- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hi!
I wonder if anyone has any experience with running Check Point as an HTTP/S proxy? We currently have this configured in our environment and I have a couple of queries:
Has anyone experienced issues when running as a proxy?
Does proxied traffic get processed by blades as per standard, non-proxy traffic?
Many thanks!
Phill
see sk110013
all works as it should unless you are about to have multiply exceptions on access rules ...
I've tested that SSL interception with 3rd party public SSL Certificate and it just works brilliant utilizing as well URL/APPC blades.
all depends what level of """cashing""" you're a bout to aiming for or rather, what is your level of understanding mentioned in SK limitations
also would be great to acknowledge following one: sk112939
should you plan to use non-standard port plus utilizing URL/APPC blades on the same GW.
to be completely honest CP Proxy is far from calling it "proxy server" as such for large enterprise and scalable designs (i'd say there are much better once on the market) but in terms of the SSL interception it does the job very well, all depends what you're about to take a hit on in terms of the performance and capabilities of the solution for users
Many thanks Jerry! I have looked at the SK and that makes sense. We have a non-transparent proxy configured and I find that when I do not use the proxy I encounter problems trying to bypass HTTPS inspection. I will raise an SR with support for the particular site that we are having a problem with. Thank you for your help, much appreciated.
Phill
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY