support.checkpoint.com/results/sk/sk112066
sk111754 — QUIC/HTTP3 considerations with HTTPS Inspection (UDP/443)
https://support.checkpoint.com/results/sk/sk111754
sk163595 — Updatable object / bypass list (pinning/incompatibilities)
https://support.checkpoint.com/results/sk/sk163595
Very nice!
Thk's Andy
Best
Really love all these write-ups, amazing.
Thank you very much Andy, I've always had an excellent experience within our MVP community.
Excellent, congratulations on the article!
thk's Pedro
Great Effort!
Thank you bro
In releases prior to R82, I suggest blocking QUIC.
In R82 where QUIC is supported for both HTTPS Inspection and HTTPS Categorization, you can safely allow it.
Excellent placement, @PhoneBoy
Apparently, Chrome (and Chromium-based browsers) do not allow adding 3rd party trusted CA for QUIC.
That effectively knee-caps our ability to perform full inspection on this traffic (above and beyond categorization).
Which means blocking QUIC entirely is still probably the best bet.
For me, blocking QUIC is the best practice to ensure full HTTPS inspection. This prevents the use of UDP port 443, forcing browsers to use HTTPS over TCP, where inspection works normally.
Really well articulated. and very much informative,
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 75 | |
| 37 | |
| 16 | |
| 14 | |
| 13 | |
| 12 | |
| 11 | |
| 10 | |
| 9 | |
| 9 |
Tue 14 Apr 2026 @ 04:00 PM (CEST)
Maestro Masters EMEA: Migration and Upgrades Best PracticesTue 14 Apr 2026 @ 03:00 PM (EDT)
Maestro Masters Americas: Migration and Upgrades Best PracticesTue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementWed 15 Apr 2026 @ 07:00 PM (CST)
Defensa en Tiempo Real: Amenazas Actuales y Cómo Check Point te Protege HoyTue 14 Apr 2026 @ 04:00 PM (CEST)
Maestro Masters EMEA: Migration and Upgrades Best PracticesTue 14 Apr 2026 @ 03:00 PM (EDT)
Maestro Masters Americas: Migration and Upgrades Best PracticesWed 15 Apr 2026 @ 07:00 PM (CST)
Defensa en Tiempo Real: Amenazas Actuales y Cómo Check Point te Protege HoyTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 14 Apr 2026 @ 03:00 PM (PDT)
Renton, WA: Securing The AI Transformation and Exposure ManagementThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY