<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.rosemarknetworks.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Firebox_Content_Inspection</id>
	<title>Firebox Content Inspection - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.rosemarknetworks.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Firebox_Content_Inspection"/>
	<link rel="alternate" type="text/html" href="https://www.rosemarknetworks.com/wiki/index.php?title=Firebox_Content_Inspection&amp;action=history"/>
	<updated>2026-05-01T11:54:09Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://www.rosemarknetworks.com/wiki/index.php?title=Firebox_Content_Inspection&amp;diff=74&amp;oldid=prev</id>
		<title>Rosemark at 21:37, 8 October 2024</title>
		<link rel="alternate" type="text/html" href="https://www.rosemarknetworks.com/wiki/index.php?title=Firebox_Content_Inspection&amp;diff=74&amp;oldid=prev"/>
		<updated>2024-10-08T21:37:32Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 21:37, 8 October 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l61&quot;&gt;Line 61:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 61:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Troubleshooting Firefox ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Troubleshooting Firefox ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There&#039;s a very good chance that you will now discover that you still cannot &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;invalid &lt;/del&gt;content without being prompted with the bad certificate screen if you use Firefox on your client machine. This is because Firefox does not implicitly trust root enterprise certificates.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;There&#039;s a very good chance that you will now discover that you still cannot &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;view blocked &lt;/ins&gt;content without being prompted with the bad certificate screen if you use Firefox on your client machine. This is because Firefox does not implicitly trust root enterprise certificates.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;To test if your certificate is working at all, in the Firefox URL bar type about:config and press continue past the warning that appears. Search for &amp;quot;enterprise&amp;quot; and enable the enterprise roots rule, then restart Firefox and attempt again. It should now work, but you probably do not want to do this to every single computer running Firefox.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;To test if your certificate is working at all, in the Firefox URL bar type about:config and press continue past the warning that appears. Search for &amp;quot;enterprise&amp;quot; and enable the enterprise roots rule, then restart Firefox and attempt again. It should now work, but you probably do not want to do this to every single computer running Firefox.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[https://community.spiceworks.com/how_to/138802-configure-firefox-to-use-windows-certificate-store-via-gpo This guide from spiceworks will allow you to fix this through GPO!]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[https://community.spiceworks.com/how_to/138802-configure-firefox-to-use-windows-certificate-store-via-gpo This guide from spiceworks will allow you to fix this through GPO!]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rosemark</name></author>
	</entry>
	<entry>
		<id>https://www.rosemarknetworks.com/wiki/index.php?title=Firebox_Content_Inspection&amp;diff=54&amp;oldid=prev</id>
		<title>Rosemark: 1 revision imported</title>
		<link rel="alternate" type="text/html" href="https://www.rosemarknetworks.com/wiki/index.php?title=Firebox_Content_Inspection&amp;diff=54&amp;oldid=prev"/>
		<updated>2024-10-08T15:02:02Z</updated>

		<summary type="html">&lt;p&gt;1 revision imported&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:02, 8 October 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-notice&quot; lang=&quot;en&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(No difference)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Rosemark</name></author>
	</entry>
	<entry>
		<id>https://www.rosemarknetworks.com/wiki/index.php?title=Firebox_Content_Inspection&amp;diff=53&amp;oldid=prev</id>
		<title>wikipedia&gt;Maeve at 20:23, 18 November 2023</title>
		<link rel="alternate" type="text/html" href="https://www.rosemarknetworks.com/wiki/index.php?title=Firebox_Content_Inspection&amp;diff=53&amp;oldid=prev"/>
		<updated>2023-11-18T20:23:19Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[Category:Heard County School District]]&lt;br /&gt;
The following guide describes the system in place that allows Heard County School District to allow / deny HTTP(S) content coming from the internet.&lt;br /&gt;
&lt;br /&gt;
== Overview ==&lt;br /&gt;
Firebox firewalls have a feature called Web Blocker which utilizes HTTPS Content Inspection. [http://www.watchguard.com/help/docs/help-center/en-US/content/en-us/Fireware/services/webblocker/webblocker_about_c.html WebBlocker] intercepts incoming traffic from the internet and analyzes it against a customizable table of rules to determine if it contains materials that violate the rules of the organization. Aside from the initial configuration, WebBlocker creates a problematic situation for any websites being served across SSL. It has to decrypt the HTTPS packets to analyze them for inappropriate content. This means that the firewall has to re-encrypt the pages with its own self-signed SSL certificate before passing it to the user, but the user doesn&amp;#039;t automatically trust this certificate, and the average user does not know how to navigate this issue. &lt;br /&gt;
&lt;br /&gt;
There are two possible solutions: you can distribute the self-signed certificate to each machine directly or replace the certificate with one signed by a third party certificate authority (CA). &lt;br /&gt;
&lt;br /&gt;
Using a third party certificate authority (CA) is the best and most highly recommended option as, if you have to replace the firewall, it&amp;#039;s going to have a completely different self-signed certificate and the clients will no longer trust it. This problem is irrelevant in the case of a third party CA as you only have to reissue / reinstall the certificate to the firewall, and it&amp;#039;s implicitly trusted by the clients already.&lt;br /&gt;
&lt;br /&gt;
== Certificate Authority ==&lt;br /&gt;
Setting up an enterprise CA can be a daunting task depending on your usecase. What we&amp;#039;re aiming for here is to create a new [[Public Key Infrastructure|PKI]], where the root certificate is distributed to all client machines, and then the root certificate is used to sign a re-signing certificate (similar to an intermediary leaf in other, larger PKIs) that gets used to sign the content from inspected websites. &lt;br /&gt;
&lt;br /&gt;
One system that fits this perfectly is the Windows Active Directory Certificate Services role. &lt;br /&gt;
&lt;br /&gt;
Set up a machine in your AD domain and give it a static IP and hostname. Ensure that the hostname is exactly what you want it to be. &amp;#039;&amp;#039;&amp;#039;Certificate Services breaks completely if you ever change it.&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
When installing the role, make sure the following are all set:&lt;br /&gt;
&lt;br /&gt;
[[File:ADCSRoles.png|620x620px]]&lt;br /&gt;
&lt;br /&gt;
When configuring the roles after the install, ensure that the options &amp;quot;Root CA&amp;quot; and &amp;quot;Enterprise CA&amp;quot; are selected. Root CA sets it to create a new root certificate which will be the start of our PKI. Enterprise distributes the root CA to all machines in the domain. &lt;br /&gt;
&lt;br /&gt;
Also select the rest of the roles that were installed above when configuring. You don&amp;#039;t have to do anything special to them, this just enables them.&lt;br /&gt;
&lt;br /&gt;
It&amp;#039;s a good idea to now run gpupdate /force and then reboot the machine.&lt;br /&gt;
&lt;br /&gt;
Now, after you do this, open a web browser and navigate to http://[fqdn of the machine including domain]/certsrv. A login prompt at the top of your screen will appear. Log in with a domain administrator account. Make sure you include the domain prefix if you&amp;#039;re using &amp;quot;Administrator&amp;quot; or else it will log in using the local admin privileges of that machine, which do NOT include &amp;quot;network admin&amp;quot; privileges. &lt;br /&gt;
&lt;br /&gt;
== Generate the CSR ==&lt;br /&gt;
Now that we have our PKI infrastructure in place, we need to generate the signing certificate in the Fireware Web UI.&lt;br /&gt;
&lt;br /&gt;
From the Fireware Web UI, go to &amp;#039;&amp;#039;&amp;#039;System &amp;gt; Certificates&amp;#039;&amp;#039;&amp;#039; and select &amp;#039;&amp;#039;&amp;#039;Create CSR&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
Press &amp;#039;&amp;#039;&amp;#039;Next.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
From the list of options that appears, select &amp;#039;&amp;#039;&amp;#039;Proxy Authority&amp;#039;&amp;#039;&amp;#039; (not &amp;#039;&amp;#039;Proxy Server&amp;#039;&amp;#039;). &lt;br /&gt;
&lt;br /&gt;
Fill out the following fields with either the defaults listed or with the information for your domain depending on the form.&lt;br /&gt;
&lt;br /&gt;
At the end, you will have a CSR. Copy this and go to the url referenced previously, http://[fqdn of the machine including domain]/certsrv, and log in. &lt;br /&gt;
&lt;br /&gt;
Select &amp;#039;&amp;#039;&amp;#039;Request a certificate.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Choose &amp;#039;&amp;#039;&amp;#039;advanced certificate request.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Paste your CSR into the box above and from the dropdown select &amp;#039;&amp;#039;&amp;#039;Subordinate Certificate Authority.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
From the results page, download the file as base 64. &lt;br /&gt;
&lt;br /&gt;
Now, we also need to export the root CA and import it.&lt;br /&gt;
&lt;br /&gt;
== Import Certificates ==&lt;br /&gt;
From certsrv, select &amp;#039;&amp;#039;&amp;#039;Download a CA certificate, certificate chain, or CRL&amp;#039;&amp;#039;&amp;#039;. &lt;br /&gt;
&lt;br /&gt;
Select &amp;#039;&amp;#039;&amp;#039;Download CA Certificate&amp;#039;&amp;#039;&amp;#039; and download the file.&lt;br /&gt;
&lt;br /&gt;
From the Fireware Web UI Certificate page we previously navigated to, select &amp;#039;&amp;#039;&amp;#039;Import&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;Import Certificate&amp;#039;&amp;#039;&amp;#039;. Select &amp;#039;&amp;#039;&amp;#039;General Use&amp;#039;&amp;#039;&amp;#039;. Import the root certificate we just downloaded. Repeat this procedure for the signing certificate, but select &amp;#039;&amp;#039;&amp;#039;Proxy Authority.&amp;#039;&amp;#039;&amp;#039; This will replace the existing Proxy Authority certificate and webblocker will now use your new one. &lt;br /&gt;
&lt;br /&gt;
You may now test this by attempting to access invalid content.&lt;br /&gt;
&lt;br /&gt;
== Troubleshooting Firefox ==&lt;br /&gt;
There&amp;#039;s a very good chance that you will now discover that you still cannot invalid content without being prompted with the bad certificate screen if you use Firefox on your client machine. This is because Firefox does not implicitly trust root enterprise certificates.&lt;br /&gt;
&lt;br /&gt;
To test if your certificate is working at all, in the Firefox URL bar type about:config and press continue past the warning that appears. Search for &amp;quot;enterprise&amp;quot; and enable the enterprise roots rule, then restart Firefox and attempt again. It should now work, but you probably do not want to do this to every single computer running Firefox.&lt;br /&gt;
&lt;br /&gt;
[https://community.spiceworks.com/how_to/138802-configure-firefox-to-use-windows-certificate-store-via-gpo This guide from spiceworks will allow you to fix this through GPO!]&lt;/div&gt;</summary>
		<author><name>wikipedia&gt;Maeve</name></author>
	</entry>
</feed>