HTTP/HTTPS Proxy
In such configuration, the Security Group becomes an intermediary between hosts that communicate with each other through the Security Group. It does not allow a direct connection between these hosts.
Each successful connection creates two different connections:
-
One connection between the client in the organization and the proxy (Security Group).
-
One connection between the proxy (Security Group) and the actual destination.
These proxy modes are supported:
-
Transparent - All HTTP traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Group. No configuration is required on the clients.
-
Non Transparent - All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Group. Configuration of the proxy address and port is required on client machines.
For more information, see:
-
sk110013 - How to configure Check Point Security Gateway as HTTP/HTTPS Proxy (requires Advanced access to Check Point Support Center)
-
sk92482 - Performance impact from enabling HTTP/HTTPS Proxy functionality (requires Advanced access to Check Point Support Center)