Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Content Gateway SSL Certificate Verification > Certificate Verification Failures and Remediation Options
Certificate Verification Failures and Remediation Options
When certificate verification fails, an access denied message is displayed to the user and an incident is recorded in the SSL Incident List.
If the CVE blocks access to a site believed to be safe, the administrator should research the failure in the Incident List, and may want to research the status of the destination host.
Certificate verification failures occur for the following reasons:
 
Important 
1.
2.
3.
4.
5.
6.
7.
8.
9.
List of common certificate verification error messages
See the Troubleshooting Certificate Verification Failures section for more information on each of these errors.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Remediation
Certificate verification failures can be remediated in several ways.
 
Important 
The primary remediation options include:
1.
2.
3.
4.
Using the CVE Verification Bypass option to give users the ability to proceed to a site after certificate verification fails.
SSL trusted certificate store
When Content Gateway is installed, Certificate Authorities trusted by Mozilla Firefox and Microsoft Internet Explorer, and Apple Safari are included in the SSL trusted certificate store.
The list is accessed in the Content Gateway manager on the Configure > SSL > Certificates > Certificate Authorities tab.
Content Gateway trusts web servers that offer these certificates. Note that a lowercase "i" appears before the name of some certificates validated via CRL (certificate revocation lists) or OCSP (online certification status protocol). These certificates provide URLs where their revocation status can be verified. See Keeping revocation information up to date.
You can manually add, delete, or change the status of a certificate.
Help system information on SSL certificate management starts here.
SSL transaction logging
SSL transaction logs are sent to the same systems logs as those used by HTTP. Content Gateway transaction logging is described here.
Bypass options
Bypass is the term used to describe several methods of specifically allowing a request to circumvent (bypass) all or select features of Content Gateway. Full proxy bypass is often called tunneling.
In this discussion take note of when bypass affects:
*
*
*
These are the primary bypass methods:
*
*
*
*
*
*
Allow users to continue after verification failure (Configure > SSL > Validation > Verification Bypass)
SSL Decryption Category bypass and Hostname/IP address bypass
In the Web module of Forcepoint Security Manager you can specify categories, client IP addresses, or destination hostname/IP addresses of websites for which SSL decryption and inspection are not performed. See SSL Decryption Bypass.
The SSL Incident List
The SSL Incident List is the principal SSL decryption and certificate verification bypass mechanism in Content Gateway. In addition to automatically adding certificate verification failures (incidents) to the list, administrators can manually add destination URLs.
Administrators should set "Action:Allow" to bypass certificate verification (the check is made but has no effect). Administrators should use "Action:Tunnel" to bypass certificate verification and SSL decryption. See Managing Web HTTPS site access.
Content Gateway ARM bypass
See Interception bypass.
Explicit proxy PAC file bypass
See:
*
*
Transparent proxy Access Control List (ACL) bypass
See the vendor documentation for your transparent routing device.
SSL Verification Bypass
See SSL Verification bypass.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Content Gateway SSL Certificate Verification > Certificate Verification Failures and Remediation Options
Copyright 2022 Forcepoint. All rights reserved.