Apologies, but I have to paste the entire SK here to get to the bottom of it.
Please scroll down to the highlighted sections and please help me understand the implications of these perls of wisdom:
----
R80.10 Configuration
- In order to make the Proxy Server to work on R80.10, an explicit rule should be created allowing traffic to the gateway itself on the proxy defined port.
- When using URL Filtering, an explicit rule should be created to match the URL categorization.
-----
(3) Limitations
HTTP/HTTPS proxy support is limited for the following features/configurations:
HTTPS traffic | Not supported in Transparent Proxy configuration when the HTTPS traffic ports are configured in the 'ports' section of the proxy configuration. | No active plans |
----
The following features/configuration are supported, but might require some adjustments:
HTTPS traffic | Supported in Non-Transparent Proxy configuration. | - |
-----
For what its worth, this seem to do the trick:
With Proxy configured thus:
And the proxy checker actually returns:
But since I have HTTPS inspection enabled, I have no means to discern if that traffic is being proxied or inspected inline which, in case of HTTPS may not be different anyhow, as the session is broken-down in two and the certificates will be substituted in both cases:
How to configure Check Point Security Gateway as HTTP/HTTPS Proxy
Top of Form
Bottom of Form
My Favorites
EmailPrint
Solution ID | sk110013 |
Product | Security Gateway |
Version | R75.40, R75.40VS, R75.45, R75.46, R75.47, R76, R76SP, R76SP.10, R76SP.10_VSLS, R76SP.20, R76SP.30, R76SP.40, R77, R77.10, R77.20, R77.30, R80.10 |
OS | Gaia, SecurePlatform 2.6 |
Platform / Model | All |
Date Created | 14-Feb-2016 |
Last Modified | 22-Jan-2018 |
Solution
Table of Contents:
- Configuration in SmartDashboard
- Important notes
- Limitations
- Proxy errors
- Related documentation
- Related solutions
(1) Configuration in SmartDashboard
- Open the Security Gateway object you would like to configure as a Proxy.
- Go to HTTP/HTTPS Proxy pane:
- Check the box Use this gateway as an HTTP/HTTPS Proxy.
- Configure the Proxy settings:
Two proxy modes are supported:
- Transparent - All HTTP traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway. No configuration is required on the clients.
- Non Transparent - All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway. Configuration of the proxy address and port is required on client machines.
- Access Control
You can configure one of these options for forwarding HTTP requests:
- All Internal Interfaces - HTTP/HTTPS traffic from all internal interfaces is processed by the Proxy code in the Security Gateway.
- Specific Interfaces - HTTP/HTTPS traffic from interfaces specified in the list is processed by the Proxy code in the Security Gateway.
- Ports
By default, traffic is intercepted only on port 8080. You can add or edit ports as required.
You can configure proxy headers by clicking on Advanced... button.
- Proxy related headers - By default, the HTTP header contains the "Via" proxy related header. Clear this checkbox if you do not want to include it.
- X-Forward-For header (original client source IP address) - check this box to include the actual source IP address in the HTTP.
This header must be configured, if traffic will be forwarded to Identity Awareness Security Gateways that require this information for user identification.
- Logging
The Security Gateway opens two connections (one connection with the client and one connection with the actual destination server), but only the Firewall blade can log both connections.
Other blades show only the connection between the client and the Security Gateway.
The "Destination" field of the log only shows the Security Gateway and not the actual destination server.
The "Resource" field shows the actual destination.
- Example:
- Install policy on the Security Gateway.
R80.10 Configuration
- In order to make the Proxy Server to work on R80.10, an explicit rule should be created allowing traffic to the gateway itself on the proxy defined port.
- When using URL Filtering, an explicit rule should be created to match the URL categorization.
(2) Important notes
- In order to maintain highest security, it is recommended to avoid selecting external interfaces as the relevant proxy interfaces.
- Check Point HTTP/HTTPS proxy is not a caching proxy (it does not cache commonly visited web pages to provide faster local access to hosts on the LAN).
(3) Limitations
HTTP/HTTPS proxy support is limited for the following features/configurations:
Feature / Configuration | Comments | Plans |
IPv6 | Proxy can be used, but not for IPv6 connections. In dual IP stack, only IPv4 traffic is supported. In addition, refer to sk112816 - Check Point support for IPv4 / IPv6 Proxy. | Planned to be resolved in a future version. |
Span Port / Mirror Port / Monitor Mode | Proxy is not supported when this feature is enabled. Refer to sk98389. | No active plans |
VPN Site-to-Site | Proxy can be used, but not over VPN connections. Refer to sk93929. | Planned to be resolved in a future version. |
Mobile Access blade | Proxy can be used, but not over Mobile Access connections. | No active plans |
Anti-Spam & E-mail Security blade | Proxy is not supported when this feature is enabled. *The Content-based Anti-Spam is not supported with proxy (only the IP Reputation is supported) | No active plans |
Application Accounting | Not supported in Transparent Proxy configuration. | No active plans |
HTTPS traffic | Not supported in Transparent Proxy configuration when the HTTPS traffic ports are configured in the 'ports' section of the proxy configuration. | No active plans |
UserCheck | Users do not receive a UserCheck page for blocked HTTPS connections that pass through Proxy, but instead receive a message that the page could not be reached. Refer to sk93184 and sk85640. | Planned to be resolved in a future version. |
NTLM authentication | Not supported in Proxy configuration. Refer to sk100214. | No active plans |
The following features/configuration are supported, but might require some adjustments:
Feature / Configuration | Comments | Integrated in |
VPN Remote Access with client E75.30 | The following configuration is required - add both internal and external interfaces to 'Specific Interfaces' setting in HTTP/HTTPS Proxy properties. | - |
UserCheck | UserCheck block page message is not shown when Security Gateway is configured as HTTP Proxy. To resolve the issue, add the portal IP address to the proxy exceptions list in your web browser, or use a proxy PAC file to exclude the portal from the connections that require a proxy. This allows the client to connect directly to the portal, without going through the proxy feature. Refer to sk72100. | - |
Bridge mode | The following configuration is required - you must configure an IP address on the bridge interface. | - |
Cluster with Cluster Virtual IP address on a different subnet than the member's physical IP addresses | In case you encounter connectivity issues, contact Check Point Support to get a Hotfix for this issue (Issue ID 01223637). | R76 and above |
Application & URL Filtering with a single interface | When Security Gateway is configured as HTTP/HTTPS Proxy with a single interface, define the relevant rules in 'Application & URL Filtering' policy as follows: Source - 'Any'; Destination - 'Any'. Refer to sk80340. | - |
"Page not found" error | Error is shown when Security Gateway is configured as Non-transparent Proxy, if the same site is accessed on more than one destination port. Contact Check Point Support to get a Hotfix for this issue (Issue ID 01134342). | R75.47, R77 and above |
Ports Leak in ClusterXL HA | If ClusterXL in High Availability mode is used as Proxy in Non Transparent mode, then NAT kernel table 'fwx_alloc' on the Standby cluster member has significantly more entries than on the Active cluster member. "NAT hide failure - no available port for hide NAT" logs in SmartView Tracker will appear. Refer to sk69480 and sk93247. | R77 and above |
HTTPS traffic | Supported in Non-Transparent Proxy configuration. | - |
Additional notes:
- By default, Check Point Security Gateway does not support Reverse Proxy Functionality.
For Capsule Docs Reverse Proxy, refer to: - On 41000 / 61000 Security System - Proxy connections will be dropped during failovers (due to the fact that such connections are handled as a Local Connection, which has no backup) (Issue 02331051).
(4) Proxy errors
Below is a summary of proxy errors as it is seen in browser and in logs.
Error | Browser | Log |
DNS failure, no connectivity to DNS server | Gateway Timeout The requested URL couldn't be resolved | Reject Proxy: DNS timeout/error; Connection was rejected due to DNS timeout or error |
DNS server is available but no record for the URL request | Gateway Timeout The requested URL couldn't be resolved | Reject Proxy: Internal error; Connection was rejected due to internal error |
DNS server is available, record for URL also available but no Internet connection | This web page is not available ERR_TUNNEL_CONNECTION_FAILED | Reject Can't connect to server |
HTTP server failure, no connectivity to HTTP server | Gateway Timeout The requested URL couldn't be resolved | Reject Can't connect to server |
HTTPS server error "500/404" - usually it indicates on a problem with the HTML code or page not found | Server error 500 | Accept |
Server Reset: Server is up and running but not listens to HTTP/S ports. Can happen after reboot or internal server errors | Server error 502 | Accept |
Authentication failure: wrong credential in a password authentication | Unauthorized The server could not verify that you are authorized to access the document requested. | Accept |
(5) Related documentation
(6) Related solutions
Applies To: