- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear all,
We are going to change the configuration according to the customer's request.
SSL encryption and decryption is performed using F5, not Checkpoint Firewall, and 3rd party APT solution is integrated and operated.
Customers want to use Checkpoint's Prevention and Emulation feature instead of their existing APT solution.
As in the goal configuration diagram, the decryption traffic is again controlled by the checkpoint firewall to control the threat traffic.
Can you tell me what problems are expected if I configure it according to the target configuration diagram?
I'd like to know if anyone has experience with a similar configuration like this.
I need your advice.
Thanks
Outbound traffic flow :
1.encrypted traffic
2.Decryption traffic from F5 SSL
3.Detection and blocking by checkpoint threat prevention policy
4.Encrypted traffic from F5 SSL
Usually, when the Check Point gateway isn’t doing the SSL Decrypt/Encrypt, you have boxes doing that on the inside and outside versus routing the encrypt and decrypt through the same box.
This creates the possibility of “double inspection” on the same flow, which will be dropped by the gateway unless the F5 can change the traffic on the outbound after re-encrypting so it looks different to the Check Point device.
However, you’re also doubling the amount of traffic the gateway is passing as well, which can have sizing implications.
The vast majority of customers just use our HTTPS Inspection instead of using an external SSL decrypt/reencrypt.
To add to @PhoneBoy comment, I spoke to customers in last 2-3 years who actually abandoned 3rd party vendors they were using specifically for ssl decryption (ie Bluecoat), as it was getting expensive and they went with CP https inspection, as it makes more sense, since you can use it as a blade on already existing firewall/cluster. I will say though, in all honesty, I was not a big fan of it back in R77.xx days, but it has come a long way since R80, for sure.
Can you share some additional detail as to the configuration...
Is the F5 proposed to be deployed as L2, L3 or using ICAP, doing NAT etc?
Further to @PhoneBoy earlier comments refer sk172204.
Can I use cloud emulation when integrating with ICAP? The firewall is NGTX.
I think it's the best way if this feature is provided.
Please refer to the ICAP portion of the Threat Prevention admin guide:
You can, yes, but it has some limitations in this mode.
See: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
I am trying to integrate with ICAP in my current configuration.
I think interworking with ICAP is a better way than processing the same traffic twice. Do you agree with me?
Are there many references to enabling and using ICAP on a firewall?
And what are the considerations when activating ICAP?
The relevant ICAP reference material is already linked above.
I'm otherwise not familiar enough with the capabilities of the F5 to advise.
But as @PhoneBoy explained we would commonly expect the Firewall to be the meat in the sandwich between an ingress and egress F5 performing encrypt/decrypt functions, if this can be performed logically on the one appliance such that the Firewall doesn't see what it thinks is the same traffic twice then great.
If you are using F5 for load balancing, offload the TSL termination to the F5. I have several TLS-heavy customers that do this. I also see more and more dumping F5/Bluecoat/etc. as @the_rock said, it's becoming too expensive, vs. moving up a gateway model.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 12 | |
| 8 | |
| 7 | |
| 6 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY