- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Dear all,
We are going to change the configuration according to the customer's request.
SSL encryption and decryption is performed using F5, not Checkpoint Firewall, and 3rd party APT solution is integrated and operated.
Customers want to use Checkpoint's Prevention and Emulation feature instead of their existing APT solution.
As in the goal configuration diagram, the decryption traffic is again controlled by the checkpoint firewall to control the threat traffic.
Can you tell me what problems are expected if I configure it according to the target configuration diagram?
I'd like to know if anyone has experience with a similar configuration like this.
I need your advice.
Thanks
Outbound traffic flow :
1.encrypted traffic
2.Decryption traffic from F5 SSL
3.Detection and blocking by checkpoint threat prevention policy
4.Encrypted traffic from F5 SSL
Usually, when the Check Point gateway isn’t doing the SSL Decrypt/Encrypt, you have boxes doing that on the inside and outside versus routing the encrypt and decrypt through the same box.
This creates the possibility of “double inspection” on the same flow, which will be dropped by the gateway unless the F5 can change the traffic on the outbound after re-encrypting so it looks different to the Check Point device.
However, you’re also doubling the amount of traffic the gateway is passing as well, which can have sizing implications.
The vast majority of customers just use our HTTPS Inspection instead of using an external SSL decrypt/reencrypt.
To add to @PhoneBoy comment, I spoke to customers in last 2-3 years who actually abandoned 3rd party vendors they were using specifically for ssl decryption (ie Bluecoat), as it was getting expensive and they went with CP https inspection, as it makes more sense, since you can use it as a blade on already existing firewall/cluster. I will say though, in all honesty, I was not a big fan of it back in R77.xx days, but it has come a long way since R80, for sure.
Can you share some additional detail as to the configuration...
Is the F5 proposed to be deployed as L2, L3 or using ICAP, doing NAT etc?
Further to @PhoneBoy earlier comments refer sk172204.
Can I use cloud emulation when integrating with ICAP? The firewall is NGTX.
I think it's the best way if this feature is provided.
Please refer to the ICAP portion of the Threat Prevention admin guide:
You can, yes, but it has some limitations in this mode.
See: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
I am trying to integrate with ICAP in my current configuration.
I think interworking with ICAP is a better way than processing the same traffic twice. Do you agree with me?
Are there many references to enabling and using ICAP on a firewall?
And what are the considerations when activating ICAP?
The relevant ICAP reference material is already linked above.
I'm otherwise not familiar enough with the capabilities of the F5 to advise.
But as @PhoneBoy explained we would commonly expect the Firewall to be the meat in the sandwich between an ingress and egress F5 performing encrypt/decrypt functions, if this can be performed logically on the one appliance such that the Firewall doesn't see what it thinks is the same traffic twice then great.
If you are using F5 for load balancing, offload the TSL termination to the F5. I have several TLS-heavy customers that do this. I also see more and more dumping F5/Bluecoat/etc. as @the_rock said, it's becoming too expensive, vs. moving up a gateway model.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 5 | |
| 4 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY