- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hey guys,
In the https inspection policy there is an object called internet, I can guess from the name what it means but what is it actually? Is it like any? Also I saw somewhere that said that using the internet object determines weather the traffic is considered inbound or outbound which sounds weird, is that true?
Also, is there a difference between the inbound and outbound, or does it just depend on the certificate you should put in the certificate column of a certain rule
Hi @bob111
The Internet object in the Application Control & URL Filtering policy actually only applies to traffic that's leaving an interface marked as external.
https://community.checkpoint.com/t5/Management/quot-Internet-quot-object-Internet/m-p/21030#M16513
Thanks! Do you know when traffic is considered outbound or inbound in https inspection? Is it just according to the certificate you put in a rule?
Hi,
I don’t think that the cert influances the direction of the traffic.
Hi @bob111
And the official SK: https://support.checkpoint.com/results/sk/sk64543
"Internet" means "include all traffic from Internal directed to External or DMZ according to gateway topology".
Internet object strictly means ONLY external ip addresses. Unlike any, which means both internal/external.
Personally, I use Internet object for urlf ordered layer, though can be used in any layer where urlf blade is enabled in policy layer settings.
Makes sense?
Andy
Thanks for the reply! I understand but what is considered external to the firewall?
From what I gathered about the https inspection feature, inbound and outbound inspection behave in a different way - inbound uses the server certificate of the internal server and outbound uses the outbound ca certificate on the firewall to decrypt and encrypt the tls connection. This is from the checkpoint docs:
but when does the firewall treat the traffic as inbound and when as outbound? that is what I don't understand.
What is considered external to the firewall? Simple answer...ANYTHING out on the Internet, when it comes to OUTBOUND https inspection.
Andy
But what do you mean when it comes to outbound https inspection? I am on an air-gaped environment without any connection to the internet.
I don't understand when traffic is "inbound inspected" or "outbound inspected".
Appreciate the help:)
Hi @bob111
I think the key is here the "External". You can set an interface as external anytime, it not depent ont hte IP of the interface, The IF with private IP can be an external interface,
Think about it, there are internal FW-s without public internet access, but they have external interface too. 🙂
Akos
Of course I understand that I have externel interfaces on my air gaped firewall😅, my question was about https inspection - since outbound and inbound work differently with how they encrypt and decrypt the tls session (inbound -server certificate , outbound - ca cert on firewall), I don't really understand when is traffic categorized for outbound and when for inbound, is it when to reach the destination the traffic exists from an interface that is set as external?
Hi @bob111
The policy methodology is the same as the access control policy.
The direction depends on the topology. In a nutshell: if the routing routes to external IF that is external.
SRC | DST | direction |
Internet | internal network | inbound |
internal network | Internet | outbound |
The flow is described here
Outbound connections are HTTPS connections that arrive from an internal client and connect to an external server.
Outbound connection flow
Inbound connections are HTTPS connections that arrive from an external client and connect to a server in the DMZ or the internal network.
Inbound connection flow
Akos
Yes sir, PERFECT explanation.
One notable exception for matching object Internet as a destination would be traffic being encrypted into a VPN by the gateway itself and leaving on an External interface; this tunneled traffic will not match object Internet for a destination. IKE/IPSec traffic just transiting the gateway to the outside (i.e. another device is doing the actual encrypt/decrypt) will still match object Internet for the destination.
Just watch this video, but instead of proxy, imagine its inspection, its literally SAME principle.
Andy
Inbound HTTPS Inspection rules require specific configuration, namely a server-specific certificate configured in the relevant rule in your HTTPS Inspection policy.
All of the following rules are Outbound rules:
Server-specific certificates must be explicitly configured in SmartDashboard (not SmartConsole)...at least until R82.
And one more:
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
23 | |
13 | |
9 | |
8 | |
8 | |
6 | |
5 | |
4 | |
4 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesWed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY