We have a strange situation for an outbound HTTPS connection that is going to a over a VPN to an external partner. We have confirmed that the TCP connection is up. We see the TCP 3-way handshake is completed. The issue is that when the server sends its certificate to the client, this server certificate is not received on the client.
The HTTPS inspection policy is bypassing the traffic
This is HTTPS using TLSv1.2 over the standard port 443.
The firewall cluster is R80.30
In SmartDashboard we have disabled a lot of the HTTPS validation.
There are no log entries for HTTPS inspection, even though the bypass rule should be logging the connections.
To be on the safe side we have imported the CA certificate as a trusted CA on the firewalls.
Has anyone had a similar situation or can offer some suggestions?