<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL Interception and offload to Proxy in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SSL-Interception-and-offload-to-Proxy/m-p/108353#M20642</link>
    <description>&lt;P&gt;Check Point has a Mirror and Decrypt feature from R80.20 and up.&lt;BR /&gt;With this feature configured, you can either mirror traffic unencrypted or encrypted to a specific port on your gateway.&lt;BR /&gt;It is meant for a&amp;nbsp;&lt;SPAN&gt;third-party Recorder or Packet-Broker that operates in&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;monitor (promiscuous) mode to accept the mirrored and (possibly) decrypted traffic.&lt;BR /&gt;&lt;/SPAN&gt;That means it won't work for your desired use case.&lt;/P&gt;
&lt;P&gt;You realize Check Point can do App Control/URL Filtering too, right?&lt;BR /&gt;If you're having it decrypt the traffic, why not have it perform access control and threat prevention on it as well?&lt;/P&gt;</description>
    <pubDate>Thu, 21 Jan 2021 02:00:50 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-01-21T02:00:50Z</dc:date>
    <item>
      <title>SSL Interception and offload to Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Interception-and-offload-to-Proxy/m-p/108334#M20641</link>
      <description>&lt;P&gt;Currently we have a proxy that is performing SSL Interception. This causes high CPU load so we want to move SSL Interception off of the Proxies. I know that Checkpoint r80x does this but is there a way to expose/decrypt the SSL traffic on the firewall, send it to the proxy to be evaluated against the proxy policy and then send it back to the firewall and re-encrypted on the Checkpoint?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2021 19:36:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Interception-and-offload-to-Proxy/m-p/108334#M20641</guid>
      <dc:creator>JaySon_2021</dc:creator>
      <dc:date>2021-01-20T19:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Interception and offload to Proxy</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSL-Interception-and-offload-to-Proxy/m-p/108353#M20642</link>
      <description>&lt;P&gt;Check Point has a Mirror and Decrypt feature from R80.20 and up.&lt;BR /&gt;With this feature configured, you can either mirror traffic unencrypted or encrypted to a specific port on your gateway.&lt;BR /&gt;It is meant for a&amp;nbsp;&lt;SPAN&gt;third-party Recorder or Packet-Broker that operates in&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;monitor (promiscuous) mode to accept the mirrored and (possibly) decrypted traffic.&lt;BR /&gt;&lt;/SPAN&gt;That means it won't work for your desired use case.&lt;/P&gt;
&lt;P&gt;You realize Check Point can do App Control/URL Filtering too, right?&lt;BR /&gt;If you're having it decrypt the traffic, why not have it perform access control and threat prevention on it as well?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 02:00:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSL-Interception-and-offload-to-Proxy/m-p/108353#M20642</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-21T02:00:50Z</dc:date>
    </item>
  </channel>
</rss>

