- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi Checkmates,
I would like to ask what is the difference in the behavior, pros and cons of or when will you use the following:
1. HTTPS Inspection
2. In Application & Url Filtering Settings under Url Filtering -> Categorize HTTPS websites.
because in the " Categorize HTTPS websites" settings it says that you can allow HTTPS (SSL traffic) URL's without activating HTTPS Inspection.
At the time I wrote the previous answer and for older (R77.x) releases, these options were mutually exclusive.
In current (R80.20 and above with appropriate JHF) versions, this is not the case and Categorize HTTPS Sites is enabled by default.
I am hard-pressed to come up with a situation where you'd want this disabled, regardless of whether or not HTTPS Inspection is used.
HTTPS Inspection allows you to see all the traffic as if it was unencrypted, allowing you to do full threat prevention and content inspection.
Unfortunately, there are some situations where HTTPS Inspection does not work, namely:
Categorize HTTPS Sites will allow you to categorize HTTPS connections based on the certificate DN, which is sent in the clear.
It, however, does not currently support SNI, which many sites use, particularly anything with a wildcard certificate.
You also cannot see the full URI or any of the content (as we are not decrypting it), allowing for limited threat prevention capabilities.
There are several threads that discuss both of these topics in more detail.
Thank You sir Dameon for the reply.
Do you mean that if i will do HTTPS inspection i need both HTTPS inspection rules and check the "Categorize HTTPS websites" in url settings?
If you can do HTTPS Inspection, you don't need Categorize HTTPS sites.
The options are mutually exclusive.
If you have https inspections turned on HOWEVER you aren't doing outbound inspection, only inbound; can/should you still leave Categorize HTTPS websites checked?
At the time I wrote the previous answer and for older (R77.x) releases, these options were mutually exclusive.
In current (R80.20 and above with appropriate JHF) versions, this is not the case and Categorize HTTPS Sites is enabled by default.
I am hard-pressed to come up with a situation where you'd want this disabled, regardless of whether or not HTTPS Inspection is used.
Dameon,
Would any of these limitations be addressed in R80.20?
Doe the use of acceleration card help to address any of these limitations?
If the answers to above questions are "No", is there an ARTG on the use of the external SSL/TLS decryption solutions with Check Point that are known to work well and to remove these limitations (i.e. Gigamon, SSL Visibility Appliance | Symantec , Ixia or F5)?
Thank you,
Vladimir
There is a coming hotfix on top of R80.10 (and presumably included in R80.20) that is expected addresses the issues with SNI.
For HTTPS Inspection in R80.20, there a couple things:
TLS 1.3?
We are definitely looking at how to address TLS 1.3, though not listed in the EA notes.
Hi Dameon,
Can you validate if the issues are effectively solved on R80.20?
Regards.
SNI support is not included in R80.20, but we are planning to bring the hotfix to this release also.
Hi,
Here I want to share my recent experience.
We have enabled & configured URL Filtering blade on the firewall. After checking logs, came to know that only http traffic is categorized. For https traffic, categorization is not happening and result is not as per the configuration.
We don't want to enable https inspection. So finally we have enabled "Categorized https Websites" and it started working as expected.
Interesting. So if you block the category gambling, for example, and then go to a https gambling website ( i.e. https://ladbrokes.com ) does the usercheck screen display correctly ? I find that unless https inspection is on, this will not show the block/user check pages ?
Hi Paul,
Yes it is working correctly without https inspection ON.
Hey Paul,
For me, visiting the website (HTTPS CATEGORIZATION IS ENABLED) did not show the user check / block message but after enabling SSL Inspection the block message appeared.
This behavior is tested on a SMB Appliance.
Pretty sure this is expected behavior on all versions.
It's certainly my experience on R77.20/R77.30.
Gaurav Pandya what version did this work for you?
It is R77.30
No, not with SMB 1450. I had to open a TAC Case for this.
Hi Paul
Indeed , User Check Block web page will not function well when Https Inspection is off.
When we try to key-in the URL in "ladbrokes.com" is different from "https://ladbrokes.com" to User Check Block Page function.
"ladbrokes.com" will display User Check Block Page correctly.
Because it is http redirect.
"https://ladbrokes.com" will not display User Check Block Page correctly.
Because it is https redirect. So need to enable Https Inspection function.
Hi Rick & others
Thanks for the advice. It does seem that the 'categorise https sites' option is pretty useless then without https inspection.
I do wonder how Forcepoint (ex Websense) and other dedicated filtering companies manage to filter and show block pages without having ssl decrypt enabled.
Does it make any difference if we configure the Checkpoint gateway as a web proxy ? Does it work then ?
If this is fixed in a hotfix or R80.20 then that will be very welcome news
Cheers
Paul
Hi Paul
I ever talk with my colleague.
He is familiar with both CheckPoint and WebSense(ForcePoint).
WebSense also need to enable https inspection function to be able to show https block page correctly. (Even work in proxy mode)
Hi Rick
I have Websense showing the block page for https websites without SSL decrypt enabled. Be interested in your colleague's findings
Thanks
Paul
Another disadvantage of categorization vs. inspection is the fact that categorization wouldn't be able to differentiate between two services that run under the same hostname, e.g. dropbox and wetransfer uploads could not be differentiated from downloads as the only part that's visible to the CP is the hostname, not the full URL.
As the hostname is identical for both the upload and the download, the CP could not tell it apart.
To confirm, using any of the following would either block or allow WeTransfer as a whole, not just e.g. up- or download when using categorization only instead of inspection.
In this respect you'd need to at least enable inspection for the sites you're interested in differentiating (e.g. into up- and download) for logging or controlling purposes while bypassing all others.
Hi,
Sorry for the micro NecroBump, but I think it's a good spot to ask this question :
Is Full HTTPS Inspection ca be enabled on some firewall, and HTTPS categorization enabled on other firewall ?
If I activate "Categorize HTTPS websites" in the "Advanced Setting" of "Application Control & URL Filtering" blade, what will happen to Firewalls with Full HTTPS Inspection activated ?
We have a mixed collection of CPs, and I want to some categorization on SMB Appliances without disabling HTTPS inspection on our main Gateway.
I hope it is possible.
Bests Regards
Thanks for the reply,
Main Gateway is R80.10 version.
So, in my scenario, if I check the option "categorize https websites":
- If full inspection HTTPS is activated on my R80.10 CP, it will remain active, and categorization is not active.
- On my SMB 14xx, if I disable completely full Inspection HTTPS, "categorize https websites" will be activated ?
I Hope this is the correct behavior.
Thanks again.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
19 | |
7 | |
6 | |
5 | |
4 | |
4 | |
4 | |
2 | |
2 | |
2 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY