- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I believe this subject being periodically brought-up with no resolution to date:
Exception rules in the HTTPS inspection are not working properly (R80.40 JHFA91).
When Kaspersky Total Security product behind CP gateway attempting to download updates, the process is failing with "Invalid certificate" logged.
Exception for bypass is in place and we are seeing only first packet subjected to it.
Unless there is a resolution to this issue, it is difficult to recommend HTTPS inspection to be turned on and, as a result, the overall effectiveness of the product is greatly diminished.
Does r81.X handle HTTPS inspection differently, or similar behaviour to be expected?
Thank you,
Vladimir
We do typically validate the certificates being used as part of SNI verification.
Perhaps they are using a private certificate and doing certificate pinning.
In that case, bypass is your only option.
Is that working correctly or are you still having issues even with a bypass rule there?
The main thing R81 adds is TLS 1.3 support (if USFW is being used).
In my case, there is a rule to bypass the *.kaspersky.com in place.
The issue is twofold: the bypass does not work, (the AV is trying multiple update servers sequentially, but only first packet of the overall attempt is inspected, as per logs), and the log indicates that the certificate is invalid. This is all in R80.40 though, did not get to try it in R81.X.
Even if the issue is the certificate pining by the vendor and IF R81 does handle it differently, R80.40 is still the recommended version.
Maybe they are not doing SNI, try bypass with src IP - dst IP.
Kaspersky publishing list of names for the update servers and discurages use of IP addreses:
https://support.kaspersky.com/us/common/start/6105
How is the bypass configured?
With a custom URL or by domain objects?
If it is custom URL, try adding "kaspersky.com" to the object as well, not only "*.kaspersky.com".
edit:
btw. this is documented here: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
@Norbert_Bohusch , I've tried all possible combinations including the ones you are mentioning as well as regex \/kaspersky.com and \.kaspersky\.com.
Hi Vladimir,
All of the replies so far were on point, but I'd like to clarify a few points:
As always, opening a support ticket may provide a more specific solution to your issue, but the above is a general idea of the most common options.
Thanks,
Dor
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 12 | |
| 8 | |
| 7 | |
| 7 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY