Dear all,
We are going to change the configuration according to the customer's request.
SSL encryption and decryption is performed using F5, not Checkpoint Firewall, and 3rd party APT solution is integrated and operated.
Customers want to use Checkpoint's Prevention and Emulation feature instead of their existing APT solution.
As in the goal configuration diagram, the decryption traffic is again controlled by the checkpoint firewall to control the threat traffic.
Can you tell me what problems are expected if I configure it according to the target configuration diagram?
I'd like to know if anyone has experience with a similar configuration like this.
I need your advice.
Thanks
Outbound traffic flow :
1.encrypted traffic
2.Decryption traffic from F5 SSL
3.Detection and blocking by checkpoint threat prevention policy
4.Encrypted traffic from F5 SSL