Solved

Checkpoint NG reverse proxy

Posted on 2006-06-12
4
2,406 Views
Last Modified: 2013-11-16
Hi All,

Im currently looking at our design and implementation out in our DMZ.

I have read a fair bit of material that outlines the benefits of running a reverse proxy through to certain services that need a little bit more protection from the outside world.

Has anyone had any luck implementing reverse proxy to a DMZ environment on checkpoint NG.? Any white papers or doco would be fantastic too.

I realise implementing this on ISA 2004 is a doddle and am not interested in ISA comments, ISA is not an option, so checkpoint answers only please.

Thanks

S
0
Comment
Question by:nexissteve
  • 2
4 Comments
 
LVL 12

Accepted Solution

by:
srikrishnak earned 500 total points
ID: 16892130
0
 
LVL 5

Expert Comment

by:dbardbar
ID: 16895401
What extra security do you EXACTLY need?
How would you like (generly speaking) for the user experience to be when accessing the DMZ servers?
Is this HTTP only? Other protocols?
Do you today have a CP FW-1 connecting the DMZ to the outside world?
0
 
LVL 6

Author Comment

by:nexissteve
ID: 16897126

What extra security do you EXACTLY need?

Full auditing and minimising the attack vector on a member server that is running a web site.

How would you like (generly speaking) for the user experience to be when accessing the DMZ servers?

Transparent

Is this HTTP only? Other protocols?

HTTPS or HTTP

Do you today have a CP FW-1 connecting the DMZ to the outside world?

To multiple DMZ's

0
 
LVL 6

Author Comment

by:nexissteve
ID: 16958269
Checkpoint cannot do true reverse proxy.

The answer lies in srikrishnak's comment in that you have to use user auth.

Not quite the answer I was looking for. But thanks all the same.
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco 800 Router or Cisco SG300 layer3 Switch (Separation of offices) 1 256
Cisco asax sourcefire Ips 7 65
firewall inside of network 9 73
SRX240 SYSLOG Setting 6 87
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now