Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Herr_O
Participant

3rd Party Proxy with deep instpection

We will implement a 3rd party proxy with deep inspection. Does anyone have experience how I can import the certificate of the 3rd party proxy to use the firewall as a proxy client ?
Thanks a lot

 

0 Kudos
3 Replies
PhoneBoy
Admin
Admin

Please describe the expected traffic flows here for what explicit purpose.

0 Kudos
Herr_O
Participant

 

Sorry if I have described it nox exactly.
The devices, managers and gateways have configured a proxy that is located behind a 3rd party firewall.

set proxy address 10.x.y.z port 8080

The future proxy should now perform deep inspection.
The proxy administrator has given me the proxy certificates/keys to import into the Check Point devices. (An internal CA is in use on the proxy. )
Now, I'm not sure how/where to integrate them in Check Point.

Regards,
Herr_O

0 Kudos
PhoneBoy
Admin
Admin

I don't believe our proxy support was designed with this use case in mind.
I suspect this is an RFE which a TAC case would likely confirm.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events