Application not working with HTTPS inspection

From Secure Web Gateway
Revision as of 00:31, 25 July 2021 by Manish (talk | contribs) (1 revision imported)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Business challenge

The HTTPS inspection Bypass option enables you to define specific websites that are not subject to decryption as they flow through the proxy. Some websites may include personal identification information that should not be decrypt. In order to avoid liability for inspecting this type of information, you may want to specify some or all of these sites for decryption bypass. The selected sites will not be decrypt even if the category or categories that the sites belong to are selected for SSL analysis.

Note : Tunneling application is the group of applications which is specially made for bypassing applications which are not working with HTTPS inspection.We have list of some default applications if any application which is not included in Tunneling application, that application you have to select manually from magic suggest.

Here will give you an example of how to bypass an application which is not working with HTTPS inspection.

 

To bypass HTTPS Inspection enabled SafeSquid default configuration

Access the SafeSquid User Interface

BypassSSL1 (1).png
 

BypassSSL1 (2).png

Search policy : "BYPASS SSL INSPECTION" to Search

 
BypassSSL1 (3).png

 

Edit policy to Enable as TRUE (Inspection Policies)

 
BypassSSL1 (4).png
BypassSSL1 (5).png
BypassSSL1 (6).png

 

Edit policies and profiles to Enable as TRUE

 
BypassSSL1 (7).png

 

How to create new policy to bypass HTTPS Inspection

 
SslSlide8.PNG

 

Go to Request Types

 
SslSlide9.PNG
 
BypassSSLSlide1 (10).png
 
BypassSSLSlide1 (11).png
 
BypassSSLSlide1 (12).png
 
BypassSSLSlide1 (13).png

 

Go to  Access Policies

 
BypassSSLSlide1 (14).png
 
BypassSSLSlide1 (15).png
 
BypassSSLSlide1 (16).png
 

Note: Configure Proxy settings in drop box and upload/download files to validate the working