HTTP/HTTPS Proxy
You can configure a Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterXL / Scalable Platform Security Group to act as an HTTP/HTTPS Proxy on your network.
In such configuration, the Security Gateway / ClusterXL / Security Group becomes an intermediary between hosts that communicate with each other through the Security Gateway / ClusterXL / Security Group. It does not allow a direct connection between these hosts.
Each successful connection creates two different connections:
-
One connection between the client in the organization and the proxy (Security Gateway / ClusterXL / Security Group).
-
One connection between the proxy (Security Gateway / ClusterXL / Security Group) and the actual destination.
These proxy modes are supported:
Mode |
Description |
---|---|
Transparent |
All HTTP traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway / ClusterXL / Security Group. No configuration is required on the clients. |
Non Transparent |
All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway / ClusterXL / Security Group. Configuration of the proxy server and proxy port is required on client machines. |
For more information, see:
-
sk110013 - How to configure Check Point Security Gateway as HTTP/HTTPS Proxy (requires Advanced access to Check Point Support Center)
-
sk92482 - Performance impact from enabling HTTP/HTTPS Proxy functionality (requires Advanced access to Check Point Support Center)