This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
I could add the highlighted URL to resolve the issue, but that section is dynamic and will be something else later. That's why I need to be able to do some sort of wildcard for the XXX portion of https://eka-prod-xxx.s3-eu-west-1.amazonaws.com/.
For run (and research purposes), I asked AI Copilot this question. Here's a more verbose answer:
To handle bypassing HTTPS inspection for URLs with wildcards, such as the one you provided, you can use the following approach:
Solution: Bypass HTTPS Inspection Using Wildcards
Create a Custom Application/Site Object:
Open SmartConsole.
Go toSecurity Policies.
Click onApplication/SiteunderShared Objects.
ClickNew>Application/Site.
Name the object (e.g.,AmazonS3Wildcard).
In theURLfield, enter the wildcard URL:*.s3.eu-west-1.amazonaws.com.
ClickOKto save the object.
Create an HTTPS Inspection Bypass Rule:
In SmartConsole, go toSecurity Policies.
Click onHTTPS Inspection>Policy.
Add a new rule at the top of the policy:
Name: Bypass Amazon S3
Source: Any (or specify the relevant source if needed)
Destination: Add theAmazonS3Wildcardobject created earlier.
Services: HTTPS (or specify the relevant HTTPS services)
Action: Bypass
ClickOKto save the rule.
Install the Policy:
Install the Access Control policy to apply the changes.
Example Rule Configuration
Source
Destination
Services
Action
Any
AmazonS3Wildcard
HTTPS
Bypass
Important Notes:
Wildcard Handling: Ensure that the wildcard pattern correctly matches the URLs you intend to bypass.
Policy Order: Place the bypass rule at the top of the HTTPS Inspection policy to ensure it is matched before other rules.
Testing: After applying the policy, test accessing the URL to confirm that the bypass is working as expected.
By following these steps, you should be able to bypass HTTPS inspection for URLs with wildcards effectively. If you encounter any issues, please refer to the relevant Check Point documentation or contact Check Point support for further assistance.
BE AWARE
Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.