<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH decryption in Check Point R80.20 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48251#M9419</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Do we support SSH decryption ? If yes pls share URL/Link for reference.&lt;/P&gt;
&lt;P&gt;If No, do we have any workaround ?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Sunandan&lt;/P&gt;</description>
    <pubDate>Fri, 22 Mar 2019 09:50:56 GMT</pubDate>
    <dc:creator>Sunandan_Banerj</dc:creator>
    <dc:date>2019-03-22T09:50:56Z</dc:date>
    <item>
      <title>SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48251#M9419</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Do we support SSH decryption ? If yes pls share URL/Link for reference.&lt;/P&gt;
&lt;P&gt;If No, do we have any workaround ?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Sunandan&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 09:50:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48251#M9419</guid>
      <dc:creator>Sunandan_Banerj</dc:creator>
      <dc:date>2019-03-22T09:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48253#M9420</link>
      <description>&lt;P&gt;SSH Inspection is already available as custom fix.&lt;/P&gt;&lt;P&gt;It can be requested through local office.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following features are supported:&lt;/P&gt;&lt;P&gt;SSH:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Decryption/Encryption&lt;/LI&gt;&lt;LI&gt;PK client authentication&lt;/LI&gt;&lt;LI&gt;Client password authentication&lt;/LI&gt;&lt;LI&gt;Clients and servers command line keys management tool.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPS protections:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;SSH Brute Force Login Attempt&lt;/LI&gt;&lt;LI&gt;Weak Credentials over SSH&lt;/LI&gt;&lt;LI&gt;SSH Weak Cipher&lt;/LI&gt;&lt;LI&gt;Non SSH over SSH Port&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AntiVirus:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Extract of files transferred through SCP and SFTP protocols.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 22 Mar 2019 09:53:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48253#M9420</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-03-22T09:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48257#M9421</link>
      <description>&lt;P&gt;Thanks Norbert.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 10:34:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/48257#M9421</guid>
      <dc:creator>Sunandan_Banerj</dc:creator>
      <dc:date>2019-03-22T10:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/62408#M12663</link>
      <description>&lt;P&gt;Thank You. Do you have the URL, Link o document that &lt;SPAN&gt;support it&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 21:47:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/62408#M12663</guid>
      <dc:creator>Omar_Retamozo</dc:creator>
      <dc:date>2019-09-10T21:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/62409#M12664</link>
      <description>As this is a customer specific release, there isn’t public documentation.&lt;BR /&gt;It can be provided through your local Check Point office.&lt;BR /&gt;Note there is also a similar customer release for R80.30.</description>
      <pubDate>Tue, 10 Sep 2019 22:27:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/62409#M12664</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-10T22:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/72568#M14706</link>
      <description>&lt;P&gt;I have a request to block certain SFTP users.&amp;nbsp; &amp;nbsp;Currently, traffic comes in on a reverse proxy, haproxy, then to the sftp server.&amp;nbsp; &amp;nbsp; With our current set up,&amp;nbsp; I can't identify specific USERS.&amp;nbsp; I'm thinking about the old client authentication now...&amp;nbsp; We're getting too many&amp;nbsp; bogus requests from random users.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2020 19:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/72568#M14706</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2020-01-17T19:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/72767#M14752</link>
      <description>You're going to have issues identifying users if more than one user is coming from what appears to be the same IP address.&lt;BR /&gt;In this case, the only real solution is a proxy.</description>
      <pubDate>Mon, 20 Jan 2020 22:15:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/72767#M14752</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-01-20T22:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH decryption in Check Point R80.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/72799#M14762</link>
      <description>&lt;P&gt;We have SSH Inspection capabilities in our road map. This feature will be added to one of the upcoming releases. Stay tuned&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2020 08:15:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SSH-decryption-in-Check-Point-R80-20/m-p/72799#M14762</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-01-21T08:15:03Z</dc:date>
    </item>
  </channel>
</rss>

