I have a question about HTTPS inspection. As per Checkpoint website:
In outbound HTTPS inspection, when a client in the organization initiates an HTTPS connection to a secure site, the Security Gateway:
- Intercepts the request.
- Establishes a secure connection to the requested web site and validates the site server certificate.
- Creates a new SSL certificate for the communication between the Security Gateway and the client, sends the client the new certificate and continues the SSL negotiation with it.
- Using the two SSL connections:
- It decrypts the encrypted data from the client.
- Inspects the clear text content for all blades set in the Policy.
> 3. Encrypts the data again to keep client privacy as the data travels to the destination web server resource.
HI want to enable HTTPS insection in fortigate FW but i did not get enough information in their website about so i am checking the same in Checkpoint's website. But i ended up in having more doubts.t
How FW validates Server's Certificate?
To verify the Certificate FW shd have trusted Root Certificates, if its not verifiying then there is no use of enableing HTTPS inspection as we are not able to authenticate Server itself.
To encrypt the data firewall should generates the Session key, FW encrypts the session key using public key of Server and sends to server. This key is used for Encryption and Decryption of Data.
Client PC also should generate the session key for encryption and decryption, Does client generates same key as generated by Firewall? Two tunnnels will establish once inspection is enabled, which keys are using to Encrypt/Decrypt the data in System end and Firewall End...