<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS inbound in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214072#M40871</link>
    <description>&lt;P&gt;I have real good doc for this, but it was made specifically by esc. guy for a customer, so cant share it sadly, but answers you got are logical.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Mon, 13 May 2024 17:04:42 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-05-13T17:04:42Z</dc:date>
    <item>
      <title>HTTPS inbound</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214010#M40850</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Does HTTPS inbound inspection requires a certificate from a well-known and trusted Certificate Authorities (CAs) that issue SSL/TLS certificates like&lt;BR /&gt;DigiCert&lt;BR /&gt;Comodo&lt;BR /&gt;GlobalSign&lt;BR /&gt;GoDaddy&lt;/P&gt;
&lt;P&gt;to be able to inspect inbound traffic without the TLS warning on browsers?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While outbound HTTPS inspection can be a valuable security tool, it has limitations when it comes to detecting malware on external websites. This inspection focuses on the traffic initiated by the client (your device) and cannot directly analyze the content of the response data sent back by the website.&lt;/P&gt;
&lt;P&gt;Is the above text 100% right&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 11:35:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214010#M40850</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-05-13T11:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inbound</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214015#M40852</link>
      <description>&lt;P&gt;Outbound inspection is for protecting LAN users accessing external websites on the Internet.&lt;/P&gt;
&lt;P&gt;Inbound inspection is guarding against attacks targeting your web servers in the DMZ for example.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/HTTPS-Inspection.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/HTTPS-Inspection.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 12:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214015#M40852</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-05-13T12:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inbound</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214018#M40854</link>
      <description>&lt;P&gt;so if an internal client is opening a milicious website, outbound inspection will detect the answer from that server and block it?&lt;/P&gt;
&lt;P&gt;Does HTTPS inbound inspection requires a certificate from a well-known and trusted Certificate Authorities (CAs) that issue SSL/TLS certificates like&lt;BR /&gt;DigiCert&lt;BR /&gt;Comodo&lt;BR /&gt;GlobalSign&lt;BR /&gt;GoDaddy&lt;/P&gt;
&lt;P&gt;to be able to inspect inbound traffic without the TLS warning on browsers?&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 12:43:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214018#M40854</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-05-13T12:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inbound</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214067#M40869</link>
      <description>&lt;P&gt;Depends on the site you are doing Inbound HTTPS Inspection on.&lt;BR /&gt;If that site should use a certificate that has been signed by a publicly trusted CA, so should the certificate you use in the Inbound HTTPS Inspection configuration.&lt;BR /&gt;Generally, the same cert is used for both.&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 16:42:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214067#M40869</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-05-13T16:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inbound</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214072#M40871</link>
      <description>&lt;P&gt;I have real good doc for this, but it was made specifically by esc. guy for a customer, so cant share it sadly, but answers you got are logical.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 17:04:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214072#M40871</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-13T17:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inbound</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214111#M40878</link>
      <description>&lt;P&gt;Please don't confuse 'Inbound' with 'reply' traffic. Anything referring to 'Inbound' is referring to connections established from outside your network, connecting in to a server you are hosting, for example you might be hosting a web server that people are connecting in to. In this case you'd need a publicly trusted server certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;'Outbound' is any connection opened from within your network out to the internet, and covers all the packets related to that connection. So a user downloading a file from the internet is an 'outbound' connection, because the user established the connection to the web server. This connection and the download of the file would be covered by the Outbound HTTPS Inspection configuration, and the CA certificate used for this. Only the user on your network needs to trust this CA cert, the external server is not doing any validation of the CA cert as it does not see it at all. It simply presents its server cert (ideally provided by a publicly trusted CA) to the world and it's up to the user PC to trust that cert.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 06:23:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214111#M40878</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-05-14T06:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS inbound</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214138#M40882</link>
      <description>&lt;P&gt;Excellent explanation.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 11:12:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/HTTPS-inbound/m-p/214138#M40882</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-14T11:12:29Z</dc:date>
    </item>
  </channel>
</rss>

