<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4389#M10471</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Apologies, but I have to paste the entire SK here to get to the bottom of it.&lt;/P&gt;&lt;P&gt;Please scroll down to the highlighted sections and please help me understand the implications of these perls of wisdom:&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;R80.10 Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;UL style="padding: 0px 0px 0px 30px;"&gt;&lt;LI style="margin-left: 1.0in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;In order to make the Proxy Server to work on R80.10, an explicit rule should be created allowing traffic to the gateway itself on the proxy defined port.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.0in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;When using URL Filtering, an explicit rule should be created to match the URL categorization.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;-----&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;(3) Limitations&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="color: #3d3d3d;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTP/HTTPS proxy support is&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;limited&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;for the following features/configurations:&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE style="color: #3d3d3d; border: 1px solid transparent; margin: -1px -1px 2px;"&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTPS traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black; background: yellow;"&gt;Not supported in Transparent Proxy configuration when the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: red; background: yellow;"&gt;HTTPS traffic ports are configured in the 'ports' section of the proxy configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;EM style="color: black; font-size: 10.5pt;"&gt;No active plans&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;The following features/configuration are&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG style="color: #000000;"&gt;supported&lt;/STRONG&gt;&lt;SPAN style="color: #000000;"&gt;, but might require some adjustments:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE style="border: 1px solid transparent; margin: -1px -1px 2px;"&gt;&lt;TBODY style="border: inherit solid inherit;"&gt;&lt;TR style="border: inherit solid inherit;"&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTPS traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black; background: yellow;"&gt;Supported in Non-Transparent Proxy configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 16.5pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;-----&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;For what its worth, this seem to do the trick:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62927_pastedImage_2.png" style="width: 864px; height: 92px;" /&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;With Proxy configured thus:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62928_pastedImage_3.png" style="width: 620px; height: 569px;" /&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;And the proxy checker actually returns:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62929_pastedImage_4.png" style="width: 620px; height: 482px;" /&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;But since I have HTTPS inspection enabled, I have no means to discern if that traffic is being proxied or inspected inline which, in case of HTTPS may not be different anyhow, as the session is broken-down in two and the certificates will be substituted in both cases:&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 16.5pt;"&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62930_pastedImage_5.png" style="width: 620px; height: 268px;" /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 16.5pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 16.5pt;"&gt;How to configure Check Point Security Gateway as HTTP/HTTPS Proxy&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; border: none; padding: 0in;"&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;Top of Form&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;" width="20"&gt;&lt;/TD&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;" width="20"&gt;&lt;/TD&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;" width="20"&gt;&lt;/TD&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;" width="20"&gt;&lt;/TD&gt;&lt;TD style="padding: .75pt .75pt .75pt .75pt;" width="20"&gt;&lt;/TD&gt;&lt;TD style="padding: .75pt .75pt .75pt 3.75pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Rate This&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin-bottom: .0001pt; border: none; padding: 0in;"&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;Bottom of Form&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 9.5pt; color: black;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doShowfavoritespage"&gt;&lt;SPAN style="font-size: 10.5pt; color: #ba2454;"&gt;My Favorites&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 9.5pt; color: black;"&gt;&lt;A href="mailto:?subject=Check%20Point%20SecureKnowledge%20Solution&amp;amp;body=Solution%20Title:%20How%20to%20configure%20Check%20Point%20Security%20Gateway%20as%20HTTP/HTTPS%20Proxy%0D%0ASolution%20ID:%20sk110013%0D%0ASolution%20Link:%20https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails%3D%26solutionid%3Dsk110013%20%20%20%20%0D%0A-------------------------------------------------------------%20%0D%0AFor%20Disclaimer%20of%20Warranty%20and%20Copyright%20info:%20http://www.checkpoint.com/copyright.html"&gt;&lt;SPAN style="font-size: 10.5pt; color: #ba2454; text-decoration: none;"&gt;Email&lt;/SPAN&gt;&lt;/A&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal/media-type/html/role/supportcenterUser/page/print.psml?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doPrintsolution=&amp;amp;solutionid=sk110013"&gt;&lt;SPAN style="font-size: 10.5pt; color: #ba2454; text-decoration: none;"&gt;Print&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; padding: .75pt 3.75pt .75pt 9.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Solution ID&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; border-left: none; padding: .75pt 22.5pt .75pt 13.5pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;sk110013&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; border-top: none; padding: .75pt 3.75pt .75pt 9.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Product&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: solid #E3E3E3 1.0pt; border-right: solid #E3E3E3 1.0pt; padding: .75pt 22.5pt .75pt 13.5pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Security Gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; border-top: none; padding: .75pt 3.75pt .75pt 9.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Version&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: solid #E3E3E3 1.0pt; border-right: solid #E3E3E3 1.0pt; padding: .75pt 22.5pt .75pt 13.5pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;R75.40, R75.40VS, R75.45, R75.46, R75.47, R76, R76SP, R76SP.10, R76SP.10_VSLS, R76SP.20, R76SP.30, R76SP.40, R77, R77.10, R77.20, R77.30, R80.10&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; border-top: none; padding: .75pt 3.75pt .75pt 9.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;OS&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: solid #E3E3E3 1.0pt; border-right: solid #E3E3E3 1.0pt; padding: .75pt 22.5pt .75pt 13.5pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Gaia, SecurePlatform 2.6&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; border-top: none; padding: .75pt 3.75pt .75pt 9.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Platform / Model&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: solid #E3E3E3 1.0pt; border-right: solid #E3E3E3 1.0pt; padding: .75pt 22.5pt .75pt 13.5pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;All&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; border-top: none; padding: .75pt 3.75pt .75pt 9.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Date Created&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: solid #E3E3E3 1.0pt; border-right: solid #E3E3E3 1.0pt; padding: .75pt 22.5pt .75pt 13.5pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;14-Feb-2016&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border: solid #E3E3E3 1.0pt; border-top: none; padding: .75pt 3.75pt .75pt 9.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Last Modified&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-left: none; border-bottom: solid #E3E3E3 1.0pt; border-right: solid #E3E3E3 1.0pt; padding: .75pt 22.5pt .75pt 13.5pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;22-Jan-2018&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 16.5pt;"&gt;Solution&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: black; font-size: 10.5pt;"&gt;Table of Contents:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI style="color: #ba2454;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Configuration in SmartDashboard&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: #ba2454;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Important notes&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: #ba2454;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Limitations&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: #ba2454;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Proxy errors&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: #ba2454;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Related documentation&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: #ba2454;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Related solutions&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;(1) Configuration in SmartDashboard&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Open the Security Gateway object you would like to configure as a Proxy.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Go to HTTP/HTTPS Proxy pane:&lt;/SPAN&gt;&lt;OL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Check the box&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;Use this gateway as an HTTP/HTTPS Proxy&lt;/EM&gt;&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Configure the Proxy settings:&lt;/SPAN&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Proxy Modes&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P style="margin-left: 1.5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Two proxy modes are supported:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;EM style="font-size: 10.5pt;"&gt;Transparent&lt;/EM&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&amp;nbsp;- All HTTP traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway. No configuration is required on the clients.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;EM style="font-size: 10.5pt;"&gt;Non Transparent&lt;/EM&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&amp;nbsp;- All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway. Configuration of the proxy address and port is required on client machines.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Access Control&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P style="margin-left: 1.5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;You can configure one of these options for forwarding HTTP requests:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;EM style="font-size: 10.5pt;"&gt;All Internal Interfaces&lt;/EM&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&amp;nbsp;- HTTP/HTTPS traffic from all internal interfaces is processed by the Proxy code in the Security Gateway.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;EM style="font-size: 10.5pt;"&gt;Specific Interfaces&lt;/EM&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&amp;nbsp;- HTTP/HTTPS traffic from interfaces specified in the list is processed by the Proxy code in the Security Gateway.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Ports&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P style="margin-left: 1.5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;By default, traffic is intercepted only on port 8080. You can add or edit ports as required.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Advanced&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P style="margin-left: 1.5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;You can configure proxy headers by clicking on&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;Advanced...&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;button.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;OL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;EM style="font-size: 10.5pt;"&gt;Proxy related headers&lt;/EM&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&amp;nbsp;- By default, the HTTP header contains the "&lt;EM&gt;Via&lt;/EM&gt;" proxy related header. Clear this checkbox if you do not want to include it.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;EM style="font-size: 10.5pt;"&gt;X-Forward-For header (original client source IP address)&lt;/EM&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&amp;nbsp;- check this box to include the actual source IP address in the HTTP.&lt;BR /&gt; This header must be configured, if traffic will be forwarded to Identity Awareness Security Gateways that require this information for user identification.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Logging&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/OL&gt;&lt;/OL&gt;&lt;P style="margin-left: 1.5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The Security Gateway opens two connections (one connection with the client and one connection with the actual destination server), but only the Firewall blade can log both connections.&lt;BR /&gt; Other blades show only the connection between the client and the Security Gateway.&lt;BR /&gt; The "Destination" field of the log only shows the Security Gateway and not the actual destination server.&lt;BR /&gt; The "Resource" field shows the actual destination.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI style="color: black;"&gt;&lt;EM style="font-size: 10.5pt;"&gt;Example&lt;/EM&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;:&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Install policy on the Security Gateway.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;R80.10 Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: 1.0in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;In order to make the Proxy Server to work on R80.10, an explicit rule should be created allowing traffic to the gateway itself on the proxy defined port.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.0in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;When using URL Filtering, an explicit rule should be created to match the URL categorization.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;(2) Important notes&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;In order to maintain highest security, it is recommended to avoid selecting external interfaces as the relevant proxy interfaces.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;Check Point HTTP/HTTPS proxy is&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;not&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;a caching proxy (it does not cache commonly visited web pages to provide faster local access to hosts on the LAN).&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;(3) Limitations&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTP/HTTPS proxy support is&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;limited&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;for the following features/configurations:&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;" width="180"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Feature /&lt;BR /&gt; Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Comments&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;" width="120"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Plans&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;IPv6&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Proxy can be used, but not for IPv6 connections.&lt;BR /&gt; In dual IP stack, only IPv4 traffic is supported.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;In addition, refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112816"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk112816 - Check Point support for IPv4 / IPv6 Proxy&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Planned to be resolved in a future version.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Span Port /&lt;BR /&gt; Mirror Port /&lt;BR /&gt; Monitor Mode&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Proxy is not supported when this feature is enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98389"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk98389&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;EM style="color: black; font-size: 10.5pt;"&gt;No active plans&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;VPN Site-to-Site&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Proxy can be used, but not over VPN connections.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93929"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk93929&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Planned to be resolved in a future version.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Mobile Access blade&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Proxy can be used, but not over Mobile Access connections.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;EM style="color: black; font-size: 10.5pt;"&gt;No active plans&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Anti-Spam &amp;amp; E-mail Security blade&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Proxy is not supported when this feature is enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;*The Content-based Anti-Spam is not supported with proxy (only the IP Reputation is supported)&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;EM style="color: black; font-size: 10.5pt;"&gt;No active plans&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Application Accounting&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Not supported in Transparent Proxy configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;EM style="color: black; font-size: 10.5pt;"&gt;No active plans&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTPS traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black; background: yellow;"&gt;Not supported in Transparent Proxy configuration when the &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: red; background: yellow;"&gt;HTTPS traffic ports are configured in the 'ports' section of the proxy configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;EM style="color: black; font-size: 10.5pt;"&gt;No active plans&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;UserCheck&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Users do not receive a UserCheck page for blocked HTTPS connections that pass through Proxy, but instead receive a message that the page could not be reached.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93184"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk93184&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk85640"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk85640&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Planned to be resolved in a future version.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;NTLM authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Not supported in Proxy configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100214"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk100214&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;EM style="color: black; font-size: 10.5pt;"&gt;No active plans&lt;/EM&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The following features/configuration are&amp;nbsp;&lt;STRONG&gt;supported&lt;/STRONG&gt;, but might require some adjustments:&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;" width="180"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Feature /&lt;BR /&gt; Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Comments&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;" width="120"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Integrated in&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;VPN Remote Access with client E75.30&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The following configuration is required - add both internal and external interfaces to 'Specific Interfaces' setting in HTTP/HTTPS Proxy properties.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;UserCheck&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;UserCheck block page message is not shown when Security Gateway is configured as HTTP Proxy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;To resolve the issue, add the portal IP address to the proxy exceptions list in your web browser, or use a proxy PAC file to exclude the portal from the connections that require a proxy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;This allows the client to connect directly to the portal, without going through the proxy feature.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk72100"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk72100&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Bridge mode&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The following configuration is required - you must configure an IP address on the bridge interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Cluster with Cluster Virtual IP address on a different subnet than the member's physical IP addresses&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;In case you encounter connectivity issues,&amp;nbsp;&lt;A href="http://www.checkpoint.com/services/contact/index.html"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;contact Check Point Support&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;to get a Hotfix for this issue (Issue ID 01223637).&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;R76 and above&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Application &amp;amp; URL Filtering with a single interface&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;When Security Gateway is configured as HTTP/HTTPS Proxy with a single interface, define the relevant rules in 'Application &amp;amp; URL Filtering' policy as follows: Source - 'Any'; Destination - 'Any'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Refer to&amp;nbsp;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk80340"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk80340&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;"&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;Page not found&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;" error&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Error is shown when Security Gateway is configured as Non-transparent Proxy, if the same site is accessed on more than one destination port.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&lt;A href="http://www.checkpoint.com/services/contact/index.html"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;Contact Check Point Support&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;to get a Hotfix for this issue (Issue ID 01134342).&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;R75.47,&lt;BR /&gt; R77 and above&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Ports Leak in ClusterXL HA&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;If ClusterXL in High Availability mode is used as Proxy in Non Transparent mode, then NAT kernel table '&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;fwx_alloc&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;' on the Standby cluster member has significantly more entries than on the Active cluster member.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;"&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;NAT hide failure - no available port for hide NAT&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;" logs in SmartView Tracker will appear.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Refer to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk69480"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk69480&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93247"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk93247&lt;/SPAN&gt;&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;R77 and above&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTPS traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black; background: yellow;"&gt;Supported in Non-Transparent Proxy configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;-&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Additional notes:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;By default, Check Point Security Gateway does&amp;nbsp;&lt;EM&gt;not&lt;/EM&gt;&amp;nbsp;support Reverse Proxy Functionality.&lt;BR /&gt; For Capsule Docs Reverse Proxy, refer to:&lt;/SPAN&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk102973"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk102973 - Check Point Capsule Docs - 3rd-party Reverse Proxy Server&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103706"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk103706 - Capsule Docs On-Premises vs. Capsule Docs managed in the Cloud&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105123"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk105123 - Check Point Capsule Docs, Endpoint Security and Remote Access VPN E80.61 / R77.20.01&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108375"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk108375 - Check Point Capsule Docs, Endpoint Security and Remote Access VPN E80.62 / R77.30.01&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;On 41000 / 61000 Security System - Proxy connections will be dropped during failovers (due to the fact that such connections are handled as a Local Connection, which has no backup) (Issue 02331051).&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;(4) Proxy errors&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Below is a summary of proxy errors as it is seen in browser and in logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;" width="35%"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Error&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;" width="35%"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Browser&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EBEBEB; padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 10.5pt;"&gt;Log&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;DNS failure, no connectivity to DNS server&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Gateway Timeout&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The requested URL couldn't be resolved&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Reject&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Proxy: DNS timeout/error; Connection was rejected due to DNS timeout or error&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;DNS server is available but no record for the URL request&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Gateway Timeout&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The requested URL couldn't be resolved&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Reject&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Proxy: Internal error; Connection was rejected due to internal error&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;DNS server is available, record for URL also available but no Internet connection&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;This web page is not available&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;ERR_TUNNEL_CONNECTION_FAILED&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Reject&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Can't connect to server&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTP server failure, no connectivity to HTTP server&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Gateway Timeout&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The requested URL couldn't be resolved&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Reject&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Can't connect to server&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;HTTPS server error "500/404" - usually it indicates on a problem with the HTML code or page not found&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Server error&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;500&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Accept&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Server Reset: Server is up and running but not listens to HTTP/S ports. Can happen after reboot or internal server errors&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Server error&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;502&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Accept&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Authentication failure: wrong credential in a password authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Unauthorized&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;The server could not verify that you are authorized to access the document requested.&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 3.0pt 3.0pt 3.0pt 3.0pt;"&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Accept&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;(5) Related documentation&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="http://supportcontent.checkpoint.com/documentation_download?ID=24806"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;R77 versions IPS Administration Guide&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;- chapter "Monitoring Traffic" - section "HTTPS Inspection" - sub-section "HTTP/HTTPS Proxy"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="http://supportcontent.checkpoint.com/documentation_download?ID=24834"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;R77 versions Threat Prevention Administration Guide&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;- chapter "Using Threat Prevention with HTTPS Traffic" - section "HTTPS Inspection" - sub-section "HTTP/HTTPS Proxy"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="http://supportcontent.checkpoint.com/documentation_download?ID=24853"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;R77 versions Application Control and URL Filtering Administration Guide&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;- chapter "Managing Application Control and URL Filtering" - section "HTTPS Inspection" - sub-section "HTTP/HTTPS Proxy"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 12.0pt;"&gt;(6) Related solutions&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112816"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk112816 - Check Point support for IPv4 / IPv6 Proxy&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92482"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk92482 - Performance impact from enabling HTTP/HTTPS Proxy functionality&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101395"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk101395 - How to configure Proxy Chain on a Check Point Security Gateway defined as Proxy&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104639"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk104639 - Connection from a Client to a Server does not work when both Client and Server are NATed behind the same Security Gateway configured as Proxy&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110348"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk104639 - Mobile Access R77.30 Reverse Proxy&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk111171"&gt;&lt;SPAN style="color: #905690; text-decoration: none;"&gt;sk111171 - Security Gateway in HTTP/HTTPS Proxy mode sends TCP RST packet in response to TCP SYN packet&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112939"&gt;&lt;SPAN style="color: #999999; text-decoration: none;"&gt;sk112939 - Application Control and URL Filtering blades do not work when Security Gateway is configured as HTTP/HTTPS Proxy in Non Transparent mode&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;STRONG style="color: #333333; font-size: 16.5pt;"&gt;Applies To:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="color: black;"&gt;&lt;SPAN style="font-size: 10.5pt;"&gt;This SK replaces sk98559&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Feb 2018 00:37:00 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2018-02-08T00:37:00Z</dc:date>
    <item>
      <title>How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4360#M10442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can Anybody PLease help me on this&amp;nbsp;How to configure Check Point Security Gateway as HTTP/HTTPS Proxy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks In advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 08:26:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4360#M10442</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-07-20T08:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4361#M10443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is documented here:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110013&amp;amp;partition=Advanced&amp;amp;product=Security" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110013&amp;amp;partition=Advanced&amp;amp;product=Security"&gt;How to configure Check Point Security Gateway as HTTP/HTTPS Proxy&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 09:21:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4361#M10443</guid>
      <dc:creator>Peter_Sandkuijl</dc:creator>
      <dc:date>2017-07-20T09:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4362#M10444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes but i am not able to view it as m getting this pop up&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/57521_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 09:30:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4362#M10444</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-07-20T09:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4363#M10445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a picture typically says more than a thousand words:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://sc1.checkpoint.com/sc/SolutionsStatics/sk110013/proxy1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 11:17:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4363#M10445</guid>
      <dc:creator>Peter_Sandkuijl</dc:creator>
      <dc:date>2017-07-20T11:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4364#M10446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from sk "...Transparent - All HTTP traffic on specified ports and interfaces is intercepted and sent to a proxy..."&lt;/P&gt;&lt;DIV&gt;what does it (sent to a proxy) mean?&lt;BR /&gt;proxy as a deamon or external box?&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;thank You!&lt;BR /&gt;--&lt;BR /&gt;ak.&lt;/DIV&gt;&lt;P&gt;"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 11:23:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4364#M10446</guid>
      <dc:creator>Andrejs__Андрей</dc:creator>
      <dc:date>2017-07-20T11:23:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4365#M10447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Peter , do i also need to configure any outbound or inbound policy against this..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 11:26:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4365#M10447</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-07-20T11:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4366#M10448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This means a process runs on the Check Point gateway that acts as a proxy. No 3rd party proxy would be required.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 11:32:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4366#M10448</guid>
      <dc:creator>Peter_Sandkuijl</dc:creator>
      <dc:date>2017-07-20T11:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4367#M10449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks peter this was a great help....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 11:53:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4367#M10449</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-07-20T11:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4368#M10450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By checking the box, implied rules are put in place. You need to create rules as you usually would (internal lan &amp;gt; internet &amp;gt; http+https &amp;gt; accept). Take into account that the gateway creates the outbound (proxied) connection from the gateway and requires a DNS to resolve against.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 12:03:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4368#M10450</guid>
      <dc:creator>Peter_Sandkuijl</dc:creator>
      <dc:date>2017-07-20T12:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4369#M10451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;and excellent work Sergei Shir and the SecureKnowledge Team!&lt;/P&gt;&lt;P&gt;they updated that &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110013"&gt;sk110013&lt;/A&gt;!&lt;/P&gt;&lt;P&gt;"...and processed by the Proxy code in the Security Gateway..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You,&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;ak.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jul 2017 12:16:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4369#M10451</guid>
      <dc:creator>Andrejs__Андрей</dc:creator>
      <dc:date>2017-07-20T12:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4370#M10452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi peter&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bothering u again.. When creating a rule shud i &amp;nbsp;select service as http 80, https 443 or http+https proxy 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SAT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jul 2017 14:01:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4370#M10452</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-07-22T14:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4371#M10453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;http/https only should be sufficient.&lt;/P&gt;&lt;P&gt;The http-proxy service would allow access to other proxies, which I assume you don't want &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jul 2017 16:58:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4371#M10453</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-07-22T16:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4372#M10454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what is the diffrence in transparent and non transparent proxy how they behave???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 11:14:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4372#M10454</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-08-09T11:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4373#M10455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In non-transparent mode, you must explicitly define the gateway as a proxy in the browser (directly or with a proxy.pac file stored on a different webserver). Transparent mode intercepts HTTP traffic on the specified ports and interfaces and sends it through the proxy without explicit configuration on the client side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Aug 2017 14:29:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4373#M10455</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-09T14:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4374#M10456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;in non-transparent mode, the security gateway will break the http/https connection (meaning 2 connections, from client to security gateway, security gateway to http/https web server).&lt;/P&gt;&lt;P&gt;1. my understanding is, in order to intercept the web traffic, the security gateway should listen to tcp/8080.&amp;nbsp;when i login to the gaia os cli expert level, i did not see a listening port at tcp/8080 (netstat -an) or is there other commands to view this?&lt;/P&gt;&lt;P&gt;2. using http/https proxy, the gateway show spawn off a httpd process to intercept web request at tcp/8080. so may i know what is the process name and how to view this process from &lt;SPAN&gt;gaia os cli expert level&lt;/SPAN&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Aug 2017 03:46:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4374#M10456</guid>
      <dc:creator>Tze_How_Tan</dc:creator>
      <dc:date>2017-08-19T03:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4375#M10457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;netstat doesn't show it because it's not a process that is listening on that port.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;The firewall kernel intercepts the traffic and "folds" it to fwd,&amp;nbsp;which listens on a number of ports (not tcp/8080).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Aug 2017 04:42:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4375#M10457</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-08-19T04:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4376#M10458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Dameon for the clarification.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Aug 2017 14:56:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4376#M10458</guid>
      <dc:creator>Tze_How_Tan</dc:creator>
      <dc:date>2017-08-19T14:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4377#M10459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If we can not test anything through netstat, how can we verify that the proxy works correctly? And how correctly to troubleshoot it?&lt;BR /&gt;In our case, we see logs, there are no deny actions, but the user does not have access to the Internet. On the test environment, I see this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW]# netstat | grep 8080&lt;BR /&gt;unix 2 [ ] DGRAM 8080 /tmp/pmsock&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in another environment I don't see it, and proxy doesn't work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2018 15:50:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4377#M10459</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-02-05T15:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4378#M10460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;The most obvious first step would be to telnet to the firewall on port 8080 and see if it answers.&lt;/P&gt;&lt;P class=""&gt;If it doesn't answer, then it might be a configuration issue or it might be something else.&lt;/P&gt;&lt;P class=""&gt;Worth engaging the TAC in any case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2018 16:05:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4378#M10460</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-05T16:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4379#M10461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am a bit puzzled by the behavior of Transparent Proxy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62919_pastedImage_1.png" style="width: 620px; height: 569px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yet, I could not verify that the proxy is working.&lt;/P&gt;&lt;P&gt;There are no log entries signifying its utilization and online proxy checkers do not indicate that the proxy is being used:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62920_pastedImage_2.png" style="width: 620px; height: 441px;" /&gt;&lt;/P&gt;&lt;P&gt;I have enabled the headers for explicit purpose of identifying that the proxy is working, but do not see any confirmations to that effect.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2018 15:37:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/How-to-configure-Check-Point-Security-Gateway-as-HTTP-HTTPS/m-p/4379#M10461</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-07T15:37:42Z</dc:date>
    </item>
  </channel>
</rss>

