For the last few months we had been seeing a steady increase in sites that did not suffer undergoing HTTPS inspection issues very well, and a small handful that we could not even create reliable "Bypass" rules for.
Our upgrade path was from R77.30 to R80.30 on the gateways, and an export/import to our new R80.30 management server.
We had been given a number of options by both CP and our support partners, all of which sadly failed, but I and a colleague dug a little deeper, and found the real cause and fix.
One of the sites in question was https://roccochiou.weebly.com/
When attempting to connect to this site, due to some local settings I will come to, a TLS1.1 connection was attempted, at the TLS Record layer (outer for simplicity) but TLS1.2 at the Client Hello layer (Inner).
Due to a known issue, documented in https://github.com/openssl/openssl/blob/OpenSSL_1_1_1-stable/ssl/record/rec_layer_s3.c#L850, this would cause the site to fail to load.
Advice given was to rebuild our firewalls to R80.30, which we didn't and would have failed anyway, and adding the sites certificate/chain, to the firewall list of trusted CA's, which also didn't work.
What it turned out to be in the end was an SK we followed back in 2017, when we were still running R77.30.
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
In essence, this was to enable enchanced SSL inpspection and also raise the "ssl_min_ver" to TLS1.1.
During a more recent ticket, again with sites failing to load, we were advised to turn off the enhanced SSL inspection issue, but we had forgotten about the "tsl_min_ver". I just happened to run a search for "HTTPS Inspection TLS1.1" on this forum, and found an article that jogged my memory, and solved the issue for us by changing the "ssl_min_ver" back to its default value of "TLS1.0"
My take on this, on reflection, is that the ticket had dragged on for weeks with no end in site, had repeatedly resisted our requests for escalation, and overall could have been handled better. One bit of advice we thought of, as part of support staff's scripts would be:
1. Ask the customer whether they have any non-default values set on relevant tables.
2. Possibly have a script that would trawl a customers database for non-default values, then inspect tables relevant to the issue at hand.
With hindsight being 20:20 its easy to make these suggestions, but hopefully they would speed up ticket resolution, and would be applicable to other issues, not just HTTPS Inspection.
Howard