<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Let's Encrypt forward requests to the correct internal server (DNS-NAT) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257176#M50387</link>
    <description>&lt;P&gt;The best approach is to use a single certificate, with alt names for all your web applications, centralize the renewal in one server that listens to port 80 with the validation path&amp;nbsp;/.well-known/acme-challenge correctly configured and use a renew hook script to copy the new cert to all your apps.&lt;BR /&gt;&lt;BR /&gt;This approach would also let you use the certificate with inbound HTTPS Inspection, which you can automate using the Management API. To do that, create an inspection rule, get the rule UID, add the new certificate via API and replace the cert used in the rule. You cannot overwrite a certificate, just upload the new one and modify the rule.&lt;/P&gt;</description>
    <pubDate>Fri, 12 Sep 2025 14:23:35 GMT</pubDate>
    <dc:creator>Pedro_Espindola</dc:creator>
    <dc:date>2025-09-12T14:23:35Z</dc:date>
    <item>
      <title>Let's Encrypt forward requests to the correct internal server (DNS-NAT)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/256991#M50365</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have successfully been running Let's Encrypt certificate renewals.&lt;BR /&gt;There is a security rule for Let's Encrypt IPs on port 80 to our web server's external IP addresses and corresponding NAT rules for forwarding to the internal web servers. This works very well.&lt;/P&gt;&lt;P&gt;Now, however, several internal web servers are hiding behind one external IP, all of which want to renew a Let's Encrypt certificate with different domains.&lt;/P&gt;&lt;P&gt;How do I set up a Checkpoint Security Gateway so that the requested domain is read from Let's Encrypt accesses and then forwarded to the correct internal web server?&lt;BR /&gt;You can specify domains or FQDNs in the NAT rule, but then you also have to specify a domain name for the destination. However, the name is then resolved using either the external or internal IP address and therefore doesn't match the external or internal object entry.&lt;/P&gt;&lt;P&gt;So, how can I filter and forward requests based on the requested domain?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 08:31:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/256991#M50365</guid>
      <dc:creator>Sebastian757</dc:creator>
      <dc:date>2025-09-10T08:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: Let's Encrypt forward requests to the correct internal server (DNS-NAT)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257046#M50368</link>
      <description>&lt;P&gt;NAT does nothing for the Layer 7 information inside of HTTP, only the IP headers.&lt;BR /&gt;In any case, this is more like&amp;nbsp;Reverse Proxy functionality:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk110348" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk110348&lt;/A&gt;&lt;BR /&gt;Not sure it will work in this case, otherwise you're looking at an &lt;A href="https://usercenter.checkpoint.com/ucapps/rfe/" target="_self"&gt;RFE&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2025 17:11:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257046#M50368</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-10T17:11:29Z</dc:date>
    </item>
    <item>
      <title>Re: Let's Encrypt forward requests to the correct internal server (DNS-NAT)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257170#M50386</link>
      <description>&lt;P&gt;Might be worth TAC case to verify.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 13:21:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257170#M50386</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-09-12T13:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Let's Encrypt forward requests to the correct internal server (DNS-NAT)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257176#M50387</link>
      <description>&lt;P&gt;The best approach is to use a single certificate, with alt names for all your web applications, centralize the renewal in one server that listens to port 80 with the validation path&amp;nbsp;/.well-known/acme-challenge correctly configured and use a renew hook script to copy the new cert to all your apps.&lt;BR /&gt;&lt;BR /&gt;This approach would also let you use the certificate with inbound HTTPS Inspection, which you can automate using the Management API. To do that, create an inspection rule, get the rule UID, add the new certificate via API and replace the cert used in the rule. You cannot overwrite a certificate, just upload the new one and modify the rule.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 14:23:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257176#M50387</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2025-09-12T14:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Let's Encrypt forward requests to the correct internal server (DNS-NAT)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257177#M50388</link>
      <description>&lt;P&gt;Isn't the Mobile Access Reverse Proxy available only after logging in? That would prevent the inbound validation connection from Let's Encrypt.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 14:26:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257177#M50388</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2025-09-12T14:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: Let's Encrypt forward requests to the correct internal server (DNS-NAT)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257198#M50391</link>
      <description>&lt;P&gt;This is a feature of Mobile Access Blade but this is not the Mobile Access Portal.&lt;BR /&gt;It won't require logging in.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 22:12:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Let-s-Encrypt-forward-requests-to-the-correct-internal-server/m-p/257198#M50391</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-12T22:12:59Z</dc:date>
    </item>
  </channel>
</rss>

