Hi, First post so I will do my best 🙂
The environment is R80.40 Take196
The issue:
We are trying to perform HTTPS Inspection for our trusted client networks for a customer. The problem arises when Apple per their post here https://support.apple.com/en-us/HT210060 state "Attempts to perform content inspection on encrypted communications between Apple devices and services will result in a dropped connection to preserve platform security and user privacy."
So, we created exceptions for this in the policy. I followed the guidelines listed in these:
https://community.checkpoint.com/t5/Security-Gateways/Apple-and-HTTPS-Inspection/m-p/176059/highligh...
https://support.checkpoint.com/results/sk/sk108191
https://support.checkpoint.com/results/sk/sk112994
The First two links did not help, as the redirects via AKAMAI Tech did not get caught by the Bypass exceptions no matter how many *apple.com domains or certificates were added.
The last link where in step 3 it states to:
"Create a Network object that specifies the relevant AKAMAI network (based on the example above - 88.221.0.0/16)"
Does in fact make the exception for inspection work, but my client nor I find this as a valid solution as Apple is not the only tenant for AKAMAI Tech.
The question I present to the community is: How can I perform content inspection on ONLY Apple-related traffic WITHOUT compromising my internal client networks?
I can provide additional information if needed, and thanks for reading my first post 🙂
-A