<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Reverse proxy or NAT rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Reverse-proxy-or-NAT-rules/m-p/225411#M43370</link>
    <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I have some internal web services and applications and I need to publish it to Internet. Which mechanism recommended use for best practice on Checkpoint: DNAT or Reverse proxy? It is both may solve the task, but which the best for security or performance?&lt;/P&gt;</description>
    <pubDate>Tue, 03 Sep 2024 07:36:34 GMT</pubDate>
    <dc:creator>Ildar07</dc:creator>
    <dc:date>2024-09-03T07:36:34Z</dc:date>
    <item>
      <title>Reverse proxy or NAT rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Reverse-proxy-or-NAT-rules/m-p/225411#M43370</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;I have some internal web services and applications and I need to publish it to Internet. Which mechanism recommended use for best practice on Checkpoint: DNAT or Reverse proxy? It is both may solve the task, but which the best for security or performance?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 07:36:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Reverse-proxy-or-NAT-rules/m-p/225411#M43370</guid>
      <dc:creator>Ildar07</dc:creator>
      <dc:date>2024-09-03T07:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse proxy or NAT rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Reverse-proxy-or-NAT-rules/m-p/225434#M43376</link>
      <description>&lt;P&gt;Static NAT is mostly used. See &lt;A href="https://support.checkpoint.com/results/sk/sk172933" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk172933&lt;/A&gt;&amp;nbsp;and &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/Configuring-NAT-Policy.htm?TocPath=Creating%20an%20Access%20Control%20Policy%7CConfiguring%20the%20NAT%20Policy%7C_____0" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/Configuring-NAT-Policy.htm?TocPath=Creating%20an%20Access%20Control%20Policy%7CConfiguring%20the%20NAT%20Policy%7C_____0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 11:34:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Reverse-proxy-or-NAT-rules/m-p/225434#M43376</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-09-03T11:34:49Z</dc:date>
    </item>
  </channel>
</rss>

