HTTP/HTTPS Proxy
You can configure a Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. to act as an HTTP/HTTPS Proxy on your network.
In such configuration, the Security Gateway becomes an intermediary between hosts that communicate with each other through the Security Gateway. It does not allow a direct connection between these hosts.
Each successful connection creates two different connections:
-
One connection between the client in the organization and the proxy (Security Gateway).
-
One connection between the proxy (Security Gateway) and the actual destination.
These proxy modes are supported:
-
Transparent - All HTTP traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway. No configuration is required on the clients.
-
Non Transparent - All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway. Configuration of the proxy address and port is required on client machines.
For more information, see:
-
sk110013 - How to configure Check Point Security Gateway as HTTP/HTTPS Proxy (requires Advanced access to Check Point Support Center)
-
sk92482 - Performance impact from enabling HTTP/HTTPS Proxy functionality (requires Advanced access to Check Point Support Center)