<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log for web proxy traffic with specification of request in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/113881#M15896</link>
    <description>&lt;P&gt;If it is logged it would be done only when detailed/extended logging is done in the relevant rule.&lt;BR /&gt;My guess is that it’s not and this would be an RFE.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Mar 2021 02:13:06 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-03-18T02:13:06Z</dc:date>
    <item>
      <title>Log for web proxy traffic with specification of request</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/113761#M15892</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;is there any possibility to view the traffic log with specification of requests as they come from clients to explicit web proxy server configured at Checkpoint gateway (R80.30)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;On CP GW: HTTPS Inspection is disabled, X-Forwarded-For is enabled.&lt;/P&gt;&lt;P&gt;Something in style of squid web proxy log, where one can find info about command sent by client, e.g. "CONNECT &amp;lt;dns hostname&amp;gt;:443", "GET &lt;A href="http://&amp;lt;dns" target="_blank"&gt;http://&amp;lt;dns&lt;/A&gt; hostname&amp;gt;/blah.js"&lt;/P&gt;&lt;P&gt;The main aim is to be able to put together client (source) IP address and remote (destination) URL, while the traffic is passing three web proxy servers on its way to destination. Checkpoint explicit web proxy is the first one in the proxy chain, the one contacted by client. There I can see client's source IP address, but destination's IP address is IP address of CP web proxy. The squid web proxy is the second one and there I can find destination URL, but source IP address is IP address of CP web proxy, not the real client's IP adress.&lt;/P&gt;&lt;P&gt;Most of traffic is encrypted, so client's IP address stored in HTTP header X-Forwarded-For is not visible at squid web proxy.&lt;/P&gt;&lt;P&gt;Thank you for any advice or comment&lt;/P&gt;&lt;P&gt;milos&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 08:51:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/113761#M15892</guid>
      <dc:creator>m1l05</dc:creator>
      <dc:date>2021-03-17T08:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: Log for web proxy traffic with specification of request</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/113881#M15896</link>
      <description>&lt;P&gt;If it is logged it would be done only when detailed/extended logging is done in the relevant rule.&lt;BR /&gt;My guess is that it’s not and this would be an RFE.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 02:13:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/113881#M15896</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-03-18T02:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: Log for web proxy traffic with specification of request</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/114216#M15968</link>
      <description>&lt;P&gt;Thank you for pointing me to the right direction. I'll check it out.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Mar 2021 10:31:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/114216#M15968</guid>
      <dc:creator>m1l05</dc:creator>
      <dc:date>2021-03-22T10:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: Log for web proxy traffic with specification of request</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/138880#M21149</link>
      <description>&lt;P&gt;Did you do a RFE? If so, what kind of response did you get?&lt;/P&gt;&lt;P&gt;We are in a simular situation, where network traffic from hardened networks are directed to a specific explicit proxy for internet access. However, the log visibility is very poor due to the lack of information regarding destination URL and client source IP address. Now we have to first lookup which proxy node is active, and filter on that as source. It becomes a guessing game.&lt;/P&gt;&lt;P&gt;X-Forwarded-For is enabled and I can see that header in tcpdump, but extended or detailed logging don't seem to get it. Not even when browsing unencrypted HTTP content. I have put togethered a custom log profile containing all kinds of fields that I hoped could help but they'll stay empty in testing.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 12:50:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-for-web-proxy-traffic-with-specification-of-request/m-p/138880#M21149</guid>
      <dc:creator>FredrikV</dc:creator>
      <dc:date>2022-01-19T12:50:51Z</dc:date>
    </item>
  </channel>
</rss>

