This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Transparent Proxy > Exclude HTTPS

Hi, we have the HTTP/S proxy set to transparent but we do not currently want HTTPS traffic checked. Is there a way to exclude HTTPS traffic so it can be viewed in a browser etc?


This thread was automatically locked due to age.
Parents
  • Chris, what do you see in the Packet Filter log?  If there's no hint there, check the Intrusion Prevention log.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • Chris, what do you see in the Packet Filter log?  If there's no hint there, check the Intrusion Prevention log.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
  • Chris, what do you see in the Packet Filter log?  If there's no hint there, check the Intrusion Prevention log.

    Cheers - Bob


    Ok, had a quick look, the packet filter log has the following examples:


    09:26:54
    Default DROP
    TCP
    192.168.0.81:54573→66.151.158.177:443
     [SYN]
     len=52
     ttl=127
     tos=0x00
     srcmac=bc:ae:c5:9a:23:56
     dstmac=b8:ac:6f:12:ac:ba
     
    09:26:55
    Default DROP
    TCP
    192.168.0.81:54562→80.238.2.216:443
    [SYN]
    len=48
    ttl=127
    tos=0x00
    srcmac=bc:ae:c5:9a:23:56
    dstmac=b8:ac:6f:12:ac:ba
     
    09:26:55
    Default DROP
    TCP
    192.168.0.81:54561→80.238.2.216:443
    [SYN]
    len=48
    ttl=127
    tos=0x00
    srcmac=bc:ae:c5:9a:23:56
    dstmac=b8:ac:6f:12:ac:ba
     
    09:26:56
    Default DROP
    TCP
    192.168.0.81:54569→66.151.158.177:443
    [SYN]
    len=52
    ttl=127
    tos=0x00
    srcmac=bc:ae:c5:9a:23:56
    dstmac=b8:ac:6f:12:ac:ba
     
    09:26:57
    Default DROP
    TCP
    192.168.0.81:54573→66.151.158.177:443
    [SYN]
    len=52
    ttl=127
    tos=0x00
    srcmac=bc:ae:c5:9a:23:56
    dstmac=b8:ac:6f:12:ac:ba
     
    Also, we do not have intrusion prevention active so the log is empty.

    Thanks
    Chris