Hello Wonderful Check Mates users, I am back with some more questions again!
In our environment (R81.10) we have a Custom Application/Site object that we use to bypass HTTPS Inspection for certain domains. We typically only bypass domains when the HTTPS Inspection seems to be breaking something (which seems to be the case now for a growing number of vendors our business uses.)
Typically to bypass Inspection is a simple matter of opening the Custom Application/Site referenced in the rule, entering in the Domain, saving and installing policy.
Lately, though, within the last couple of weeks, we have encountered some domains that this does not fix. Despite adding the Domain into the Custom Application/Site, the Logs indicate the website was still hitting HTTPS Inspection (seeing the yellow Action: Inspect in the logs) and it is saying there is "Untrusted Certificate."
If I do NSLOOKUP for the website, and create an IP-based Host Object, and use that in a Bypass Rule, (same results if i create a FQDN Domain object) now suddenly it successfully Bypasses inspection, and fixes the site for our user.
My question is why is this happening? Is this something upgrading to R81.20 could possibly fix? I am guessing bypassing inspection based on an IP Address (Host and/or FQDN objects) invokes the bypass "earlier" than doing it by Custom Application/Site URL List?
By the way, the symptom I've been seeing more and more is that when HTTPS Inspection is turned on, the website loads with a certificate error for the user, and the server certificate just says "Issued By: Untrusted." Once we successfully bypass HTTPS Inspection, then the certificate presented to the user is the "real" Cert from the vendor, signed by one of the big CAs.