- CheckMates
- :
- Products
- :
- Quantum
- :
- Remote Access VPN
- :
- Re: HTTPS Inspection of remote user VPN traffic
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
HTTPS Inspection of remote user VPN traffic
We have HTTPS Inspection enabled on our R81.10 FW and it collects HTTPS inspection for all internet traffic that originates from the LAN, but for our remote users that use Remote Access VPN we see no HTTPS Inspection logs.
I have a feeling it is probably just a setting we don't have the correct set to allow inspection of Remote Access VPN.
Any ideas?
- Labels:
-
Capsule VPN (Windows)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In the default configuration, internet access for Remote Access VPN clients is only inspected by local endpoint SW. But it is possible to use Hub Mode if the need arises to achieve this: sk101239: Route all traffic from Remote Access clients, including internet traffic, through Security...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you. We don't have Hub Mode enabled so that's something we need to look into.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Have you confirmed it's actually performing HTTPS Inspection on your Remote Access clients?
In any case, for inspecting HTTPS Traffic for Remote Access, it's far better to use either Harmony Browse or Harmony Connect Internet Access.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have confirmed out Remote Access client subnet is part of the HTTPS Inspection policy. I will look into the other products, thank you.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You definitely got valid responses. Btw, are vpn users going through the fw once they connect or is it split VPN tunnel? Because, keep in mind, if its split vpn, outbound https inspection will NOT apply, because their Internet traffic would go via their respected ISP providers.
Andy
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Not using Hub mode, so traffic to the internet does not pass the GW.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you all for your help in steering me in the right direction.
We have a decision to make about HTTPS Inspection and remote access. Either,
a) We change to Hub Mode which allows HTTPS Inspection for VPN traffic, but we will lose split tunnelling
b) Leave it as it is and not have HTTPS Inspection for VPN users, but retain VPN split tunnelling
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You actually have a third option here: Harmony Connect.
Internet-bound traffic can be subject to Threat Prevention (including HTTPS Inspection) without being routed on-premise.
It's a different service at extra cost and requires a second VPN client (which can run concurrently with your existing client).
However, it is another option.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What @PhoneBoy told you makes 100% most sense and he perfectly explained why. So, if you think abot it, barebone VPN client is NOT and EDR solution at all, because it simply does just VPN, thats it. With harmony endpoint (Yes, I know, its more money and the whole thing, I get it), BUT, its an amazing product and its full EDR that actually lets you implement https inspection from the portal itself where you would create rules for users. We have customers doing this and they love it.
I will say though, just my honest feedback to you, sometimes adding exceptions for threat prevention blade can be pain, but TAC is usually good at fixing those fairly quickly.
Hope that helps in your decision making. At least, you have choices : - )
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you all for taking the time to respond to my original message. All your feedback has been beneficial, and we now have options moving forward. The Checkmates forum is brilliant.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Glad we could help.
