I was testing TLS handshake inspection on custom ports and noticed an interesting behavior. Here's a summary of what I did and found:
- I configured two hosts, a Gateway (GW), and a Security Management Server (SMS), all within the same subnet.
- Created custom objects for various TLS and HTTPS protocols and pushed Drop rules.
- Set up a server using OpenSSL on Host 1 and attempted a connection from Host 2 via an arbitrary custom port.
Initially, the inspection didn't seem to function. This led me to suspect that the firewall might not be inspecting traffic directly exchanged between hosts on the same subnet. So I implemented forced routing on each host to route their inter-host traffic through the GW and it started working as expected.
So I have some questions:
- Does Check Point firewall typically bypass inspection for traffic that doesn't pass through the firewall?
- In a scenario where one of the machines within a "Secure Network" (as defined in Network Management) initiates malicious activity, how can we ensure traffic inspection if it's not routed through the GW?
- Are there recommended practices or configurations in Check Point for ensuring traffic inspection within the same subnet, particularly for traffic that isn't naturally routed through the GW?
Any insights or recommendations on this matter would be greatly appreciated.
Thank you!