<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS proxy in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92920#M18446</link>
    <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; Yes, that was my assumption as well.&amp;nbsp; It 's just so close to what I need, it's frustrating.&amp;nbsp; It could be seen as a bandaid, but it would allow for a consistent front-facing set of TLS/ciphers, regardless of the back-end server's capabilities.&amp;nbsp; Interesting, a Netscaler does this by default, and I expect that that too is by design.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jul 2020 18:41:30 GMT</pubDate>
    <dc:creator>quatloo</dc:creator>
    <dc:date>2020-07-30T18:41:30Z</dc:date>
    <item>
      <title>HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92799#M18428</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am trying to configure my Check Point R80.30 OpenServer gateway to proxy inbound HTTPS connections to a back-end webserver.&lt;/P&gt;&lt;P&gt;My goal is to have the Check Point gateway present/allow inbound TLS 1.1, 1.2 &amp;amp; 1.3 HTTPS connections and then connect to the back-end webserver which only supports TLS 1.0.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I would also like to have a one-to-one IP address mapping (rather than a one-to-many). Basically I would just like to continue using the NAT rules I already have in place.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It would look like this (in this example, the 10.x.x.x addresses would be publicly routable, Internet-facing):&lt;/P&gt;&lt;P&gt;Remote HTTPS client --&amp;gt; Check Point-GW 10.1.1.1 (TLS 1.1,2,3) --&amp;gt; 1.1.1.1 (TLS 1.0)&lt;/P&gt;&lt;P&gt;Remote HTTPS client --&amp;gt; Check Point-GW 10.1.1.2 (TLS 1.1,2,3) --&amp;gt; 1.1.1.2 (TLS 1.0)&lt;/P&gt;&lt;P&gt;Etc.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Currently I am using HTTPS inspection, which will present various TLS/cipher combinations, which is great, but it isn't functionally doing exactly what I need. While it will present the different TLS versions, ultimately, it will only accept and pass the TLS versions supported by the back-end webserver.&lt;/P&gt;&lt;P&gt;It appears as if the connection from the Check Point gateway to the back-end web server isn't a separate, negotiated TLS connection.&lt;/P&gt;&lt;P&gt;I can accomplish my goal with a Netscaler but I would prefer to use Check Point, as it would be administratively tidier to manage given my Netscaler architecture.&lt;/P&gt;&lt;P&gt;Perhaps I'm trying to use the wrong tool for the job, but I thought Check Point should be able to do something like this.&lt;/P&gt;&lt;P&gt;Thanks for any advise you can provide!&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 21:36:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92799#M18428</guid>
      <dc:creator>quatloo</dc:creator>
      <dc:date>2020-07-29T21:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92909#M18442</link>
      <description>&lt;P&gt;Generally, we tend to duplicate what the backend server allows/does as closely as possible.&lt;BR /&gt;Not sure if you can disable that functionality, but it sounds like expected behavior.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 17:32:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92909#M18442</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-30T17:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92920#M18446</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; Yes, that was my assumption as well.&amp;nbsp; It 's just so close to what I need, it's frustrating.&amp;nbsp; It could be seen as a bandaid, but it would allow for a consistent front-facing set of TLS/ciphers, regardless of the back-end server's capabilities.&amp;nbsp; Interesting, a Netscaler does this by default, and I expect that that too is by design.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 18:41:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92920#M18446</guid>
      <dc:creator>quatloo</dc:creator>
      <dc:date>2020-07-30T18:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92947#M18450</link>
      <description>&lt;P&gt;I don't think that you can achieve this with a firewall.&lt;/P&gt;&lt;P&gt;Netscaler / F5 / Load Balancers can do this because they don't apply just NAT, they use a full proxy architecture. Basically the connection actually ends on this device, and this device initiate a new connection to the back end server.&lt;/P&gt;&lt;P&gt;Using this method you can do whatever you want with that connection.&lt;/P&gt;&lt;P&gt;Here's an example of how this architecture works.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Full proxy.png" style="width: 595px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7436i10291AC3466C52E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Full proxy.png" alt="Full proxy.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 03:21:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/92947#M18450</guid>
      <dc:creator>FedericoMeiners</dc:creator>
      <dc:date>2020-07-31T03:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/93001#M18456</link>
      <description>&lt;P&gt;Reverse proxy is what you need (F5/Netscaler/A10/nginx). CheckPoint provides some kind of functionalities of http/s proxy, which means you enter CP's address in the proxy setting of your browser.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 11:43:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTPS-proxy/m-p/93001#M18456</guid>
      <dc:creator>MartinTzvetanov</dc:creator>
      <dc:date>2020-07-31T11:43:02Z</dc:date>
    </item>
  </channel>
</rss>

