Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Your connection is not Private

Hi, 

purchased an XGS2100 to replace our SG230 for our Public WiFi connection.

The device is not on a domain and has its own internet connection. It is only used for members of the public to get access to the internet on their own  personal devices, mobiles, laptops and tablets etc. We have APX320 access points connected to the device. 

Using the default Web Policy with Source Any Zone Any Host, and Destination Wan Any host   Any Service

Have a hotspot set up with Terms and conditions front page sign in.

A user can connect to the Wifi, then a screen pops up.

SSL Certificate Not Trusted. The security certificate for this network is not from a trusted authority. We do not recommend that you connect to this network.

They can continue and accept the terms and conditions.

After that, a large number of webites show up with the Error, Your connection is not Private. Attackers  etc.  CERT-Authority-Invalid

Is it because their device doesnt have the SSL installed ? if so, how do I get their device to do this so they can acess the internet?

or is it the message we get when trying to access blocked sites and the Blocked site message doesnt show?

Thanks

Trev



This thread was automatically locked due to age.
Parents
  • Please read
    HTTPS Decrypt and Scan FAQ

    You have two choices:
    Decrypt traffic - all HTTPS sites will be decrypted and any user without the CA will get the browser warning for all HTTPS sites.

    Do not decrypt traffic - only HTTPS that we need to display a block page will get the browser warning before the block page

    I am pretty sure you want the latter.  If you want you can configure the proxy so that HTTPS blocks will just drop the connection rather than display a block page (signed with the CA).

Reply
  • Please read
    HTTPS Decrypt and Scan FAQ

    You have two choices:
    Decrypt traffic - all HTTPS sites will be decrypted and any user without the CA will get the browser warning for all HTTPS sites.

    Do not decrypt traffic - only HTTPS that we need to display a block page will get the browser warning before the block page

    I am pretty sure you want the latter.  If you want you can configure the proxy so that HTTPS blocks will just drop the connection rather than display a block page (signed with the CA).

Children
No Data