<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Session Hijacking on Check Point Firewall in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/82897#M16757</link>
    <description>Hi Albrecht&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;&lt;BR /&gt;What I want to know is whether Check Point can protect a web application running on a server behind it against session hijacking.&lt;BR /&gt;</description>
    <pubDate>Thu, 23 Apr 2020 09:42:18 GMT</pubDate>
    <dc:creator>Di_Junior</dc:creator>
    <dc:date>2020-04-23T09:42:18Z</dc:date>
    <item>
      <title>Session Hijacking on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/82890#M16754</link>
      <description>&lt;P&gt;Dear&amp;nbsp; Mates&lt;/P&gt;&lt;P&gt;Does Check Point provides any protection against session hijacking?&lt;/P&gt;&lt;P&gt;Thanks advance&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 09:13:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/82890#M16754</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2020-04-23T09:13:52Z</dc:date>
    </item>
    <item>
      <title>Re: Session Hijacking on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/82895#M16756</link>
      <description>&lt;P&gt;Use VPN, a contemporary TLS version and IPS, and see:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121795&amp;amp;partition=Advanced&amp;amp;product=Mobile" target="_blank"&gt;sk121795: How to configure HTTP Strict Transport Security (HSTS) policy on Check Point portals&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk113433&amp;amp;partition=Advanced&amp;amp;product=Mobile" target="_blank"&gt;sk113433: How to configure Mobile Access portal to work with HTTP Strict Transport Security (HSTS)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120416&amp;amp;partition=Basic&amp;amp;product=CloudGuard" target="_blank"&gt;sk120416: Best Practices: Connecting CloudGuard Gateway Virtual Edition as a perimeter Security Gateway&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk74100&amp;amp;partition=Basic&amp;amp;product=Security" target="_blank"&gt;sk74100: Mitigating the BEAST attack in R75.40VS, R75.46 and R76&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164775&amp;amp;partition=Basic&amp;amp;product=Security" target="_blank"&gt;sk164775: Predictable TCP sequences generated by Security Gateway in R80.20 / R80.30&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 09:36:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/82895#M16756</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-04-23T09:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: Session Hijacking on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/82897#M16757</link>
      <description>Hi Albrecht&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;&lt;BR /&gt;What I want to know is whether Check Point can protect a web application running on a server behind it against session hijacking.&lt;BR /&gt;</description>
      <pubDate>Thu, 23 Apr 2020 09:42:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/82897#M16757</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2020-04-23T09:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: Session Hijacking on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/83161#M16816</link>
      <description>Please describe in precise detail the scenario you're concerned about.</description>
      <pubDate>Sun, 26 Apr 2020 01:42:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Session-Hijacking-on-Check-Point-Firewall/m-p/83161#M16816</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-26T01:42:33Z</dc:date>
    </item>
  </channel>
</rss>

