Hey guys,
I hope someone can clarify this for me, though Im pretty sure how it works, but need to see if there is any way around it. So, to make long story short, customer has https inspection enabled, vpn, url and app control, as well as IA and monitoring.
They want to block certain machines from being able to download any exe file off the Internet. Now, this does work, but ONLY if source in content awareness ordered layer is set to any, not if you use specific PC or subnet. Also, if that specific machine is set to bypass google services in https inspection policy, then content awareness does not take place at all.
I replicated this in the lab and its exact same issue and we even have TAC case as well for this. Here are my questions:
1) Considering https inspection takes place before regular policy, does this mean once this traffic is bypassed it wont check anything else after?
2) If 1 is indeed true, is there ANY way to get around this?
Also, I attached 2 screenshots from my lab. If I disable bypass rule for inspection policy, then all exe files are blocked on windows 10 I use behind the fw.
Tx as always!