We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda Web Security Gateway

Block Pages, SSL Inspection and HTTPS Filtering

  • Last updated on

If you only need to apply block policies by domain and/or domain (content) categories, you can enable HTTPS filtering on the 210 and higher as opposed to using SSL Inspection. Unlike SSL Inspection, HTTPS filtering does not decrypt the encrypted portion of URLs. This prevents monitoring or capturing of social media interactions such as posts, chat, comments, shares, etc.

HTTPS Filtering and Block Pages

  • With firmware 14.1 and above, the user is always served a block page per policy when SSL Inspection is enabled. With older versions of firmware, there are occasional conditions when a block page is not served per policy when HTTPS Filtering is enabled AND SSL Inspection is enabled in Transparent mode.
  • If client traffic is not using Server Name Indication (SNI) (i.e. using SSLv3 and lower), then immediately after you enable this option, any client machines that had previously established an HTTPS session are communicating with an IP address and will not be blocked. In this situation, the HTTPS website IP address remains in the DNS client resolver cache (as well as in the DNS table on the core router or domain controller) until the DNS request time-to-live (TTL) expires. This can take up to a day or two, depending upon how the HTTPS sites configure TTL.

When HTTPS access is denied, the user is only presented with a block page if you also set Enable HTTPS Blockpage to Yes on the BLOCK/ACCEPT > Configuration page. Otherwise, the user is not presented with a block page. Note that the user will get an error message in their browser when attempting to visit blocked domains over HTTPS with the following configuration:

  • SSL Inspection is disabled, and
  • The SSL certificate has been removed from / not installed in the user's browser, and
  • The Enable HTTP Blockpage feature is set to YES on the BLOCK/ACCEPT > Configuration page.

Visiting a blocked HTTPS website with this configuration will result in the following pages presented to the user:

HTTPSBLockPage1.png

If the user clicks Advanced, the following page is served:

HTTPSBLockPage2.png

If the user clicked Proceed to <domain name> (unsafe), then the a block page is served:

HTTPSBLockpage3.png

Use cases for this configuration:
  • Guest user, internet cafe, hotel, etc.
  • Administrator does not want to install certificates in users' browsers.

Note that, with this configuration, each time users try to visit another domain, they will see the warning again.

See also Block Messages and Using SSL Inspection With the Barracuda Web Security Gateway.

Last updated on