Forum Discussion

martyn's avatar
martyn
Icon for Altostratus rankAltostratus
Jul 15, 2025

Checkpoint Web Smartconsole behind reverse proxy.

Does anyone have any experience at trying (and hopefully suceeding) to put a Checkpoint (CP) FW Provider-1 based web smartconsole behind a reverse proxy.

The thing is that CP use local IP addresses to identify one of a selection of management module instances.
And they use webtransport/websockets to connect from these mgmt modules back to a browser for displaying FW policies and log data etc.

That all seems fairly OK but they don't anchor it using the connection ID and so the raw IPs (of what they call the domain blade/instance) get passed to the browser. 

But we would prefer to NAT/hide/reIP the server (domain) side IPs and not have the internal server/domain IPs sent along to the browser.

Part of the conversation, and some wrapper text from me, from the server to the client follows:

***

We wish to use access to various customer domains using the /smartconsole web interface. But the access has to be behind a reverse proxy (F5 vIP) and after the initial logon using the CMA IP behind a vIP (so address the browser sees is a service public one) you get a screen where the domain is listed and after selecting continue you get redirected seperately to the CMA IP in an internal JSON/javascript message. Hence breaking the attempt to have the CMA behind a reverse proxy.

***

{"data":{"loginToDomain":{"transportOtt":"107ad894-253d-4638-aa31-1c3e7d23172a","transportUrl":"https://100.64.20.29:443/smartconsole/transport","__typename":"LoginToDomainResponse"}}}

***

 

No RepliesBe the first to reply