<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Gateway as HTTP/HTTPS proxy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159899#M28131</link>
    <description>&lt;P&gt;First of all, an HTTP proxy won't work if the HTTP that comes across it is not well formed.&lt;BR /&gt;Beyond that, yes, you can do further limiting with App Control and/or IPS.&lt;BR /&gt;You will probably also need HTTPS Inspection enabled as well.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Oct 2022 22:29:05 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-10-18T22:29:05Z</dc:date>
    <item>
      <title>Gateway as HTTP/HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159888#M28128</link>
      <description>&lt;P&gt;If the firewall is configured as HTTP/HTTPS proxy, and user is using for example SSH over HTTP, does the firewall proxy this traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 20:03:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159888#M28128</guid>
      <dc:creator>dianammar</dc:creator>
      <dc:date>2022-10-18T20:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway as HTTP/HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159893#M28129</link>
      <description>&lt;P&gt;While we support being configured as an (explicit) HTTP/HTTPS proxy, it's not a configuration we generally recommend.&lt;BR /&gt;Performance characteristics of proxy mode are substantially different and recommend you work with your Check Point SE to ensure your gateways are appropriately sized for such a configuration.&lt;/P&gt;
&lt;P&gt;To answer your specific question, it entirely depends on how the SSH traffic is being tunneled as to whether it will be detected or not.&lt;BR /&gt;It also depends on whether you've enabled IPS and have the SSH over Non-Standard Port signature enabled (how such behavior is typically detected).&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 20:14:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159893#M28129</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-18T20:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway as HTTP/HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159894#M28130</link>
      <description>&lt;P&gt;So in general, can we limit any other protocols so they don't be passed by the proxy if they run over HTTP or HTTPS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 20:25:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159894#M28130</guid>
      <dc:creator>dianammar</dc:creator>
      <dc:date>2022-10-18T20:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway as HTTP/HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159899#M28131</link>
      <description>&lt;P&gt;First of all, an HTTP proxy won't work if the HTTP that comes across it is not well formed.&lt;BR /&gt;Beyond that, yes, you can do further limiting with App Control and/or IPS.&lt;BR /&gt;You will probably also need HTTPS Inspection enabled as well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 22:29:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159899#M28131</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-18T22:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway as HTTP/HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159902#M28132</link>
      <description>&lt;P&gt;Yes, note protocol signatures may also be something to explore here e.g.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="proto sig.png" style="width: 609px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18163iF05D091916E3CB20/image-size/large?v=v2&amp;amp;px=999" role="button" title="proto sig.png" alt="proto sig.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2022 01:08:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/159902#M28132</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-10-19T01:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway as HTTP/HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/160078#M28177</link>
      <description>&lt;P&gt;On your case, would it be possible to consider using SSH DPI ?&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ThreatPrevention_AdminGuide/Topics-TPG/Using-SSH-Inspection.htm?Highlight=ssh%20inspection%20" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ThreatPrevention_AdminGuide/Topics-TPG/Using-SSH-Inspection.htm?Highlight=ssh%20inspection%20&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Oct 2022 16:22:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/160078#M28177</guid>
      <dc:creator>rrbranco</dc:creator>
      <dc:date>2022-10-20T16:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: Gateway as HTTP/HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/160266#M28227</link>
      <description>&lt;P&gt;Thanks everyone. We might consider SSH DPI for SSH traffic as well as inforcing policies with App control&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2022 15:34:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Gateway-as-HTTP-HTTPS-proxy/m-p/160266#M28227</guid>
      <dc:creator>dianammar</dc:creator>
      <dc:date>2022-10-24T15:34:55Z</dc:date>
    </item>
  </channel>
</rss>

