Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Tim_Gadjiev_S
Explorer
Jump to solution

Outbound HTTPS Inspection through 3rd Proxy

Dear mates,

I need a help with outbound HTTPS Inspection.

In my company we use 3rd party Proxy server for users Internet access. Inside and outside interfaces for this Proxy is located on ClusterXL. So i need to implement HTTPS inspection. I need to know which user go to one or the other Internet site/service. This need to know which user try to open Internet resources with viruses or threat. I try to apply HTTPS Inspection policy between Users and Proxy. It doesn't work. After that i try to apply HTTPS Inspection policy between Proxy and Internet. It works. But i faced with new problem. This Proxy server used by Linux users and another services which cannot work with HTTPS Inspection properly. 

Why i am looking for solution where HTTPS Inspection policy should be between Users and Proxy server, because it is very scalable solution. In this implementation i can add or remove some networks for HTTPS Inspection. For example i can add Windows users networks and exclude Linux users or some one. 

So i started to find solution about HTTPS Inspection and Proxy server. And i found that the Checkpoint HTTPS Inspection cannot work with NTLM and Kerberos authentication.

So my quesstion is. How can i implement HTTPS Inspection with 3rd party Proxy server, where i need to know which user go to one or the other Internet site/service?

P.S. in my company we cannot use Checkpoint as HTTP/HTTPS Proxy by internal position of the company.

P.P.S. Sorry for my English, it is not my native language.

TGS
0 Kudos
1 Solution

Accepted Solutions
Wolfgang
Authority
Authority

@Tim_Gadjiev_S  If you want to see the original IP addresses of your clients in the connections from proxy to internet, your proxy has to add the „x-forwarded-for header“.

But from my experience with such a configuration the best is to do the inspection between clients and proxy and not between proxy and internet. Are you really sure your source and destination IPs in the https inspection rule are correct. Any NAT maybe?

And best for https inspection will be to go with version R80.40.

View solution in original post

0 Kudos
8 Replies
PhoneBoy
Admin
Admin

A simple network diagram would be helpful.
When you say “it doesn’t work” what precisely do you mean?
Can you describe the behavior in detail?

Also, for “HTTPS Inspection cannot work with NTLM and Kerberos authentication” I’m pretty sure we can work with Kerberos since that is something Identity Awareness supports.

Also, please mention version/JHF in use.

0 Kudos
Tim_Gadjiev_S
Explorer

I cannot reply on below your question, i don't understand why. But i added all you requested information below my Post. 

TGS
0 Kudos
Tim_Gadjiev_S
Explorer

When i say “it doesn’t work” i mean it doesn't Inspect the traffic going from User to Proxy. I think it is Bypassed, but i didn't see it in the Smart Log. Also i check this traffic with fw ctl zdebug + drop, the traffic was not dropped.

Simple Network diagram

IP addresses was changed.

Simple Network Diagram.JPG in attached

Version of Checkpoint GW

Checkpoint Appliance 15600

GAIA OS R80.30

JHF 228

Details

So, desire of Security Team in my company is view the unecrypted traffic going from User to Internet for prevent Threats and viruses with Anti-Virus Blade and use the Application Control Blade to the fullest. But, position of our Security Team is using Proxy server for Internet access. At first, i created HTTPS rules for Proxy like:

HTTPS Inspection from Proxy to Internet.JPG in attached

And this rules works fine. Proxy traffic will Inspected, but i faced with 2 problems:

  1. I didn't see wich user get some viruses, because i see only IP address of Proxy Server
  2. This Proxy server used by other clients, like Linux users and Developers, whose software is not support HTTPS Inspection and i cannot bypassed it.

After that i created another HTTPS rules like:

HTTPS Inspection from User to Proxy.JPG in attached

Where Pent_Windows is host with IP 10.10.10.10

But this rule is not working, i mean the traffic is not Inspected. Also i coudn't see Bypass in Smart Log.

My question is, how can i make the rule work when i Inspect the traffic going from User to Proxy?

In our company we use tcp/80 and tcp/3128 for Proxy.

Thank you in advance.

TGS
0 Kudos
Wolfgang
Authority
Authority

@Tim_Gadjiev_S  If you want to see the original IP addresses of your clients in the connections from proxy to internet, your proxy has to add the „x-forwarded-for header“.

But from my experience with such a configuration the best is to do the inspection between clients and proxy and not between proxy and internet. Are you really sure your source and destination IPs in the https inspection rule are correct. Any NAT maybe?

And best for https inspection will be to go with version R80.40.

0 Kudos
Tim_Gadjiev_S
Explorer

Thank you for reply. If i remember the X-forwarded-for spoted my internal IP addresses in the header. It's not secure. And yes you are right, i NATed external Proxy IP address  on the ClusterXL. If i remeber Checkpoint Traffic Flow, the  Access Rule is triggered first, then NAT, after that HTTPS Inspection, my mistake. So if i understood, i need to change HTTPS rules from Hide IP of Proxy to the NAT IP Proxy, or need to add zero NAT rule from Users to Proxy. Thank you.

TGS
0 Kudos
Tim_Gadjiev_S
Explorer

Dear Wolfang. You are right, it is NAT issue. I added zero NAT from users to Proxy and all working fine. 

TGS
0 Kudos
PhoneBoy
Admin
Admin

You're inspecting the traffic twice, if I'm understanding your rules correctly.
You should only do this once, and best to do it from the users to the proxy.
You also can't HTTPS Inspect non-web traffic (e.g. that NTLM traffic).
If you want to add identities to the logs (or do additional filtering based on it), then you will need to configure Identity Awareness.

Also 100% agree with @Wolfgang, you should be using at least R80.40 if not R81.

0 Kudos
Tim_Gadjiev_S
Explorer

Thank you for reply. No i didn't inspect traffic twise. I didn't combine the HTTPS rules. At first time i tried HTTPS rules like Proxy-to Internet, after that i changed this rules on User-to Proxy. You absolutely right, i can't Inspect NTLM. But NTLM and HTTPS traffic is separatly TCP flows. I thinked the Checkpoint could bypass NTLM TCP flow after that it can Inspect next flow - HTTPS. Thank you for your recommendation about R80.40. I planning to upgrade from R80.30 kernel 2.6 to R80.40 kernel 3.10. Another good opportunity to do it 🙂

TGS
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events