HTTP/HTTPS Proxy

You can configure a Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterXL / Scalable Platform Security Group to act as an HTTP/HTTPS Proxy on your network.

In such configuration, the Security Gateway / ClusterXL / Security Group becomes an intermediary between hosts that communicate with each other through the Security Gateway / ClusterXL / Security Group. It does not allow a direct connection between these hosts.

Each successful connection creates two different connections:

  • One connection between the client in the organization and the proxy (Security Gateway / ClusterXL / Security Group).

  • One connection between the proxy (Security Gateway / ClusterXL / Security Group) and the actual destination.

These proxy modes are supported:

Mode

Description

Transparent

All HTTP traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway / ClusterXL / Security Group.

No configuration is required on the clients.

Non Transparent

All HTTP/HTTPS traffic on specified ports and interfaces is intercepted and processed by the Proxy code in the Security Gateway / ClusterXL / Security Group.

Configuration of the proxy server and proxy port is required on client machines.

For more information, see: