<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound https inspection only in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57961#M85022</link>
    <description>&lt;P&gt;Thanks Nick. Yes I am aware of importing the internal server SSL certificates etc for configuring https inbound inspection.&lt;/P&gt;&lt;P&gt;I believe we need to delete the default https inspection rule, in order to stop the outbound https inspection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2019 20:26:25 GMT</pubDate>
    <dc:creator>Chandhrasekar_S</dc:creator>
    <dc:date>2019-07-10T20:26:25Z</dc:date>
    <item>
      <title>Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57933#M85018</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wanted to turn on Inbound https inspection only and not outbound. Is there a way to do this?&lt;/P&gt;&lt;P&gt;Going through documentation it says when you enable https inspection on the gateways, it creates an outbound CA certificate as well which means outbound https inspection is enabled as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chandru&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 15:51:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57933#M85018</guid>
      <dc:creator>Chandhrasekar_S</dc:creator>
      <dc:date>2019-07-10T15:51:57Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57938#M85019</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class=""&gt;&lt;A href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14756" target="_self"&gt;Chandhrasekar_S&lt;/A&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I don't know what version your gateway is but I believe you can still follow the guide for R80.10 as below:&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_NexGenSecurityGateway_Guide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_NexGenSecurityGateway_Guide/137006" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_NexGenSecurityGateway_Guide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_NexGenSecurityGateway_Guide/137006&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I would focus on this section:&lt;/P&gt;&lt;P class="procedureheading"&gt;To enable inbound HTTPS traffic inspection:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;From the SmartConsole&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Gateways &amp;amp; Servers&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;view, edit the Security Gateway object.&lt;/LI&gt;&lt;LI&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;HTTPS Inspection&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Step 3&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enable HTTPS Inspection&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;Import server certificates for servers behind the organization&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A title="Assigning a Server Certificate for Inbound HTTPS Inspection" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_NexGenSecurityGateway_Guide/137006.htm#o158148" target="_self"&gt;Security Gateways&lt;/A&gt;.&lt;/LI&gt;&lt;LI&gt;Define an HTTPS inspection policy:&lt;UL&gt;&lt;LI&gt;Create rules&lt;/LI&gt;&lt;LI&gt;Add a server certificate to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Certificate&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;column of each rule.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us know if that answers your question.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 17:55:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57938#M85019</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2019-07-10T17:55:54Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57943#M85020</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Nick,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are running R80.10 gateways. Under HTTPS Inspection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step1 : Outbound CA certificate creation&lt;/P&gt;&lt;P&gt;Step2:&amp;nbsp; Deploy outbound certificate in your organization (Which is we distributing the CA certificate to all the internal systems )&lt;/P&gt;&lt;P&gt;Its only in Step3: you enable HTTPS inspection, hence my question is it not possible to enable https inspection for inbound traffic only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https-inspection.png" style="width: 585px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1846iD47D929B95CCD386/image-size/large?v=v2&amp;amp;px=999" role="button" title="https-inspection.png" alt="https-inspection.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 18:20:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57943#M85020</guid>
      <dc:creator>Chandhrasekar_S</dc:creator>
      <dc:date>2019-07-10T18:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57948#M85021</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I can see the confusion but as far as I'm aware, it's still the same box that you have to tick in order to enable HTTPS inspection regardless of direction.&lt;/P&gt;&lt;P&gt;The main difference is that instead of exporting the outbound certificate etc you will need to import the server's certificate in the section shown below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Inbound HTTPS Inspection.PNG" style="width: 713px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1847iE67D9CD503722A88/image-dimensions/713x462?v=v2" width="713" height="462" role="button" title="Inbound HTTPS Inspection.PNG" alt="Inbound HTTPS Inspection.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my knowledge, you would need to import a certificate as I don't think you have the option to generate an inbound one on the gateway in the same way that you can for outbound certificates.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 19:09:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57948#M85021</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2019-07-10T19:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57961#M85022</link>
      <description>&lt;P&gt;Thanks Nick. Yes I am aware of importing the internal server SSL certificates etc for configuring https inbound inspection.&lt;/P&gt;&lt;P&gt;I believe we need to delete the default https inspection rule, in order to stop the outbound https inspection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 20:26:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/57961#M85022</guid>
      <dc:creator>Chandhrasekar_S</dc:creator>
      <dc:date>2019-07-10T20:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/58205#M85023</link>
      <description>You're correct.&lt;BR /&gt;While you may have to configure an outbound certificate as part of the process, if there is no outbound HTTPS Inspection rule, you won't get outbound HTTPS Inspection.</description>
      <pubDate>Mon, 15 Jul 2019 03:43:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/58205#M85023</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-07-15T03:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/107237#M85024</link>
      <description>&lt;P&gt;Bear with me as I try to resurrect this thread.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're using the Checkpoint outbound SSL/DLP inspection and that works well.&amp;nbsp; We tried once to configure the inbound SSL inspection for the sake of IPS/Malware control but were not successful - unfortunately, it's been a while and details on that are somewhat sketchy.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did anyone run into complications by configuring the inbound SSL inspection?&amp;nbsp; Any one-off site issues?&amp;nbsp; Any special cipher issues (as in, some supported/some not)?&amp;nbsp; Anything else I need to know before trying this again?&amp;nbsp; We on r80.40 and plan to upgrade to r81 1Q.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;KA&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2021 17:08:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/107237#M85024</guid>
      <dc:creator>Kevin</dc:creator>
      <dc:date>2021-01-07T17:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120244#M85025</link>
      <description>&lt;P&gt;I'm also looking to do only inbound (from Internet) HTTPS inspection.&amp;nbsp; Currently on R80.40, but plan to upgrade to R81 later this year.&lt;/P&gt;&lt;P&gt;The step in the documentation of "Create Rules" is pretty friggin' vague.&amp;nbsp; We have multiple hostnames an only one external IP address, so I need the ability to route each SNI hostname to a different internal IP.&amp;nbsp; Using NGINX configuration as an example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;server { 
  listen        443 ssl http2;
  server_name   web1.mydomain.com;
  location / { 
    proxy_pass          https://10.20.30.44:443;
    proxy_set_header    Host $host;
    proxy_http_version  1.1;
  }
  ssl_certificate     web1_mydomain_com.cer;
  ssl_certificate_key web1_mydomain_com.key;
  ssl_ciphers         ECDH+AESGCM:ECDH+AES128+SHA:RSA+AES128+SHA;
  ssl_prefer_server_ciphers on;
}

server { 
  listen        443 ssl http2;
  server_name   web2.mydomain.com;
  location / { 
    proxy_pass          https://10.20.30.65:443;
    proxy_set_header    Host $host;
    proxy_http_version  1.1;
  }
  ssl_certificate     web2_mydomain_com.cer;
  ssl_certificate_key web2_mydomain_com.key;
  ssl_ciphers         ECDH+AESGCM:ECDH+AES128+SHA:RSA+AES128+SHA;
  ssl_prefer_server_ciphers on;
}&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What would this look like in CheckPoint's HTTPS inspection rules?&amp;nbsp; I see fields for source, destination, services, and certificate, but no "translated destination" or "translated services" equivalent to the way you'd see in a NAT rule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2021 04:37:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120244#M85025</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-06-03T04:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120246#M85026</link>
      <description>&lt;P&gt;It would look like the answer I gave in this thread:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Is-there-SNI-support-for-inbound-HTTPS-inspection-in-R80-20/m-p/66650/highlight/true#M12858" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Is-there-SNI-support-for-inbound-HTTPS-inspection-in-R80-20/m-p/66650/highlight/true#M12858&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2021 04:49:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120246#M85026</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-03T04:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120251#M85027</link>
      <description>&lt;P&gt;Right, that shows how to match hostnames with server certificates, but doesn't address how to actually route the requests to the backend web server after inspection.&amp;nbsp; &amp;nbsp;Here's my screenshot in R80.40:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https_inspection_rules.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12025i392B30CC75FCCB9A/image-size/large?v=v2&amp;amp;px=999" role="button" title="https_inspection_rules.png" alt="https_inspection_rules.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When I got to the website, I do get the correct certificate, but the CheckPoint's GAIA portal is displayed.&amp;nbsp; This heavily implies the CheckPoint is just fowarding the traffic to itself, since I have the Platform portal set to "accessible only through internal interfaces"&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2021 06:34:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120251#M85027</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-06-03T06:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120255#M85028</link>
      <description>&lt;P&gt;I suspect what you're doing in this case won't work without another IP address.&lt;BR /&gt;You can try creating a NAT rule to redirect traffic to the external IP on port 443 to the relevant server on the backend.&lt;BR /&gt;If there is more than one IP involved on the backend, this definitely won't work.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2021 07:11:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120255#M85028</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-03T07:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound https inspection only</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120319#M85029</link>
      <description>&lt;P&gt;OK, so basically another HTTPS proxy will need to do the conversion between hostname and IP address/port.&amp;nbsp; That's actually fine: I didn't mention it for the sake of simplicity, but this is a cloud deployment where we terminate the site on external load balancers and they do that very well with a minimal cost.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, I just have each hostname hit a different external port on the CheckPoint cluster, and make some NAT rules to route to the corresponding internal web server:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https_inspection_nat_rules.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12029i6636F5C03ED1A64A/image-size/large?v=v2&amp;amp;px=999" role="button" title="https_inspection_nat_rules.png" alt="https_inspection_nat_rules.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Then write an inspection rule for those ports.&amp;nbsp; No need to configure hostname, since that's already being done on the external load balancer.&amp;nbsp; Likewise, a self-signed cert is fine since it doesn't perform backend server cert validation.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="https_inspection_rules_2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12031i2BA7D7A0688503BF/image-size/large?v=v2&amp;amp;px=999" role="button" title="https_inspection_rules_2.png" alt="https_inspection_rules_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The one thing that got me: the firewall policy must explicitly allow the CheckPoint's internal interface to talk to the backend web server.&amp;nbsp; This makes sense in hindsight since CheckPoints usually need an explicit rule when they initiate a connection, just was confusing to troubleshoot since the CheckPoint was reverting to bypass after a few seconds, giving the appearance that the inspection was slow or unreliable.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would think that NATing port 443 on the external interface would break the SSL VPN features, so that may not be a viable solution for everyone.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jun 2021 22:29:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Inbound-https-inspection-only/m-p/120319#M85029</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-06-03T22:29:34Z</dc:date>
    </item>
  </channel>
</rss>

