I have some questions about HTTPS inspection and I'm hoping to find some guidance from this group. I've started piloting HTTPS inspection and have been running into quite a bit of problems. I've upgraded my test firewall to R77.30 and enabled the Probe Bypass per sk104717 at Checkpoint Support's recommendation. I am still finding a lot of applications that fail when using HTTPS inspection that I have to put in manual rules to bypass the filters.
How many people are running HTTPS inspection on their firewalls? Are you doing it in production or just in a test environment?
For those of you running HTTPS inspection, have you found that a lot of sites/applications don't work with it? For example, I had to bypass all of the Apple services we use (App Store, iTunes, iCloud) plus manually add rules to recategorize a number of Apple domains that don't show up under those categories. I'm concerned that if I'm having to whitelist this many applications and sites in my testing, that I'm going to have a lot of issues when I roll out inspection to the whole office or company.
My policy bypasses Financial Services and Health categories to try and limit any PII information we get. We also bypass Web Conferencing because I found that they weren't working right with HTTPS inspection enabled. Do you have any other categories or common sites/applications that you have found don't work well with HTTPS inspection?
Thanks for any help/suggestions/warnings!
Jake
Bookmarks