- Products
- Learn
- Local User Groups
- Partners
- More
Check Point Jump-Start Online Training
Now Available on CheckMates for Beginners!
Why do Hackers Love IoT Devices so Much?
Join our TechTalk on Aug 17, at 5PM CET | 11AM EST
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
The SMB Cyber Master
Boost your knowledge on Quantum Spark SMB gateways!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hi, I'm trying to use inbound https inspection with site category but I'm getting this error:
Internal system error in HTTPS Inspection (Error Code: 2)
If I remove the site category the inspection works fine, but this is not an option for me since all of my domains points to the same webserver.
My goal is to create a custom site+rule with the corresponding certificate for every domain.
This is the rule:
I'm using a non-standard port since the gateway is in AWS and the traffic is received from a load balancer. I have added the port in the Application Control & URL filtering Advanced Settings but the error persist.
It's necessary to enable the Application Control and/or URL filtering blades on the gateway for this to work? When I have tryed it I get the error "URL filtering blade is not responding" and I can not install policy.
Any hint will be apprecieted, thank you
Regards
Alex
OK, now I have to find the reason why I can not activate the blade...
Thank you!
EDIT: I dont know why but at second attempt I have been able to install policy and the error is gone. Now I have the Application control blade enabled but I'm still getting the "Internal system error in HTTPS Inspection (Error Code: 2)" message.
I keep investigating.
It's working.
I leave here my experience in case it is helpful to someone else:
I'm not sure if the fact that our web server works with SNI / virtualhost affects inspection in some way but, in my case, the inspection only works with Application Control and URL Filtering blades both enabled.
Only with AC I get Internal system error in HTTPS Inspection (Error Code: 2)
Trying to only enable URL Filtering the policy installation fails with "Policy installation failed on gateway. If the problem persists contact Check Point support (Error code: 0-2000112)."
With both enabled, the inspection is working and the IPS is blocking correctly the HTTPS urls that match the IPS protections.
Now I'm stepping forward testing with two domains/rules:
When I test the first domain, the first rule matches the traffic and does the inspection.
When I test the second domain, the second rule does not match the traffic.
I'll keep updating.
Not surprised, the APCL and URLF blades while separate, are heavily intertwined in both policy configuration and implementation since R75.40. I've seen some odd behavior in my training lab when trying to enable only one of them.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY