<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title><![CDATA[Qbik New Zealand Limited]]></title>
<link><![CDATA[https://support.qbik.com/]]></link>
<description />
<generator><![CDATA[Kayako fusion v4.71.0]]></generator>
<item>
<title><![CDATA[Policy: Exempt sites from SSL Inspection]]></title>
<link><![CDATA[https://support.qbik.com/index.php?/Knowledgebase/Article/View/100]]></link>
<guid isPermaLink="false"><![CDATA[f899139df5e1059396431415e770c6dd]]></guid>
<pubDate><![CDATA[Wed, 11 Jul 2018 20:30:39 +1200]]></pubDate>
<dc:creator />
<description><![CDATA[
Background:
SSL inspection is required for WinGate to access HTTPS traffic for AV scanning, caching and web access rules.&nbsp; Some sites will validate the entire certificate chain and break the connection when it is inspected.&nbsp; These sites will ...]]></description>
<content:encoded><![CDATA[<hr />
<p>Background:</p>
<p>SSL inspection is required for WinGate to access HTTPS traffic for AV scanning, caching and web access rules.&nbsp; Some sites will validate the entire certificate chain and break the connection when it is inspected.&nbsp; These sites will need to be exempted from SSL inspection via policy.</p>
<hr />
<p>Task:</p>
<p>Create a policy to exempt sites from SSL Inspection</p>
<hr />
<p>Steps:</p>
<p>&nbsp;1. Create a new policy at Control Panel::Policy, for Any HTTP proxy, ConnectRequest event. Name the policy and enter a description if required.</p>
<p><img src="/kbimage/new_SSL_policy.png" alt="Create a new ConnectRequest policy" width="400" /></p>
<p>2. Build the policy:</p>
<ul>
<li>Drag the WWW Proxy Server:ConnectRequest event onto the workspace</li>
<li>Drag a Data boolean check onto the workspace. Enter Enable SSL inspection exemption policy into the Check boolean field. Name the element "Enable SSL inspection exemption policy?". Connect to the ConnectRequest event.</li>
<li>Drag a result to the No output of the boolean check and set the result to allow. Connect to the "Enable SSL inspection exemption policy?" element.</li>
<li>Drag a data list lookup onto the workspace.&nbsp; Enter or select {{Request.Server}} into the "Check that the value of" field, enter No SSL Inspection sites into the "Is contained in" field.&nbsp; Name the element "Is excepted site?". Connect to "Enable SSL inspection exemption policy?".</li>
<li>Drag an expression evaluator onto the workspace. Enter or select Session.EnableSSLInspection = "false". Uncheck "resolve expression into true/false result". Name the element "Disable SSL Inspection". Connect to the Yes output of "Is excepted site?".</li>
<li>Drag an expression evaluator onto the workspace. Enter or select Session.SetData("SSL_Inspection", Session.EnableSSLInspection), uncheck "resolve expression into true/false result". Name the element "Store SSL inspection state".&nbsp; Connect to the Yes output of the Disable SSL Inspection element and the No output of the Is excepted site element</li>
</ul>
<p><img src="/kbimage/SSL_inspection_exemption_policy.png" alt="Policy to exempt sites from SSL inspection" width="400" /></p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;Further tasks:</p>
<p>This policy will automatically create the boolean "Enable SSL inspection exemption policy" and the data list "No SSL Inspection sites" in Control Panel::Data::Global Data.&nbsp; The boolean can be used to create a button on a dashboard to quickly bypass the policy.&nbsp; The list of sites will need to be populated. Note that only the server part of the request will be added to the list, e.g. wingate.com, a URL will not be read. e.g. <a href="https://www.wingate.com/purchase/wingate/purchase.php">https://www.wingate.com/purchase/wingate/purchase.php</a>.</p>
<p>This policy allows the SSL inspection state to be logged, this must be added manually to the WWW Proxy Usage log.&nbsp; For information on adding this field to the log file, see this kb article.</p>]]></content:encoded>
</item>
</channel>
</rss>