- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
we have a VSX implementation with 5 different VS, and for one of them we just enabled HTTPS-Inspection.
Unfortunately the users are complaining constantly about performance & sites that are not working properly. We have bypassed already dozens of sites, (even low/very low category), but it won't get better.
Besides sites that mitigate Inspection by design (banking), one main issue is that the first access to a page is extremely slow (e.g. apple.com). Afterwards, all other requests work fine. In older versions we had similar issues that we could fix with mechanisms like "probe bypass". But our VSX is running on 81.10, therefore probe bypass should be irrelevant (since 80.30).
The Site Categorization mode is set to "Hold", but despite changing it to "Background" (installing DB, installing VS-policy, installing VS0-policy), the changes are not having any effect on the behavior. Fail Mode is "fail-open".
The GWs are bored to death (10% CPU load during business hours).
Any ideas what else we could check or try to improve the user experience?
Some questions for context:
Have you checked if the trusted CA list is up to date?
Check Internet access works for CRL checks?
How is the HTTPS inspection policy structured?
Which JHF is the cluster currently installed with?
- Yes, CAs are fine
- Internet access works properly, but we get CRL detect messages in the logs (details below)
- Policy is simple with a few rules: Bypass by source, destination, URL/Category, "CP-recommended services" and afterwards an "inspect any"
- R81.10 T55
Regarding CRL: We saw constant detects, mainly to Microsoft services and I tried to trace that down.
I believe that this issue is because of an error in the certificate of MS itself -> the CRL link seems to contain a space at the end, therefore CP fails to access it:
This is the issue that occurs constantly, since the service seems to be accessed by Windows constantly. Otherwise there are only a few logs due to expired certs or similar.
Since we check the certificate as part of HTTPS Inspection (including the CRL), perhaps the issues with this are creating the delays?
I know you can disable CRL checking in HTTPS Inspection, which isn't necessarily recommended.
Regarding the HTTPS Inspection policy structure the following may be helpful for you:
I would suggest checking internet connectivity from the VSX cluster, including VS0. Check that DNS is working, and connections from your VSX GWs to Internet are not blocked.
the vsx is connected directly to the internet (nothing in between), all connections and checks are fine...
Then, if you cannot find any obvious issue, please take it with TAC.
According to your description, it sounds like a connectivity issue causing a delay with certificate validation, but it might be also something else. Aks support to look into this.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 20 | |
| 16 | |
| 5 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolFri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY