Hello,
First of all, have a happy year 2024
I am showing you the result of the test I did in my LAB. It looks like the behavior of the firewall related to HTTPS inspection is not normal when adding “Any” in the service field of the access control rule base.
NOTE: here I am not looking if the rule is logical but only the behavior of HTTPS inspection.
FIRST PART: I started setting the base for the test. I tried to do it in the simplest way:
- I let the default rule for HTTPS inspection. I just change the source to a PC inside the LAN
- I activated App control & URL filtering at the layer level (and on the firewall) and using the object “Social Networking”
- I used the following inline layer for the Access Control rule.
- For testing if HTTPS inspection worked, I just let the PC_Windows without the firewall certificate.
RESULTS part 1:
Once the policy above installed, from the PC_Windows, I tried to connect to Facebook. Then I tried to connect to any other web site. The result is the expected one for any site:
We can see in the logs the categorization is working OK. Facebook is matching the 5.1 rule with “Social Networking” at the service field. Then the other traffic are treated by the 5.2 rule (cleanup) with “Any” at the service field. All https traffic were inspected as expected.
For the moment, everything worked as expected. Next part, in my opinion, didn’t work as expected:
SECOND PART
- Just for HTTPS inspection purposes, I removed “Social Networking” from the Access Control rule and let “Any” in the 5.1 rule. I installed the policy successfully.
RESULTS part 2
- Then from the PC_Windows (without firewall certificate), I try to connect to Facebook. The connection was successfully
- It looks like the HTTPS inspection were not working at all
- Looking at the logs, I was confirmed that HTTPS inspection was not working for Facebook as well as for all the HTTPS traffic which was now matching the 5.1 rule.
- Later I tried adding the group “HTTPS default services” to the services field. The result was the same than with “Any”
- Later I added back “Social Networking” to the services field in the 5.1 rule. HTTPS inspection came back.
CONCLUSIONS:
In this specific test using App. Control & URL Filtering, if we don’t add at least one specific object from the blades such as “Social Networking” , the HTTPS Inspection is not going to work.
I think (maybe I am wrong), that “Any” should cover any object, but in the test it is not the case. Replacing “Social Networking” by “Any”, makes the whole HTTPS inspection fail for all the traffic. As “HTTPS default services” didn’t work neither, it looks that in the services field it is necessary to add at least an object specific from the blade (App. Control in our case), to make work HTTPS inspection for all the HTTPS traffic