<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Inbound HTTPS Inpsection in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77925#M3210</link>
    <description>&lt;P&gt;Not an option unfortunately. And I am not sure it is supported on SMB.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Mar 2020 04:23:19 GMT</pubDate>
    <dc:creator>HristoGrigorov</dc:creator>
    <dc:date>2020-03-11T04:23:19Z</dc:date>
    <item>
      <title>Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77396#M3177</link>
      <description>&lt;P&gt;Any of you guys managed to configure inbound HTTPS Inspection on R77.20?&lt;/P&gt;
&lt;P&gt;I want to do it between two internal hosts and I seem to miserably fail to achieve it &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 06:17:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77396#M3177</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-03-06T06:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77435#M3180</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am guessing, that you are asking for SMB appliances.&lt;/P&gt;&lt;P&gt;If the device is localy managed, than it is not supported. If it is centraly managed, than it is suppored.&lt;/P&gt;&lt;P&gt;More details you can find on bellow link.&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105380" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105380&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mario&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 10:43:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77435#M3180</guid>
      <dc:creator>MarioB_1</dc:creator>
      <dc:date>2020-03-06T10:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77457#M3181</link>
      <description>&lt;P&gt;Update to R80.30!&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 13:38:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77457#M3181</guid>
      <dc:creator>TomTom</dc:creator>
      <dc:date>2020-03-06T13:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77480#M3182</link>
      <description>The SMB appliances have a slightly different code base.&lt;BR /&gt;These cannot be upgraded to R80.30.</description>
      <pubDate>Fri, 06 Mar 2020 16:01:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77480#M3182</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-06T16:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77483#M3183</link>
      <description>&lt;P&gt;Thanx for your comments guys. I forgot to mention I am asking about centrally managed 1470 appliance. I know it is supported, I just want someone that actually did it and can confirm it works. &lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 16:05:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77483#M3183</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-03-06T16:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77492#M3184</link>
      <description>&lt;P&gt;It works fine from external hosts to internal.&lt;/P&gt;&lt;P&gt;I had many issues with internal to internal inspection. It seems besides presenting the server certificate the gateway also tried to generated an outbound certificate, doing a double inspection or something like this.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 17:17:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77492#M3184</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2020-03-06T17:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77494#M3185</link>
      <description>&lt;P&gt;Thanx Pedro, that confirms my observations. Unfortunately I have Nginx that serves few internal host so inspection before it is not possible.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 17:23:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77494#M3185</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-03-06T17:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77497#M3186</link>
      <description>So traffic hits the NGINX server before going to the gateway for ssl inspection?&lt;BR /&gt;For that to work, I think the interface that connects to the NGINX would have to be configured as external.</description>
      <pubDate>Fri, 06 Mar 2020 17:33:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77497#M3186</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2020-03-06T17:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77498#M3187</link>
      <description>&lt;P&gt;INTERNET --&amp;gt; CPFW --&amp;gt; NGINX --&amp;gt; WEB 1 .. N&lt;/P&gt;
&lt;P&gt;Each WEB server has its own certificate.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 17:44:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77498#M3187</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-03-06T17:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77912#M3209</link>
      <description>&lt;P&gt;What about using wildcard certificates or multiple alternate names?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2020 19:28:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77912#M3209</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2020-03-10T19:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77925#M3210</link>
      <description>&lt;P&gt;Not an option unfortunately. And I am not sure it is supported on SMB.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 04:23:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77925#M3210</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-03-11T04:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77985#M3219</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Then I guess you'll need to have NGINX in a separate network defined as EXTERNAL and do this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;INTERNET --&amp;gt; CPFW --&amp;gt; NGINX --&amp;gt; CPFW (SSL inspection) --&amp;gt; WEB 1 .. N&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 14:49:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/77985#M3219</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2020-03-11T14:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Inbound HTTPS Inpsection</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/78002#M3222</link>
      <description>&lt;P&gt;Yeah, that seems to be the only option for the time being. Thanx for giving that idea.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2020 16:25:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Inbound-HTTPS-Inpsection/m-p/78002#M3222</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-03-11T16:25:21Z</dc:date>
    </item>
  </channel>
</rss>

