ICAP Client Functionality

The ICAP ClientClosed The ICAP Client functionality in your Security Gateway or Cluster (in versions R80.40 and higher) enables it to interact with an ICAP Server responses (see RFC 3507), modify their content, and block the matched HTTP connections. functionality in your Check Point Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. or ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. enables it to interact with an ICAP ServerClosed The ICAP Server functionality in your Security Gateway or Cluster (in versions R80.40 and higher) enables it to interact with an ICAP Client requests, send the files for inspection, and return the verdict. responses, modify their content, and block the matched HTTP connections.

In addition, you can add an ICAP Server decision to the enforcing logic on your Security Gateway, or Cluster (see Configuring Additional ICAP Response Headers for Enforcement).

The ICAP Client functionality in your Check Point Security Gateway or Cluster lets you work with 3rd party devices without changing your network topology.

The ICAP Client feature in your Check Point Security Gateway or Cluster supports these:

This ICAP Client functionality was tested against an internal ICAP Server and against the Check Point ICAP Server.

Notes:

  • There is no full Fail-Open support. In case of HTTP / HTTPS requests or responses with body and with only a single ICAP Server Service, the Fail Mode is always Fail-Close.

    ICAP Client in Check Point Security Gateway can support the Fail-Open with the Trickling From The End mode (see Configuring ICAP Client Data Trickling Parameters).

  • To inspect IPv6 traffic:

    1. Enable IPv6 support on your Security Gateway or Cluster members

    2. Configure all ICAP Servers with IPv6 addresses.