I haven't done much with HTTPS Inspection yet, but I have a customer who has tried it and it isn't working. I don't know enough to help them.
R80.20 Take 47.
They have created their own Root cert from the firewall HTTPS Inspection page - step 1 - which is in the Trusted Root Certificate Authority store on the local machine. (kind of highlighted yellow below)
![1.png 1.png](https://community.checkpoint.com/t5/image/serverpage/image-id/1717i18C86F86BDAD5E2D/image-size/large?v=v2&px=999)
HTTPS Inspection > Create > (their own root cert file from above).
View certificate shows: (ignore the "not trusted" warning - I'm taking the screenshot from my machine which doesn't have the cert installed - the customer doesn't get that warning)
![2a.PNG 2a.PNG](https://community.checkpoint.com/t5/image/serverpage/image-id/1716i1151D9E222CC3883/image-size/large?v=v2&px=999)
Then, browse to a blocked site to trigger the UserCheck page, and first they still get a dodgy certificate page:
![3.png 3.png](https://community.checkpoint.com/t5/image/serverpage/image-id/1718i648C18970415FA95/image-size/large?v=v2&px=999)
Click Continue and the block page shows - with the wrong certificate....
![4.png 4.png](https://community.checkpoint.com/t5/image/serverpage/image-id/1719iD31397CCE2E59F19/image-size/large?v=v2&px=999)
The certificate being used by the block page is the firewall's internal cert - not the imported trusted one they are trying to use. (again, ignore the trust warning in this screenshot - I'm taking screenshots from a untrusted machine)
![5.png 5.png](https://community.checkpoint.com/t5/image/serverpage/image-id/1720i6E9411F627235B6E/image-size/large?v=v2&px=999)
Any ideas what we're missing and why the newly created trusted cert isn't being used by the block pages?