- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Doesn't the new "Proxy Chaining" feature introduced in R82 do what you want? See Section 5 of sk110013: How to configure Check Point Security Gateway as HTTP/HTTPS Proxy:
Starting from the version R82, you can configure Proxy Chaining on Security Gateways to forward outbound IPv4 HTTP/HTTPS traffic to an upstream proxy server based on URL patterns.
This enables a Security Gateway to support multi-layered proxy architectures for compliance, monitoring, or traffic routing purposes.
You configure the applicable proxy settings and rules on the Security Gateway in the "$FWDIR/conf/upstream_proxy_policy.txt" file.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY