Got it

An 'https' warning still appears each time we try to connect to the https URL Highlighted

Latest reply: Dec 19, 2021 21:48:32 1406 13 8 0 2

Hello everyone,

Today I'll share with you how to handle the "https" warning when you connect to an https URL.

[Issue]

Configured the SSL-encrypted Traffic Detection Function on USG to check content security of decrypted traffic Using the below configuration example :

https://support.huawei.com/hedex/pages/EDOC1000154459AEH0731H/07/EDOC1000154459AEH0731H/07/resources/admin/sec_admin_decrption_policy_0017.html?ft=0&fe=10&hib=6.16.7.3&id=sec_admin_ssldecrypt_0009&text=Web%3A%20Example%20for%20Using%20the%20SSL-encrypted%20Traffic%20Detection%20Function%20to%20Protect%20Client&docid=EDOC1000154459

 Although FW ssl certificate is installed on client PC the https warning is still appears each time you try to connect to https URL which consider as bad experience for customer.

082411xwx4pz0onf7fofca.jpg?1.jpg

[Analysis]

After checking the configuration and the Mechanism of the SSL-encrypted Traffic Detection we found that this behavior is because there is no  CA certificate issued by a trusted organization imported to the firewall .


082523b36go9tkok96wda3.jpg?2.jpg


Let me explain why simply

The firewall works as a proxy between the HTTPS server and the client to be able to encrypt and decrypt the traffic between them .

When we configure SSL-encrypted Traffic Detection we create 2 certificates on the firewall.

082701h9rjzsicbt9qqcj2.jpg?3.jpg


One of them that we mark is as Trusted.

082713slwqwsizwqifws0r.jpg?4.jpg

And the other one marked as Untrusted.

082738as000hvp8nvnx0oe.jpg?5.jpg

Only the trusted certificate is uploaded to the client and make it trusted on PC.

The main idea is when and why the USG use these 2 certificates which will be explained shortly.

082852h19jmrmmaam9mm7j.jpg?6.jpg

The firewall Receive certificate from the HTTPS server to be able to encrypt and decrypt the traffic between the server and USG …. Then the USG validate the HTTPS server certificate using the uploaded CA certificate issued by the trusted organization that should be imported to the firewall.

The result of the validation will make the firewall decide which certificate (trusted or the untrusted) to send to the client after modifying it as above so the USG can encrypt and decrypt traffic from and to the client.

If the server certificate is validated successfully , the USG send the client the trusted SSL decryption certificate which is uploaded and trusted on the client so there will be no warning message .

If the server certificate is not validated , the USG will send the untrusted SSL decryption certificate to the client which is not uploaded and trusted on the client so there will be warning message to warn the users that the server certificate is not validated and make them choose wither to proceed or not.

Please refer to the following:

083001sv32wcqjwvinv3j2.jpg?7.jpg


083014nz33x65e3388b8h5.jpg?8.jpg

[Root cause]

There is no CA certificate issued by a trusted organization imported to the firewall.

082523b36go9tkok96wda3.jpg?2.jpg

[Solution]

Import the CA certificate issued by a trusted organization.

Choose Object > Certificates > CA Certificates.

083210lvvv9wmool8nvsnw.png?9.png

Click Update to import the CA certificate.

083247r9coa7w1p6x5ax47.jpg?10.jpg

Or as a work arround you can upload the untrusted SSL decryption certificate to the client ( such as the trusted SSL decryption certificate ) and in this case even if the HTTPS server certificate is not validated and the USG sent the untrusted SSL decryption certificate to the client there will no warning messege appear.

This is what I want to share with you today, thank you!


thanks, I used to encountered this problem, and it cost me a lot of time to solve it.
if I had read your post that time, the troubleshooting would be easier.
View more
  • x
  • convention:

Mohamed_Mostafa
Mohamed_Mostafa Created Jul 20, 2019 14:05:51 (0) (0)
Welcome bro  
very good, thanks for your sharing
View more
  • x
  • convention:

Mohamed_Mostafa
Mohamed_Mostafa Created Jul 20, 2019 14:06:07 (0) (0)
Welcome bro  
Great! Very useful thanks. Recommend you a learning Huawei certification website: spotoclub.com
View more
  • x
  • convention:

Mohamed_Mostafa
Mohamed_Mostafa Created Jul 20, 2019 14:06:44 (0) (0)
thanks bro  
Nice job, thanks
View more
  • x
  • convention:

good efforts thanks for sharing with us
View more
  • x
  • convention:

thanks dear
View more
  • x
  • convention:

Posted by MPatel at 2019-09-23 03:33 good efforts thanks for sharing with us
Welcome dear
View more
  • x
  • convention:

i was facing the same problem it really works and of course a good effort. thanks for sharing
View more
  • x
  • convention:

Welcome dear
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.