Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos UTM 9 HTTPS Blocking Behaviour

I am evaluating a Sophos 9.601-5 appliance using AWS AMI Marketplace. The goal is to replace a Squid proxy solution.

For blocked HTTPS pages, the desire is that when the client issues the HTTP Connect method they are immediately returned a 403 Forbidden. When I setup the Sophos UTM device the behaviour is to return back a self-signed certificate and a block page. The problem is this self-signed certificate will break clients and there is no easy way to roll out a root CA.

Is there any way to change this behaviour?

Thanks for your help.



This thread was automatically locked due to age.
Parents
  • Hi Joel and welcome to the UTM Community!

    Doug already gave an excellent answer, but I'm a bit confused by your question - is this what you want when the client tries to access a page with HTTP when only HTTPS is allowed?  Where are the clients?  Are they your coworkers or is this a service?  Are you looking for the functionality of Webserver Protection and have just tested Web Filtering?

    Cheers - Bob
    PS Moving this thread to the Web Protection forum.

Reply
  • Hi Joel and welcome to the UTM Community!

    Doug already gave an excellent answer, but I'm a bit confused by your question - is this what you want when the client tries to access a page with HTTP when only HTTPS is allowed?  Where are the clients?  Are they your coworkers or is this a service?  Are you looking for the functionality of Webserver Protection and have just tested Web Filtering?

    Cheers - Bob
    PS Moving this thread to the Web Protection forum.

Children