<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replace out squid cluster with HTTP/HTTPS proxying on our Gateways? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Replace-out-squid-cluster-with-HTTP-HTTPS-proxying-on-our/m-p/63454#M12869</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7210"&gt;@Falk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope you are doing fine, based on your use case you can totally do this on Check Point Firewalls. Personally I have done many migrations from Squid to CHKP.&lt;/P&gt;&lt;P&gt;A couple of advises:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Based on your use case you will need NGTP licensing to enforce Access rules, URL Filtering and Application control, Anti-Bot.&lt;UL&gt;&lt;LI&gt;Stop connection to non http/https ports: Firewall blade - Access Policy&lt;/LI&gt;&lt;LI&gt;Enforce web browsing policies and quality of service (IE: No streaming for certain users, no pornography): URL Filtering &amp;amp; Application Control&lt;/LI&gt;&lt;LI&gt;Prevent high risk web browsing: URL Filtering &amp;amp; Application Control&lt;/LI&gt;&lt;LI&gt;Prevent C&amp;amp;C: Anti Bot.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;You can deploy your gateway in Web Proxy mode (You have to setup proxy address in user's browsers) or directly by processing traffic. In my personal experience I had better enforcement results by only enabling URL Filtering / App control on the gateway and then routing traffic from the host through the gateway without setting anything on the browser.&lt;/LI&gt;&lt;LI&gt;Keep in mind that you cannot do load balance as reverse proxy, not as far as I know at least.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Hope it helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 23 Sep 2019 15:31:59 GMT</pubDate>
    <dc:creator>FedericoMeiners</dc:creator>
    <dc:date>2019-09-23T15:31:59Z</dc:date>
    <item>
      <title>Replace out squid cluster with HTTP/HTTPS proxying on our Gateways?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Replace-out-squid-cluster-with-HTTP-HTTPS-proxying-on-our/m-p/63408#M12860</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are today running a couple of squids as forwarding proxies for our internal servers.&lt;BR /&gt;So that they do not have direct access to the internetz.&amp;nbsp;&lt;/P&gt;&lt;P&gt;And now we are in the process of replace them with newer ones, then I read that you can enable HTTP/HTTPS proxy on our R80.&lt;BR /&gt;&lt;BR /&gt;Do you have any experience to use it as an non-transparent proxy, like in our squid case?&lt;BR /&gt;It's only for logging and stop connections to bad actors on non http/https ports. I know it's a rather obsolete way beq all c&amp;amp;c and such is using https anyhow &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thougts?&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Regards Falk&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 09:04:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Replace-out-squid-cluster-with-HTTP-HTTPS-proxying-on-our/m-p/63408#M12860</guid>
      <dc:creator>Falk</dc:creator>
      <dc:date>2019-09-23T09:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Replace out squid cluster with HTTP/HTTPS proxying on our Gateways?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Replace-out-squid-cluster-with-HTTP-HTTPS-proxying-on-our/m-p/63419#M12861</link>
      <description>&lt;P&gt;I would not suggest to use the CP GW Proxy Server instead of Squid &amp;amp; Co. as the limitations are severe, see&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110013&amp;amp;partition=Advanced&amp;amp;product=Security" target="_blank"&gt;sk110013: How to configure Check Point Security Gateway as HTTP/HTTPS &lt;STRONG&gt;Proxy&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;for details !&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Main point apart from limitations: Check Point HTTP/HTTPS proxy is &lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt; a caching proxy (it does not cache commonly visited web pages to provide faster local access to hosts on the LAN).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 10:20:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Replace-out-squid-cluster-with-HTTP-HTTPS-proxying-on-our/m-p/63419#M12861</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-09-23T10:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: Replace out squid cluster with HTTP/HTTPS proxying on our Gateways?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Replace-out-squid-cluster-with-HTTP-HTTPS-proxying-on-our/m-p/63454#M12869</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7210"&gt;@Falk&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope you are doing fine, based on your use case you can totally do this on Check Point Firewalls. Personally I have done many migrations from Squid to CHKP.&lt;/P&gt;&lt;P&gt;A couple of advises:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Based on your use case you will need NGTP licensing to enforce Access rules, URL Filtering and Application control, Anti-Bot.&lt;UL&gt;&lt;LI&gt;Stop connection to non http/https ports: Firewall blade - Access Policy&lt;/LI&gt;&lt;LI&gt;Enforce web browsing policies and quality of service (IE: No streaming for certain users, no pornography): URL Filtering &amp;amp; Application Control&lt;/LI&gt;&lt;LI&gt;Prevent high risk web browsing: URL Filtering &amp;amp; Application Control&lt;/LI&gt;&lt;LI&gt;Prevent C&amp;amp;C: Anti Bot.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;You can deploy your gateway in Web Proxy mode (You have to setup proxy address in user's browsers) or directly by processing traffic. In my personal experience I had better enforcement results by only enabling URL Filtering / App control on the gateway and then routing traffic from the host through the gateway without setting anything on the browser.&lt;/LI&gt;&lt;LI&gt;Keep in mind that you cannot do load balance as reverse proxy, not as far as I know at least.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Hope it helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 15:31:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Replace-out-squid-cluster-with-HTTP-HTTPS-proxying-on-our/m-p/63454#M12869</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2019-09-23T15:31:59Z</dc:date>
    </item>
  </channel>
</rss>

