Hi @bob111
The policy methodology is the same as the access control policy.
The direction depends on the topology. In a nutshell: if the routing routes to external IF that is external.
SRC |
DST |
direction |
Internet |
internal network |
inbound |
internal network |
Internet |
outbound |
The flow is described here
Outbound connections are HTTPS connections that arrive from an internal client and connect to an external server.
Outbound connection flow
- An HTTPS request (from an internal client to an external server) arrives at the Security GatewayClosed.
- The Security Gateway inspects the HTTPS request.
- The Security Gateway determines whether the HTTPS request matches an existing HTTPS InspectionClosed ruleClosed:
- If the HTTPS request does not match a rule, then the Security Gateway does not inspect the HTTPS payload.
- If the HTTPS request matches a rule, then the Security Gateway continues to the next step.
- The Security Gateway validates the HTTPS certificate from the external server.
- The Security Gateway uses the Online Certificate Status Protocol (OCSP) standard.
- The Security Gateway creates a new certificate for the connection to the external server.
- The Security Gateway decrypts the HTTPS connection.
- The Security Gateway inspects the decrypted HTTPS connection.
- If the Security PolicyClosed allows this traffic, the Security Gateway encrypts the HTTPS connection.
- The Security Gateway sends the HTTPS request to the external server.
Inbound connections are HTTPS connections that arrive from an external client and connect to a server in the DMZ or the internal network.
Inbound connection flow
- An HTTPS request (from an external client to an internal server) arrives at the Security Gateway.
- The Security Gateway inspects the HTTPS request.
- The Security Gateway determines whether the HTTPS request matches an existing HTTPS Inspection rule:
- If the HTTPS request does not match a rule, then the Security Gateway does not inspect the HTTPS payload.
- If the HTTPS request matches a rule, then the Security Gateway continues to the next step.
- The Security Gateway uses the certificate for the internal server to create an HTTPS connection with the external client.
- The Security Gateway creates a new HTTPS connection with the internal server.
- The Security Gateway decrypts the HTTPS connection.
- The Security Gateway inspects the decrypted HTTPS connection.
- If the Security Policy allows this traffic, the Security Gateway encrypts the HTTPS connection and sends it to the internal server.
Akos
----------------
\m/_(>_<)_\m/