<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound HTTPS Inspection with OCSP Stapling in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/51352#M10150</link>
    <description>Not sure it’s something we support as, at least on typical web servers, this function has to be explicitly enabled and I’m not aware of a way to do that.</description>
    <pubDate>Fri, 19 Apr 2019 12:16:53 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-04-19T12:16:53Z</dc:date>
    <item>
      <title>Inbound HTTPS Inspection with OCSP Stapling</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/51134#M10097</link>
      <description>&lt;P&gt;Hello mates,&lt;/P&gt;&lt;P&gt;I have one question regarding Certificate Transparency and Inbound HTTPS Inspection. Is it possible to use OCSP Stapling with Inbound HTTPS Inspection?&lt;/P&gt;&lt;P&gt;Thanks for answer&lt;/P&gt;&lt;P&gt;Juraj&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 07:46:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/51134#M10097</guid>
      <dc:creator>Juraj_Sakala</dc:creator>
      <dc:date>2019-04-17T07:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection with OCSP Stapling</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/51352#M10150</link>
      <description>Not sure it’s something we support as, at least on typical web servers, this function has to be explicitly enabled and I’m not aware of a way to do that.</description>
      <pubDate>Fri, 19 Apr 2019 12:16:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/51352#M10150</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-04-19T12:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection with OCSP Stapling</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/191423#M32087</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Any new info on this?&lt;/P&gt;&lt;P&gt;Or what was the solution?&lt;/P&gt;</description>
      <pubDate>Sun, 03 Sep 2023 10:01:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/191423#M32087</guid>
      <dc:creator>Zolo</dc:creator>
      <dc:date>2023-09-03T10:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inspection with OCSP Stapling</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/191430#M32091</link>
      <description>&lt;P&gt;Nope - you can not do that since checkpoint ReverseProxy CLI does not support such changes. Instead why not you use Reverse Proxy on nginx and perform the changes. I always do that instead of natting the servers on CheckPoint.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Sep 2023 13:25:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Inbound-HTTPS-Inspection-with-OCSP-Stapling/m-p/191430#M32091</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-09-03T13:25:04Z</dc:date>
    </item>
  </channel>
</rss>

