<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SFTP traffic Inspection via VPN Tunnel in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107048#M14324</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we havent't implented this feature yet but it is possible:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ThreatPrevention_AdminGuide/Content/Topics-TPG/Using_SSH_Inspection.htm" target="_blank"&gt;SSH Deep Packet Inspection (checkpoint.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This feature requires R80.40 as per documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Marcel&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jan 2021 15:42:32 GMT</pubDate>
    <dc:creator>Marcel_Gramalla</dc:creator>
    <dc:date>2021-01-05T15:42:32Z</dc:date>
    <item>
      <title>SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107046#M14323</link>
      <description>&lt;P&gt;Hello CheckMates,&lt;/P&gt;&lt;P&gt;I have below doubt to be implemented, can anyone shed some ideas on how to achieve.&lt;/P&gt;&lt;P&gt;1) I have CheckPoint ClusterHA deployed and VPN Tunnel is running towards Peer 3rd Party FW.&lt;/P&gt;&lt;P&gt;2) Enabled FW, VPN, IPS, APP/URL, AV, AB blades in CheckPoint.&lt;/P&gt;&lt;P&gt;3) Behind CheckPoint Cluster - we have SFTP Server in VPN Domain&lt;/P&gt;&lt;P&gt;4) Behind Peer 3rd FW - we have Client machine who will access our SFTP server via VPN Tunnel and upload files.&lt;/P&gt;&lt;P&gt;How can I inspect this SFTP traffic in CheckPoint?&lt;/P&gt;&lt;P&gt;Like, if I'm uploading any malware file onto our SFTP Server via VPN Tunnel from 3rdParty Client domain, will CheckPoint FW able to inspect this? (Either IPS or AV)&lt;/P&gt;&lt;P&gt;As per FW chain modules, at external interface of CheckPoint-decrypt happens and then moved to modules like IPS/AV into FW kernel. Then the packet reaches Internal SFTP server.&lt;/P&gt;&lt;P&gt;I cannot use HTTPS inspection Policy as it is not HTTP/S protocol.&lt;/P&gt;&lt;P&gt;Which way I can inspect this traffic which is passing via Tunnel and reaches CheckPoint and then to SFTP Server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: Under Threat Profile - under AV setting we see "Protocol-HTTP, FTP, SMTP" - will enabling FTP can work?&lt;/P&gt;&lt;P&gt;Also IPS can only check few of SFTP/FTP Protocols based on signatures only&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:34:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107046#M14323</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-05T15:34:00Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107048#M14324</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we havent't implented this feature yet but it is possible:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ThreatPrevention_AdminGuide/Content/Topics-TPG/Using_SSH_Inspection.htm" target="_blank"&gt;SSH Deep Packet Inspection (checkpoint.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This feature requires R80.40 as per documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Marcel&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:42:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107048#M14324</guid>
      <dc:creator>Marcel_Gramalla</dc:creator>
      <dc:date>2021-01-05T15:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107051#M14325</link>
      <description>&lt;P&gt;R80.40 has SSH Deep Packet inspection feature, which allows decrypting SFTP and SSH for inbound connections. Some details are here:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ThreatPrevention_AdminGuide/Topics-TPG/Using-SSH-Inspection.htm?Highlight=SSH%20DPI" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ThreatPrevention_AdminGuide/Topics-TPG/Using-SSH-Inspection.htm?Highlight=SSH%20DPI&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: inherit; background-color: #ffffff;"&gt;However, in your case VPN is complicating the issue.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:53:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107051#M14325</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-05T15:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107052#M14326</link>
      <description>&lt;P&gt;Hello Marcel,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes , SSH DPI can be used from R80.40 onwards in which AV &amp;amp; Sandblast can check inspection on SCP/FTP traffic which is new..&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;SCP and SFTP file transfers can be scanned using SSH Deep Packet Inspection"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But any idea how will it show or make the SFTP Traffic inspection? or anyone have tried this SSH DPI in R80.40 having results?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:56:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107052#M14326</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-05T15:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107053#M14327</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7881"&gt;@Prabulingam_N1&lt;/a&gt;&amp;nbsp;Please read the guide, you should have all you need there.&amp;nbsp;&lt;BR /&gt;Also, we do have customers using this feature.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 16:00:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107053#M14327</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-05T16:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107063#M14328</link>
      <description>&lt;P&gt;Hi Val,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes since my SFTP traffic from Peer side passes thru Tunnel and reaches CheckPoint - hope once CheckPoint decrypts then it can perform this inspection.&lt;/P&gt;&lt;P&gt;Let me try this once to see if really inspects or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 16:23:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107063#M14328</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-05T16:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107065#M14329</link>
      <description>&lt;P&gt;Most probably not. IPSec VPN tunnel here is an issue&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 16:27:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107065#M14329</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-05T16:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107069#M14330</link>
      <description>&lt;P&gt;Hi Val,&lt;/P&gt;&lt;P&gt;Since on FW chain modules (fw ctl chain) Inbound - Packet gets decrypted by FW, then moves into kernel modules for other blades to check, then goes into inbound towards Internal SFTP server. with this it should work.&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 16:37:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107069#M14330</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-05T16:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107070#M14331</link>
      <description>&lt;P&gt;Not that simple, but you can try anyway.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 16:39:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/107070#M14331</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-05T16:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108103#M14541</link>
      <description>&lt;P&gt;Dear Val,&lt;/P&gt;&lt;P&gt;I had setup SSH DPI as per Document.&lt;/P&gt;&lt;P&gt;Copied SFTP Server's Public/Private Key into FW and enabled thru command.&lt;/P&gt;&lt;P&gt;But how do I confirm if SFTP traffic gets Inspected or NOT.&lt;/P&gt;&lt;P&gt;No sign of related Logs on this traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 16:02:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108103#M14541</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-18T16:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108272#M14598</link>
      <description>&lt;P&gt;Did you setup security rules for inspection as well?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 09:46:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108272#M14598</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-20T09:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108736#M14712</link>
      <description>&lt;P&gt;Dear Val,&lt;/P&gt;&lt;P&gt;I had followed as per SSH DPI mentioned in R80.40 TP Admin guide.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Copied SFTP Server's Public/Private Key into FW and enabled thru command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Enabled AntiVirus &amp;amp; IPS Blade&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also enabled the option in AV Profile settings: "Process All file Types"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Im able to upload Eicar test file into my Internal SFTP Server successfully, and FW did NOT do any inspection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;No rules as such in Policies to Inspect like we have for HTTPS Policy, only enabling SSH DPI via command.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You had mentioned some customer had used this feature, can you help me in getting those info.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 09:06:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108736#M14712</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-25T09:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108737#M14713</link>
      <description>&lt;P&gt;You need inspection rules. Follow Threat Prevention guide I have referenced before. If you have any issue, please reach out to your local Check Point office or open a support request with TAC&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 09:15:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108737#M14713</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-25T09:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108738#M14714</link>
      <description>&lt;P&gt;Concerning the references, you can look here, for example:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48251#M9419" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48251#M9419&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 09:17:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108738#M14714</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-25T09:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108739#M14715</link>
      <description>&lt;P&gt;Also, what is your output for this?&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;cp&lt;/SPAN&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;ssh&lt;/SPAN&gt;&lt;SPAN&gt;_config istatus&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 09:21:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108739#M14715</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-25T09:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108743#M14717</link>
      <description>&lt;P&gt;Hello Val,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below the Output:&lt;/P&gt;&lt;P&gt;[Expert@FWSTDR8040:0]# cpssh_config istatus&lt;BR /&gt;&lt;STRONG&gt;SSH Inspection is enabled&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;[Expert@FWSTDR8040:0]# cpssh_config -q&lt;BR /&gt;This is available ID for set/get:&lt;BR /&gt;0: Global&lt;BR /&gt;1: KeyExchange&lt;BR /&gt;2: Cipher&lt;BR /&gt;3: Mac&lt;BR /&gt;4: Hostkey&lt;BR /&gt;[Global]&lt;STRONG&gt; Inspection_Enabled = 1&lt;/STRONG&gt;&lt;BR /&gt;[Global] Port_fowarding_Enabled = 1&lt;BR /&gt;[Global] Inspection_Forced = 1&lt;BR /&gt;[Global] Connection_Timeout_Sec = 2000000000&lt;BR /&gt;[KeyExchange] diffie-hellman-group-exchange-sha1 = 1&lt;BR /&gt;[KeyExchange] diffie-hellman-group-exchange-sha256 = 1&lt;BR /&gt;[Cipher] aes128-cbc = 1&lt;BR /&gt;[Cipher] aes256-cbc = 1&lt;BR /&gt;[Cipher] aes128-gcm@openssh.com = 1&lt;BR /&gt;[Cipher] aes256-gcm@openssh.com = 1&lt;BR /&gt;[Mac] MD5 = 1&lt;BR /&gt;[Mac] SHA1 = 1&lt;BR /&gt;[Mac] SHA256 = 1&lt;BR /&gt;[Mac] SHA384 = 1&lt;BR /&gt;[Mac] SHA512 = 1&lt;BR /&gt;[Hostkey] ssh-rsa = 1&lt;BR /&gt;[Hostkey] rsa-sha2-256 = 1&lt;BR /&gt;[Hostkey] rsa-sha2-512 = 1&lt;BR /&gt;[Expert@FWSTDR8040:0]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regads, Prabu&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 10:06:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108743#M14717</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-25T10:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108749#M14719</link>
      <description>&lt;P&gt;Okay, its seems to be enabled. I have told you from the start, I see VPN being an issue here, but the best cause of action is to run this with TAC&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 12:31:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108749#M14719</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-25T12:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108902#M14765</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dpi.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10368i4CC82593834CF88C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="dpi.png" alt="dpi.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Hello Val,&lt;/P&gt;&lt;P&gt;No worries.&lt;/P&gt;&lt;P&gt;I just did and got the result...Cool result in SSH DPI logs..&lt;/P&gt;&lt;P&gt;Traffic passing via VPN Tunnel.&lt;/P&gt;&lt;P&gt;Once FW decrypted, it gets into AV blade and got Prevented for Malware&lt;/P&gt;&lt;P&gt;(Used eicar.com file and uploaded into SFTP server via WinSCP in Client machine)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 15:34:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108902#M14765</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-26T15:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108912#M14767</link>
      <description>&lt;P&gt;Great, so what was the issue? Please share with us&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2021 16:49:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108912#M14767</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2021-01-26T16:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: SFTP traffic Inspection via VPN Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108932#M14770</link>
      <description>&lt;P&gt;Hello Val,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Performed Transparent method and could not get.&lt;/P&gt;&lt;P&gt;Hence made as&amp;nbsp;"non-transparent inspected SSH server" using only Public key of Server onto FW&amp;nbsp; - got it.&lt;/P&gt;&lt;P&gt;And enabled the "Process file which contain known Malware" under AV Profile setting &amp;amp; worked.&lt;/P&gt;&lt;P&gt;No additional rule in FW rulebase (VPN Rule between both Encryption domains is enough)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards, Prabu&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2021 04:02:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SFTP-traffic-Inspection-via-VPN-Tunnel/m-p/108932#M14770</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2021-01-27T04:02:33Z</dc:date>
    </item>
  </channel>
</rss>

