- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Can Anybody PLease help me on this How to configure Check Point Security Gateway as HTTP/HTTPS Proxy
Thanks In advance
Apologies, but I have to paste the entire SK here to get to the bottom of it.
Please scroll down to the highlighted sections and please help me understand the implications of these perls of wisdom:
----
R80.10 Configuration
-----
(3) Limitations
HTTP/HTTPS proxy support is limited for the following features/configurations:
HTTPS traffic | Not supported in Transparent Proxy configuration when the HTTPS traffic ports are configured in the 'ports' section of the proxy configuration. | No active plans |
----
The following features/configuration are supported, but might require some adjustments:
HTTPS traffic | Supported in Non-Transparent Proxy configuration. | - |
-----
For what its worth, this seem to do the trick:
With Proxy configured thus:
And the proxy checker actually returns:
But since I have HTTPS inspection enabled, I have no means to discern if that traffic is being proxied or inspected inline which, in case of HTTPS may not be different anyhow, as the session is broken-down in two and the certificates will be substituted in both cases:
How to configure Check Point Security Gateway as HTTP/HTTPS Proxy
Top of Form
Rate This |
Bottom of Form
Solution ID | sk110013 |
Product | Security Gateway |
Version | R75.40, R75.40VS, R75.45, R75.46, R75.47, R76, R76SP, R76SP.10, R76SP.10_VSLS, R76SP.20, R76SP.30, R76SP.40, R77, R77.10, R77.20, R77.30, R80.10 |
OS | Gaia, SecurePlatform 2.6 |
Platform / Model | All |
Date Created | 14-Feb-2016 |
Last Modified | 22-Jan-2018 |
Solution
Table of Contents:
(1) Configuration in SmartDashboard
Two proxy modes are supported:
You can configure one of these options for forwarding HTTP requests:
By default, traffic is intercepted only on port 8080. You can add or edit ports as required.
You can configure proxy headers by clicking on Advanced... button.
The Security Gateway opens two connections (one connection with the client and one connection with the actual destination server), but only the Firewall blade can log both connections.
Other blades show only the connection between the client and the Security Gateway.
The "Destination" field of the log only shows the Security Gateway and not the actual destination server.
The "Resource" field shows the actual destination.
R80.10 Configuration
(2) Important notes
(3) Limitations
HTTP/HTTPS proxy support is limited for the following features/configurations:
Feature / | Comments | Plans |
IPv6 | Proxy can be used, but not for IPv6 connections. In addition, refer to sk112816 - Check Point support for IPv4 / IPv6 Proxy. | Planned to be resolved in a future version. |
Span Port / | Proxy is not supported when this feature is enabled. Refer to sk98389. | No active plans |
VPN Site-to-Site | Proxy can be used, but not over VPN connections. Refer to sk93929. | Planned to be resolved in a future version. |
Mobile Access blade | Proxy can be used, but not over Mobile Access connections. | No active plans |
Anti-Spam & E-mail Security blade | Proxy is not supported when this feature is enabled. *The Content-based Anti-Spam is not supported with proxy (only the IP Reputation is supported) | No active plans |
Application Accounting | Not supported in Transparent Proxy configuration. | No active plans |
HTTPS traffic | Not supported in Transparent Proxy configuration when the HTTPS traffic ports are configured in the 'ports' section of the proxy configuration. | No active plans |
UserCheck | Users do not receive a UserCheck page for blocked HTTPS connections that pass through Proxy, but instead receive a message that the page could not be reached. | Planned to be resolved in a future version. |
NTLM authentication | Not supported in Proxy configuration. Refer to sk100214. | No active plans |
The following features/configuration are supported, but might require some adjustments:
Feature / | Comments | Integrated in |
VPN Remote Access with client E75.30 | The following configuration is required - add both internal and external interfaces to 'Specific Interfaces' setting in HTTP/HTTPS Proxy properties. | - |
UserCheck | UserCheck block page message is not shown when Security Gateway is configured as HTTP Proxy. To resolve the issue, add the portal IP address to the proxy exceptions list in your web browser, or use a proxy PAC file to exclude the portal from the connections that require a proxy. This allows the client to connect directly to the portal, without going through the proxy feature. Refer to sk72100. | - |
Bridge mode | The following configuration is required - you must configure an IP address on the bridge interface. | - |
Cluster with Cluster Virtual IP address on a different subnet than the member's physical IP addresses | In case you encounter connectivity issues, contact Check Point Support to get a Hotfix for this issue (Issue ID 01223637). | R76 and above |
Application & URL Filtering with a single interface | When Security Gateway is configured as HTTP/HTTPS Proxy with a single interface, define the relevant rules in 'Application & URL Filtering' policy as follows: Source - 'Any'; Destination - 'Any'. Refer to sk80340. | - |
"Page not found" error | Error is shown when Security Gateway is configured as Non-transparent Proxy, if the same site is accessed on more than one destination port. Contact Check Point Support to get a Hotfix for this issue (Issue ID 01134342). | R75.47, |
Ports Leak in ClusterXL HA | If ClusterXL in High Availability mode is used as Proxy in Non Transparent mode, then NAT kernel table 'fwx_alloc' on the Standby cluster member has significantly more entries than on the Active cluster member. "NAT hide failure - no available port for hide NAT" logs in SmartView Tracker will appear. | R77 and above |
HTTPS traffic | Supported in Non-Transparent Proxy configuration. | - |
Additional notes:
(4) Proxy errors
Below is a summary of proxy errors as it is seen in browser and in logs.
Error | Browser | Log |
DNS failure, no connectivity to DNS server | Gateway Timeout The requested URL couldn't be resolved | Reject Proxy: DNS timeout/error; Connection was rejected due to DNS timeout or error |
DNS server is available but no record for the URL request | Gateway Timeout The requested URL couldn't be resolved | Reject Proxy: Internal error; Connection was rejected due to internal error |
DNS server is available, record for URL also available but no Internet connection | This web page is not available ERR_TUNNEL_CONNECTION_FAILED | Reject Can't connect to server |
HTTP server failure, no connectivity to HTTP server | Gateway Timeout The requested URL couldn't be resolved | Reject Can't connect to server |
HTTPS server error "500/404" - usually it indicates on a problem with the HTML code or page not found | Server error 500 | Accept |
Server Reset: Server is up and running but not listens to HTTP/S ports. Can happen after reboot or internal server errors | Server error 502 | Accept |
Authentication failure: wrong credential in a password authentication | Unauthorized The server could not verify that you are authorized to access the document requested. | Accept |
(5) Related documentation
(6) Related solutions
Applies To:
Not supported in Transparent Proxy configuration when the HTTPS traffic ports are configured in the 'ports' section of the proxy configuration.
That just means we can't transparently proxy HTTPS. Which makes sense because you would need to to HTTPS Inspection to do it properly.
HTTPS traffic
Supported in Non-Transparent Proxy configuration.
This is because in an explicit proxy mode, the actual connect message is in cleartext (e.g. CONNECT https://www.google.com HTTP/1.1).
We can allow/block traffic based on the actual destination in this case.
I've configured WPAD via DHCP and serve a central PAC file which excludes the security gateway. Workstations subsequently use an explicit proxy configuration but UserCheck redirection is not working in Google Chrome, Edge and Internet Explorer. Is this an issue I should open with TAC or do I need to do something to get the browser to honor the redirect?
The following is a packet capture from the office router sitting in between the workstation and the security gateway:
The browser appear to simply ignored the response. I'm able to see the User Check message if I manually type it in to the browser and it's not sent to the security gateway via the proxy protocol.
PS: Running R80.10 management and security gateway.
It might be worth a TAC case, but we are sending a redirect-type message as we should.
Never seen a 303 error before but it kind of makes sense since it's neither a "temporary" or "permanent" redirect.
What gateway are you expecting the user check from? If remote, its’ user check URL should also be made accessible, else your workstation may be attempting to reach it via the local one.
Directly from the security gateway at the moment:
internet --- firewall --- PC
We would like to present User Check notifications for secure sites, without enabling HTTPS inspection and understood R80.10 to be able to do this when configuring an explicit proxy.
David,
please provide a topology information describing PC, both gateways, any routers between them, etc..
Your traffic may be going from PC to secure site via remote gateway (proxy), but when redirected, points to the local gateway for the access to the UserCheck URL.
Hi Vladimir,
The test case is extremely simple, we have a security gateway at the perimeter of our network (100.127.254.1/30), which interfaces with a router (100.127.254.2/30), which is the gateway for the LAN (192.168.5.254/23). A workstation (192.168.5.12/23) attempting to navigate to a site who's category is blocked and configured to display a User Check notice only redirects to the notification page when using plain HTTP connections.
I understood R80.10 to be able to redirect secure browsing (HTTPS) requests when workstations are configured with an explicit proxy. We subsequently configured the security gateway as a non-transparent proxy, set the proxy port as 3128 and configured a workstation to use the explicit proxy (100.127.254.1:3128).
Using Internet Explorer 11, Edge or Google Chrome and navigating to a non-secure site results in the browser displaying the User Check page but browsing to blocked HTTPS sites results in a connection error being displayed, instead of the User Check page.
P.S. This is not a vSEC implementation, though. I've just piggybacked on the thread as this distinction seem immaterial in my case.
P.S.S. Is there a reason you are asking about App Control functionality with proxy in the mix?
Will proxy somehow impede the App Control ?
Dear Team,
Tell me, please, are there any nuances in synchronizing proxy connections?
We tested the non-transparent proxy: we started downloading a large file and changed the active member of the cluster. Download interrupted and did not recover. With other proxy (such as SQUID) we hadn't similar problems.
As far as I know, explicit proxy connections are not synchronized.
Thanks for reply.
But is there any documentary evidence of this?
In proxy limitations I see that only on 41000 / 61000 Security System proxy connections will be dropped during failovers (due to the fact that such connections are handled as a Local Connection, which has no backup).
I see what you mean, as it's explictly listed as "not supported" for Scalable Platforms (but not regular ones) here: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy
In which case, if you're having issues with this, it's worth a TAC case to investigate further.
Hello Guys for additional information, I have 3 proxies and we will coming soon remove these feature of our gateways because in tacker log we don't see all track of users access. For all others connections without proxy are tracked full in smartview.
Could please verify in your environment its occurred?
Are you running them in a transparent or non-transparent mode?
Do you have HTTPS inspection enabled?
Yes, I have HTTPS Inspection enable and non-transparent mode. The web browsers with pacfile script.
Are you missing some of the information or is there nothing at all logged for users accessing sites via proxies?
Is IA enabled on both, the gateways as well as on management?
Yes the IA is enabled on both, and some access not show the user from IA only the gateway in source field... I think its related two connections was established one client to firewall and other firewall to destination site.
We have another problem too when use the proxy, some access not showing the url destination in "Resource field", I think to use the proxy feature is not better idea.
I do recall encountering similar issues in the past, some of them may even be listed in this thread.
Did you try it with these settings enabled in the HTTP/HTTPS Proxy / Advanced properties?
You may not want to leave those permanently turned-on, but may be it will help the gateways track the decoupled log events better.
I really would like for someone from Check Point to comment on the issue of tracking web access via proxies with clearly identified resources.
To log all URLs, the rule that matches must be set to track with extended log.
If this is not happening, please open a TAC case so the issue can be investigated.
I can confirm that the proxy connections are not being logged properly.
with the layer's blades being:
And the gateway configured:
Proxy functionality verified:
Log's Resource and the URL columns remain empty:
That's it , now how can we solve this ?
Please open SR with TAC and include in it reference to this thread (you can include the link to my post with details directly, so that they will not be searching for it). Chose severity of the case to reflect how badly it affects your production environment.
Reply here with the SR # to enable forum curators collaborate with TAC and R&D and keep all of us updated on the progress.
cross-referencing this thread:
HTTPS inspection real life examples and caveats in R77.30 and R80.10
As I showed in the screenshots below I believe using the CP as a proxy works perfectly fine for me.
Possibly the findings from this chat that Resource tracking doesn't work is because of a bug (?) that there are two "Resource" columns (see screenshot above) and the one that is displayed in the previous screenshots was the wrong one?
Advanced
You can configure proxy headers by clicking on Advanced... button.
Logging
The Security Gateway opens two connections (one connection with the client and one connection with the actual destination server), but only the Firewall blade can log both connections.That's it ... The X-forward and Log full are configured too...
Hmm.. does it work now or are you simply saying that those settings are enabled already, but you are still having problems with logging?
Hi Vladimir
It was already set up and it does not work. Because this I will deactivate this feature.
Thanks.
I'll try to replicate it in mu lab at some point and post the discoveries here.
Have you opened the SR with TAC?
If yes, please reply with the case #, so that CP guys can follow up on it.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
10 | |
8 | |
6 | |
5 | |
5 | |
5 | |
5 | |
5 | |
5 | |
4 |
Wed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksWed 03 Sep 2025 @ 11:00 AM (SGT)
Deep Dive APAC: Troubleshooting 101 for Quantum Security GatewaysThu 04 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: External Risk Management for DummiesWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY