So after making the change I had some improvements, some websites that were previously broken started working without needing an https bypass.
However I found some sites still don't load unless specially bypassed by IP address.
When I look at the first cipher offered by the website, it reports:
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
When I look at this page of supported ciphers:
Supported cipher suites for HTTPS Inspection
we can see that its specifically not supported. So my question is, what exactly can we do about it? I'm going to end up with 100's of websites in my bypass rule, and as we have to do it via IP, anytime a site changes IP or one that uses CDN its going to break again.
It makes sense that the bypass doesn't work by url regex (it can't see the url yet because it doesn't understand how to negotiate a secure connection).
Are there plans to add support for these ciphers, or some way to configure the checkpoint to try and down negotiate to a supported cipher?