<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Connection Flow. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203268#M38245</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have a question.&lt;BR /&gt;I have a FW in version R81.10 with JHF Take 110.&lt;/P&gt;
&lt;P&gt;In my LAN I have a Mail Server (On Premise) published to the Internet.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Server Certificate has been updated.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When the users from the LAN try to access the Mail Server, everything flows fine (they don't get the alert in the browser that &lt;STRONG&gt;"The connection is not secure".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;On the other hand, when we try to access from the Internet to the mail server, pointing to the domain, the result is that &lt;STRONG&gt;"THE CONNECTION IS NOT SECURE".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In this kind of scenarios, it is necessary and mandatory, to "import" the certificate in the Firewall, from the SmartDashboard Legacy, referring to the HTTPS Inspection?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CA1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/24084i3E8891928248D7BB/image-size/large?v=v2&amp;amp;px=999" role="button" title="CA1.png" alt="CA1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Greetings.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jan 2024 21:50:18 GMT</pubDate>
    <dc:creator>Matlu</dc:creator>
    <dc:date>2024-01-16T21:50:18Z</dc:date>
    <item>
      <title>Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203268#M38245</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have a question.&lt;BR /&gt;I have a FW in version R81.10 with JHF Take 110.&lt;/P&gt;
&lt;P&gt;In my LAN I have a Mail Server (On Premise) published to the Internet.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;The Server Certificate has been updated.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;When the users from the LAN try to access the Mail Server, everything flows fine (they don't get the alert in the browser that &lt;STRONG&gt;"The connection is not secure".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;On the other hand, when we try to access from the Internet to the mail server, pointing to the domain, the result is that &lt;STRONG&gt;"THE CONNECTION IS NOT SECURE".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In this kind of scenarios, it is necessary and mandatory, to "import" the certificate in the Firewall, from the SmartDashboard Legacy, referring to the HTTPS Inspection?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CA1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/24084i3E8891928248D7BB/image-size/large?v=v2&amp;amp;px=999" role="button" title="CA1.png" alt="CA1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Greetings.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 21:50:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203268#M38245</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2024-01-16T21:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203270#M38246</link>
      <description>&lt;P&gt;Sounds like public dns record issue. Do nslookup of the domain the output should match the public ip that you use on the firewall for this server. If dns record ip does not match you get warning&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 22:09:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203270#M38246</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-01-16T22:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203272#M38247</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;In my case, it does match.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CA2.png" style="width: 383px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/24085i1EAD15A55D8F9327/image-size/large?v=v2&amp;amp;px=999" role="button" title="CA2.png" alt="CA2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;When from the Internet, I do a NSLOOKUP to the domain, if I resolve the Public IP that has been designated in the Firewall, for the connection to the mail server.&lt;/P&gt;
&lt;P&gt;Is it necessary to import the certificate of the mail server, to the Firewall, to avoid these "alerts" from the Internet connections?&lt;/P&gt;
&lt;P&gt;Greetings.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 22:24:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203272#M38247</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2024-01-16T22:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203277#M38248</link>
      <description>&lt;P&gt;Ola bro,&lt;/P&gt;
&lt;P&gt;Happy New Year : - )&lt;/P&gt;
&lt;P&gt;I dont think importing that cert has anything to do with it, that simply related to inbound https inspection.&lt;/P&gt;
&lt;P&gt;What&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;said makes sense to me as well.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 01:09:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203277#M38248</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-17T01:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203278#M38249</link>
      <description>&lt;P&gt;Hey bro, cert is only needed if you are doing INBOUND https inspection, otherwise, no need to import it into smart console. Same as if you were doing outbound ssl inspection, cert has to be uploaded to users, so those warnings dont show up.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 02:23:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203278#M38249</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-17T02:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203279#M38250</link>
      <description>&lt;P&gt;Buddy,&lt;BR /&gt;&lt;BR /&gt;This type of scenario is when the FIREWALL acts as a "WAF", isn't it?&lt;/P&gt;
&lt;P&gt;Most of my client's rules only had rules based on "OUTBOUND" traffic&lt;/P&gt;
&lt;P&gt;They have HTTPS Inspection enabled, but only for LAN -&amp;gt; WAN traffic, not the other way around.&lt;/P&gt;
&lt;P&gt;The problem that I get in the browser, the message "The connection is not secure" from the Internet, when I try to access the published mail server, it would be an issue to check with the DNS provider of the client, right?&lt;BR /&gt;&lt;BR /&gt;Cheers. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 02:34:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203279#M38250</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2024-01-17T02:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203281#M38252</link>
      <description>&lt;P&gt;I got ya. You can try that, wont make it worse, see if it makes any difference.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 03:06:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203281#M38252</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-17T03:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203331#M38281</link>
      <description>&lt;P&gt;I have done some research.&lt;/P&gt;
&lt;P&gt;Apparently it's a "registration" problem at the "DNS service" level.&lt;/P&gt;
&lt;P&gt;I understand that to prevent Internet users from getting the certificate error "The connection is not secure", you have to publish the domain in a MX record of my DNS service ... at least something like that is what I have understood.&lt;/P&gt;
&lt;P&gt;Does this make sense?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 12:22:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203331#M38281</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2024-01-17T12:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: Connection Flow.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203333#M38283</link>
      <description>&lt;P&gt;100% makes sense&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 12:27:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connection-Flow/m-p/203333#M38283</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-17T12:27:03Z</dc:date>
    </item>
  </channel>
</rss>

