- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Hello Wonderful Check Mates users, I am back with some more questions again!
In our environment (R81.10) we have a Custom Application/Site object that we use to bypass HTTPS Inspection for certain domains. We typically only bypass domains when the HTTPS Inspection seems to be breaking something (which seems to be the case now for a growing number of vendors our business uses.)
Typically to bypass Inspection is a simple matter of opening the Custom Application/Site referenced in the rule, entering in the Domain, saving and installing policy.
Lately, though, within the last couple of weeks, we have encountered some domains that this does not fix. Despite adding the Domain into the Custom Application/Site, the Logs indicate the website was still hitting HTTPS Inspection (seeing the yellow Action: Inspect in the logs) and it is saying there is "Untrusted Certificate."
If I do NSLOOKUP for the website, and create an IP-based Host Object, and use that in a Bypass Rule, (same results if i create a FQDN Domain object) now suddenly it successfully Bypasses inspection, and fixes the site for our user.
My question is why is this happening? Is this something upgrading to R81.20 could possibly fix? I am guessing bypassing inspection based on an IP Address (Host and/or FQDN objects) invokes the bypass "earlier" than doing it by Custom Application/Site URL List?
By the way, the symptom I've been seeing more and more is that when HTTPS Inspection is turned on, the website loads with a certificate error for the user, and the server certificate just says "Issued By: Untrusted." Once we successfully bypass HTTPS Inspection, then the certificate presented to the user is the "real" Cert from the vendor, signed by one of the big CAs.
Thats a bit of a tricky situation, for the lack of a better term. This is the way I look at it...if we have SOLID proof its the fqdn that needs to be exempted, thats easy, we just bypass it, BUT, if fqdn gets resolved to multiple IP addresses, then you may need tyo add those as well, in some scenarios.
Im willing to test this in my lab, if you wish to provide good examples. I have R81.20 jumbo 98 ssl inspection lab, as well as R82, but we can stick with R81.20 for now.
Let me know.
Best,
Andy
Thank you for the offer of testing this in a lab environment. I have sent you a private message with the URL to re-create the issue.
Thanks brother, just saw it. Let me test right now while I wait on some Fortinet lab to finish 🙂
I will update you soon.
Andy
I really believe this is website issue... tried it on my cell phone, just on data, and it gave EXACT same message below, like on windows 11 in the lab, thats behind the cluster with ssl inspection on.
Andy
{ "statusCode": 404, "message": "Resource not found" }
OK but no "Untrusted Certificate Error" warning in the browser?
Nope, nothing like that.
Andy
Since you are seeing the "Untrusted Certificate Error" on your side and @the_rock is not, have you validated that the correct RootCA is listed in your managements Trust CA list?
There were some bugs in R81.10 with Trusted CAs not installing automatically.
Edit: Looks like it should be this one:
That certainly makes sense!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
25 | |
13 | |
9 | |
9 | |
7 | |
7 | |
6 | |
6 | |
5 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesWed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY