Hello,
I am trying to configure my Check Point R80.30 OpenServer gateway to proxy inbound HTTPS connections to a back-end webserver.
My goal is to have the Check Point gateway present/allow inbound TLS 1.1, 1.2 & 1.3 HTTPS connections and then connect to the back-end webserver which only supports TLS 1.0.
I would also like to have a one-to-one IP address mapping (rather than a one-to-many). Basically I would just like to continue using the NAT rules I already have in place.
It would look like this (in this example, the 10.x.x.x addresses would be publicly routable, Internet-facing):
Remote HTTPS client --> Check Point-GW 10.1.1.1 (TLS 1.1,2,3) --> 1.1.1.1 (TLS 1.0)
Remote HTTPS client --> Check Point-GW 10.1.1.2 (TLS 1.1,2,3) --> 1.1.1.2 (TLS 1.0)
Etc.
Currently I am using HTTPS inspection, which will present various TLS/cipher combinations, which is great, but it isn't functionally doing exactly what I need. While it will present the different TLS versions, ultimately, it will only accept and pass the TLS versions supported by the back-end webserver.
It appears as if the connection from the Check Point gateway to the back-end web server isn't a separate, negotiated TLS connection.
I can accomplish my goal with a Netscaler but I would prefer to use Check Point, as it would be administratively tidier to manage given my Netscaler architecture.
Perhaps I'm trying to use the wrong tool for the job, but I thought Check Point should be able to do something like this.
Thanks for any advise you can provide!