- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi There
I was reading the other day about IPS, threat prevention, app control etc.
As more and more traffic these days is now encrypted, how effective is the firewall without running https inspection?
Also, I have a question around the inspection, if we did http inspection using the cert on the client, what happens to pc's and clients that do not have the certificate, would they get blocked or would they just be allowed through with no inspection?
Cheers
If you are not passing traffic decrypted to the firewall and want to use the advance prevention blades, you are missing a lot of capabilities. Even app and URL filtering work better with it on. If you are only using it as a firewall, it will be fine as a stateful firewall.
In regards to clients with the gateway cert vs those that don't, you would need to build HTTPS rules that include the IPs for the users you want to inspect and a bypass rule to not inspect the ones that do not have the cert.
Hi,
So what happens if we do not create a bypass rule? will that traffic get dropped ?
The user will get a page that says that there was a certificate error and cannot proceed. What is the problem you are faced with? Getting the certificate out to visitors or contractors?
What about things like servers, Linux, iot devices etc that can not have a cert imported? will they get blocked ?
In a proper network design, those should be in different IP spaces, so you can build a bypass rule for that IP space.
I think there is explanation required. Here we go, @carl_t :
For outbound inspection, your Security Gateway will terminate outgoing connection and open a secondary one. On the client side, GW will present a "fake" server certificate issued by your CA, according to your configurations.
If you are using a self-signed CA, all clients should have that root CA cert installed as trusted root. For all devices/clients where it cannot be done, you should set up a bypass rule, or expect traffic issues.
These cases usually include applications (mostly mobile) where certificate pinning is in place. List of known applications can be found in sk112214. On most of the Linux machines you can and should install the new root CA as trusted root. For small polulation of the device where you cannot do that, make sure the bypass HTTPSi rule includes only required sites as Destination, and only those iot devices or other problematic ones as Source, to minimize your security exposure.
So what are we saying then, if we have inspection enabled and no cert on the endpoint, the connection will fail then?
Also, what if we have a DMZ and traffic coming in from the public internet to some servers, Is it normal to do inspection on that? if so would the firewall need a public cert?
Lastly, If we do not have inspection, does this limit the gateways ability to do IPS, app control, AV, antibot etc?
Cheers
@carl_t
No, it will not fail in your scenario. There is a second case, called Inbound HTTPS Inspection. If clients are on Internet, and the servers are in your secured perimeter, you "borrow" the actual server certificate with its private key to use on the GW. Clients do not see the substitution.
The goals, however, are different in both cases:
Both cases are thoroughly documented in the admin guides and also discussed multiple times on CheckMates. For example, you are welcome to look into one of our TechTalks for the matter.
Now, to the last question. According to public sources, HTTPS traffic now covers 95 to 99 percent of all web traffic. Without HTTPS Inspection, your advanced security blades are basically ineffective when it comes to analysis of web-related flows. And all ATP inter-communications: C&C, module drops, exfiltration, etc. - are encrypted.
Our customer uses a cloud based WAF to protect inbound HTTPS traffic. Would you still recommend that this sanitised traffic be inspected by the IPS blade? Is there a possibility that the Cloud WAF may miss some malicious traffic that the Check Point IPS blade will catch and drop?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY