- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
March 11th @ 5pm CET / 12pm EDT
AI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Good afternoon, a few days ago, a problem with slow page loading appeared. Sometimes when loading a page, an error appears and after a couple of seconds the page loads completely.
At this point, the following errors may appear in the firewall logs:
Internal system error in HTTPS Inspection due to categorization service timeout
It turns out that the problem is not constant and appears from time to time, but there is no load on the CPU
We restarted the RAD process and there seemed to be no errors for a while, but then they continued to appear in the logs from time to time.
Have you encountered this behavior before?
We encountered this for the first time, since usually before, when we had problems with categorization, there was no access to the Internet at all, but now only at a certain time the pages start to load slowly
This is what I meant, but here are screenshots, just in case.
The behavior sounds consistent with issues related to RAD.
There are debug steps for it here: https://support.checkpoint.com/results/sk/sk92743
It's possible this may be fixed by applying the latest recommended JHF for your release.
More than likely, TAC will need to be involved.
Out of curioisity, how are blade settings configured in smart console? Will send screenshot later of what Im referring to.
This is what I meant, but here are screenshots, just in case.
mode: hold in http inspection and app control
http inspection: fail open
app control: fail close
enforce safe search +
I would try test it with settings I outlined. I honestly always found works best that way.
We set it up similarly and we stopped getting errors and it seems like resources are loading faster. We'll monitor it.
Glad it helped.
Unfortunately, there are still some problems with the connection download speed. In the logs, we see errors like "The probe detected that this destination cannot be inspected and its identity cannot be verified due to a TLS alert (TLS alert: protocol_version)"
The probe sent to destination has encountered a general error
The probe was unable to establish a TCP connection to the destination
Internal system error in HTTPS Inspection (Error Code: 2)
Out of interest are you already bypassing sites known to have issues with TLS inspection using the relevant updatable objects?
But what's strange is that the problem only concerns Wi-Fi networks; no other problems have been detected yet.
Are we talking about BYOD vs Corp Wi-Fi clients or both?
We have a bypass rule to the "internet" object, which contains all external subnet ranges.
Here is something I would test...disable quic in the policy and if still no progress, disable it in the browser itself. For example, for chrome, chrome://flags/ then search for quic and disable it. Restart browser and test.
The "Hold" mode causes this. I most often see this behavior when somebody enables URL filtering on an internal firewall which isn't allowed to talk out to the Internet. Suddenly all kinds of traffic has six seconds of latency per pass added to opening the connection (e.g, let's say clients go through the firewall to hit a load balancer, then the load balancer goes through the firewall again to get to the servers; that's two passes, so 12 seconds of latency).
Switching to Background provides immediate relief. Ultimately, you need to figure out why the firewall sometimes can't reach the categorization service.
I always found block and background options work the best.
Do you have any rules in your HTTPS inspection policy with 'Any' or non-HTTP based services?
Definitely good point Chris. I saw that be an issue before.
We have a couple of rules from hosts to specific resources with "any" in services. Could this also affect traffic that doesn't fall under this rule?
100% it could.
One thing you can also test is add website(s) with the issue to bypass rule and see if it helps.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 34 | |
| 18 | |
| 18 | |
| 16 | |
| 10 | |
| 10 | |
| 8 | |
| 7 | |
| 7 | |
| 7 |
Thu 12 Mar 2026 @ 05:00 PM (CET)
AI Security Masters Session 5: Powering Prevention: The AI Driving Check Point’s ThreatCloudTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEAThu 12 Mar 2026 @ 05:00 PM (CET)
AI Security Masters Session 5: Powering Prevention: The AI Driving Check Point’s ThreatCloudTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY