<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Control POC in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11920#M1841</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not certain. Can someone from Check Point chime in please?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 31 Oct 2018 18:20:47 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2018-10-31T18:20:47Z</dc:date>
    <item>
      <title>Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11917#M1838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greetings Esteemed Members.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am in the planning stages of a POC for inserting Open Server R80.10 gateway with R80.20 management virtual machines into a customer network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The objective is to replace their current URL filtering solution with Check Point's SSL Inspection, Application Control and URL blades in the initial phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer's perimeter firewall is a Cisco ASA cluster and currently terminates VPN tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering whether the gateway can be inserted into the routing path using a single interface only, meaning that their layer 3 switch uses it as its default gateway and the Check Point's default gateway will be the ASA cluster, or do I need to physically place it between the internal network and the ASA cluster.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTTP Proxy is not an option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2018 11:51:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11917#M1838</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-10-31T11:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11918#M1839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Look for "Deploying a Security Gateway or a ClusterXL in Bridge Mode" in&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Installation_and_Upgrade_Guide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Installation_and_Upgrade_Guide/207571" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Installation_and_Upgrade_Guide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Installation_and_Upgrade_Guide/207571"&gt;Installation and Upgrade Guide R80.20&lt;/A&gt;&amp;nbsp;and check limitations and notes before doing it.&lt;/P&gt;&lt;P&gt;From the table, it looks like you can achieve most of what you want with a single gateway in a bridge mode.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2018 13:29:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11918#M1839</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-10-31T13:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11919#M1840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the link, in fact it is something that I looked at last night and I'm considering it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will also be the least intrusive topology option for the POC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only concern is this note #3&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;Identity Awareness in Bridge Mode supports only the AD Query authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I take it that it means Identity Collector isn't supported?&lt;/P&gt;&lt;P&gt;Do you know?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Calvin.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2018 14:44:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11919#M1840</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-10-31T14:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11920#M1841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not certain. Can someone from Check Point chime in please?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2018 18:20:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11920#M1841</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-10-31T18:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11921#M1842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could another solution be to employ two vlans on your single interface? You should be able to route through with that configuration...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2018 19:11:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11921#M1842</guid>
      <dc:creator>Jason_Dance</dc:creator>
      <dc:date>2018-10-31T19:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11922#M1843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This thought did cross my mind and it's an excellent idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for pointing it out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2018 19:13:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11922#M1843</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-10-31T19:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11923#M1844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so after careful consideration and discussions w/ the client, it would be best to use bridge mode since the POC requires that no routing changes to the current network are to be made at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only risk in my mind then is that the server identified for the POC does not have bypass NICs in case of hardware failure or having to reboot for whatever reason.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate everyone's input thus far.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Oct 2018 23:12:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11923#M1844</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-10-31T23:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11924#M1845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep would really like to have Check Point clarify Identity Collector compatibility w/ gateway bridge mode&lt;/P&gt;&lt;P&gt;I don't see any reason why it won't work though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 02:51:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11924#M1845</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-11-01T02:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11925#M1846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could also use proxy mode, than you don't need to be inline, the working is abou the same for the actual policy.&lt;/P&gt;&lt;P&gt;Regarding the policy itself I have created a mgmt_cli script to create a&amp;nbsp;shared APCL/URLF policy, which you can use&amp;nbsp;ordered or as a inline internet filter.&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/72983_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 06:34:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11925#M1846</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-01T06:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11926#M1847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Maarten - this is a good approach also, but the client does not want proxy mode.&lt;/P&gt;&lt;P&gt;How has your experience w/ this been in terms of performance, because as I understand it, proxy mode does not benefit from SecureXL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 14:43:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11926#M1847</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-11-01T14:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11927#M1848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have 1 customer running it on a 13500 with around 4000 users and 700Mb of traffic running through it and it is humming just fine. I see it is running around 50/50 FW/PXL and they are not using HTTPS decryption.&lt;/P&gt;&lt;P&gt;I also need to tell you that all Guest network connections run inline, not using the proxy, I do not know the number of users on guest.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 15:39:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11927#M1848</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-01T15:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11928#M1849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok good info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This POC will run as a Hyper-V VM as follows:&lt;/P&gt;&lt;P&gt;Management - 8GB RAM, 4 vCPU, 100GB disk, 1Gbps vNIC&lt;/P&gt;&lt;P&gt;Gateway - 4GB RAM, 4 vCPU, 100GB disk, 1Gbps vNIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1000 corporate users, no guests&lt;/P&gt;&lt;P&gt;SSL Inspection required&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 15:44:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11928#M1849</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-11-01T15:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11929#M1850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you can hit it with 8 cores, the all-in-one Eval is supporting 8 cores...&lt;/P&gt;&lt;P&gt;Normally we calculate with a multiplier of 1,6 for ssl inspection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 16:00:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11929#M1850</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-01T16:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11930#M1851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you explain the multiplier?&lt;/P&gt;&lt;P&gt;What value is multiplied by 1.6?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 16:03:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11930#M1851</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-11-01T16:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11931#M1852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you ever looked at the CP Sizing tool? There the outcome for a appliance will be a certain load lets say 60% with the parameters that you have set, which means that with SSL inspection, you need to mylitply the 60% with 1.6 = 96% load on the appliance.&lt;/P&gt;&lt;P&gt;So far this has been pretty accurate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 22:32:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11931#M1852</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-01T22:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Application Control POC</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11932#M1853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have used the sizing tool but always wondered about the SSL. So my configs were always analyzed by the SSL team. But it's good to know about the 1.6 multiplier.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 22:38:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Application-Control-POC/m-p/11932#M1853</guid>
      <dc:creator>Calvin_Piggott</dc:creator>
      <dc:date>2018-11-01T22:38:54Z</dc:date>
    </item>
  </channel>
</rss>

