![]() ![]() ![]() +In the VPN domain you define which NETWORKS/HOSTS are part of which VPN community. ![]() This has nothing to do with which traffic goes INTO the tunnel. +The RULE BASE is only for allowing/denying traffic, you can put in the section 'VPN COMMUNITY' any or one community or many communities. Which way I can inspect this traffic which is passing via Tunnel and reaches CheckPoint and then to SFTP Server. secadmin44, what you are explaining is absolutely wrong. At first glance, this looks like you are running into the known collision between. I cannot use HTTPS inspection Policy as it is not HTTP/S protocol. Environment overview The equipment used in the creation of this guide is as follows: Vendor: Check Point Model: Check Point vSec Software Release: R80.10 Topology The topology outlined by this. You definitely want to consider calling TAC to verify your configuration. Then the packet reaches Internal SFTP server. Like, if I'm uploading any malware file onto our SFTP Server via VPN Tunnel from 3rdParty Client domain, will CheckPoint FW able to inspect this? (Either IPS or AV)Īs per FW chain modules, at external interface of CheckPoint-decrypt happens and then moved to modules like IPS/AV into FW kernel. How can I inspect this SFTP traffic in CheckPoint? I have below doubt to be implemented, can anyone shed some ideas on how to achieve.ġ) I have CheckPoint ClusterHA deployed and VPN Tunnel is running towards Peer 3rd Party FW.Ģ) Enabled FW, VPN, IPS, APP/URL, AV, AB blades in CheckPoint.ģ) Behind CheckPoint Cluster - we have SFTP Server in VPN DomainĤ) Behind Peer 3rd FW - we have Client machine who will access our SFTP server via VPN Tunnel and upload files. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |