This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
Keep Your Networking Peers Happy
With Secure SD-WAN
Infinity Events Improvements
Help us with the Short-Term Roadmap
Secure the GenAI Revolution!
The All-New GenAI Security from Check Point
CheckMates Toolbox Contest 2024
Make Your Submission for a Chance to WIN up to $300 Gift Card!
CheckMates Go:
Harmony Endpoint -- What's New and Deployment
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for Search instead for Did you mean:Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for Search instead for Did you mean:Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
2024-08-01 07:02 AMRunning into an issue where I need to bypass HTTPS inspection (R81.10 JHF 150); however, this is the URL:
https://eka-prod-xxx.s3-eu-west-1.amazonaws.com - xxx is the wildcard. Is there a good way to handle this?
The full URL in this case ended up being:
the_rock
2024-08-01 08:50 AMEasy peasy. just add *eka-prod* as wild card, thats what I did, no issues.
the_rock
2024-08-01 07:23 AMI just tested in the lab and worked fine, added to bypass rule like below.
2024-08-01 08:41 AMhttps://eka-prod-xxx.s3-eu-west-1.amazonaws.com/ isn't the actual URL it is using though, XXX is a placeholder for numerous other names.
I could add the highlighted URL to resolve the issue, but that section is dynamic and will be something else later. That's why I need to be able to do some sort of wildcard for the XXX portion of https://eka-prod-xxx.s3-eu-west-1.amazonaws.com/.
the_rock
2024-08-01 08:50 AMEasy peasy. just add *eka-prod* as wild card, thats what I did, no issues.
2024-08-01 09:12 AMAh, perfect, thanks! I forgot about the * wildcard option within custom Application/Site.
the_rock
2024-08-01 09:14 AMAll good. we are here to help
PhoneBoy
2024-08-16 12:42 PMFor run (and research purposes), I asked AI Copilot this question.
Here's a more verbose answer:
To handle bypassing HTTPS inspection for URLs with wildcards, such as the one you provided, you can use the following approach:
Source | Destination | Services | Action |
---|---|---|---|
Any | AmazonS3Wildcard | HTTPS | Bypass |
By following these steps, you should be able to bypass HTTPS inspection for URLs with wildcards effectively. If you encounter any issues, please refer to the relevant Check Point documentation or contact Check Point support for further assistance.
Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.
Learn more: