Check Point R80
Check Point R80
SECURITY MANAGEMENT
R80.30
Administration Guide
Protected
CHAPTE R 1
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page
https://www.checkpoint.com/products-solutions/certified-check-point-solutions/.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Security
Management R80.30 Administration Guide.
Revision History
Date Description
20 March 2019 First release of this document
Contents
Important Information................................................................................................... 3
Terms .......................................................................................................................... 10
Welcome ..................................................................................................................... 12
Getting Started ............................................................................................................ 13
Understanding SmartConsole ................................................................................. 14
SmartConsole ................................................................................................................14
SmartConsole Toolbars .................................................................................................15
Search Engine ...............................................................................................................18
Access and Threat Tools ................................................................................................19
Shared Policies..............................................................................................................20
API Command Line Interface .........................................................................................21
Keyboard Shortcuts for SmartConsole ..........................................................................21
Connecting to the Security Management Server through SmartConsole ............... 23
Setting Up for Security Management ...................................................................... 23
Setting up for Team Work ....................................................................................... 24
Managing Security through API and CLI.................................................................. 25
Configuring the API Server ............................................................................................25
Management API Settings .............................................................................................26
Planning Security Management .............................................................................. 27
Managing Administrator Accounts .............................................................................. 28
Creating and Changing an Administrator Account .................................................. 28
Creating a Certificate for Logging in to SmartConsole ........................................... 29
Configuring Default Expiration for Administrators ................................................. 30
Setting SmartConsole Timeout ............................................................................... 31
Deleting an Administrator ....................................................................................... 31
Revoking Administrator Certificate......................................................................... 31
Assigning Permission Profiles to Administrators ................................................... 32
Changing and Creating Permission Profiles ..................................................................32
Configuring Customized Permissions............................................................................33
Configuring Permissions for Access Control Layers .....................................................34
Configuring Permissions for Access Control and Threat Prevention .............................35
Configuring Permissions for Monitoring, Logging, Events, and Reports........................36
Defining Trusted Clients ......................................................................................... 36
Configuring Trusted Clients...........................................................................................37
Restricting Administrator Login Attempts .............................................................. 38
Unlocking Administrators ....................................................................................... 38
Session Flow for Administrators............................................................................. 39
Publishing a Session......................................................................................................39
Working in SmartConsole Session View ........................................................................40
Administrators Working with Multiple Sessions ............................................................41
Configuring Authentication Methods for Administrators ........................................ 43
Configuring Check Point Password Authentication for Administrators .........................43
Configuring OS Password Authentication for Administrators ........................................43
Configuring a RADIUS Server for Administrators ..........................................................44
Configuring a SecurID Server for Administrators ..........................................................45
Configuring a TACACS Server for Administrators..........................................................46
Managing Gateways .................................................................................................... 47
Creating a New Security Gateway ........................................................................... 47
Manually Updating the Gateway Topology............................................................... 48
Dynamically Updating the Topology ........................................................................ 48
Secure Internal Communication (SIC) ..................................................................... 49
Initializing Trust ............................................................................................................49
SIC Status ......................................................................................................................50
Trust State .....................................................................................................................50
Troubleshooting SIC ......................................................................................................51
Understanding the Check Point Internal Certificate Authority (ICA) ..............................52
ICA Clients .....................................................................................................................52
SIC Certificate Management ..........................................................................................52
Managing Software Blade Licenses ........................................................................ 53
Configuring a Proxy gateway .........................................................................................53
Viewing Licenses in SmartConsole ................................................................................54
Monitoring Licenses in SmartConsole ...........................................................................56
Managing Objects ........................................................................................................ 59
Object Categories .................................................................................................... 59
Adding, Editing, Cloning, Deleting, and Replacing Objects ..................................... 60
Object Tags .............................................................................................................. 61
Network Object Types ............................................................................................. 62
Networks .......................................................................................................................62
Network Groups ............................................................................................................62
Check Point Hosts .........................................................................................................63
Gateway Cluster ............................................................................................................63
Updatable Objects..........................................................................................................63
Use Case - Adding an Updatable Object to the Security Policy .......................................64
More Network Object Types...........................................................................................64
Managing Policies ....................................................................................................... 75
Working with Policy Packages ................................................................................ 75
Creating a New Policy Package .....................................................................................77
Adding a Policy Type to an Existing Policy Package .......................................................78
Installing a Policy Package ............................................................................................78
Installing the User Database .........................................................................................79
Uninstalling a Policy Package ........................................................................................79
Viewing Rule Logs ................................................................................................... 80
Policy Installation History ....................................................................................... 81
Creating an Access Control Policy .............................................................................. 82
Introducing the Unified Access Control Policy ........................................................ 82
Creating a Basic Access Control Policy ................................................................... 83
Basic Rules ....................................................................................................................83
Use Case - Basic Access Control ...................................................................................84
Use Case - Inline Layer for Each Department ................................................................85
Creating Application Control and URL Filtering Rules ............................................ 87
Monitoring Applications .................................................................................................87
Blocking Applications and Informing Users ...................................................................88
Limiting Application Traffic ...........................................................................................88
Using Identity Awareness Features in Rules .................................................................89
Blocking Sites ................................................................................................................91
Blocking URL Categories ...............................................................................................92
Ordered Layers and Inline Layers ........................................................................... 92
The Need for Ordered Layers and Inline Layers ............................................................93
Order of Rule Enforcement in Inline Layers ..................................................................93
Order of Rule Enforcement in Ordered Layers ..............................................................94
Creating an Inline Layer ................................................................................................94
Creating a Ordered Layer ..............................................................................................95
Enabling Access Control Features .................................................................................96
Types of Rules in the Rule Base.....................................................................................98
Administrators for Access Control Layers ...................................................................100
Sharing Layers ............................................................................................................100
Visual Division of the Rule Base with Sections .............................................................101
Exporting Layer Rules to a .CSV File............................................................................101
Managing Policies and Layers .....................................................................................102
The Columns of the Access Control Rule Base ..................................................... 103
Source and Destination Column ..................................................................................103
VPN Column ................................................................................................................104
Services & Applications Column ..................................................................................105
Content Column...........................................................................................................108
Actions Column ...........................................................................................................110
Tracking Column .........................................................................................................112
Unified Rule Base Use Cases ................................................................................ 112
Use Case - Application Control and Content Awareness Ordered Layer ...................... 113
Use Case - Inline Layer for Web Traffic .......................................................................114
Use Case - Content Awareness Ordered Layer ............................................................116
Use Case - Application & URL Filtering Ordered Layer ...............................................118
Rule Matching in the Access Control Policy .......................................................... 119
Examples of Rule Matching .........................................................................................119
Best Practices for Access Control Rules............................................................... 122
Installing the Access Control Policy ...................................................................... 124
Analyzing the Rule Base Hit Count ........................................................................ 124
Enabling or Disabling Hit Count ...................................................................................125
Configuring the Hit Count Display ................................................................................126
Preventing IP Spoofing .......................................................................................... 127
Configuring Anti-Spoofing ...........................................................................................128
Anti-Spoofing Options ..................................................................................................129
Multicast Access Control ...................................................................................... 130
Managing Pre-R80.10 Security Gateways ............................................................. 131
Configuring the NAT Policy ................................................................................... 132
Translating IP Addresses (NAT)...................................................................................132
NAT Rule Base .............................................................................................................136
Configuring Static and Hide NAT..................................................................................137
Configuring Stateful NAT64 (IPv6 to IPv4 translation) .................................................144
Configuring Stateless NAT46 (IPv4 to IPv6 translation) ...............................................158
Advanced NAT Settings................................................................................................170
Site-to-Site VPN .................................................................................................... 181
Sample Site-to-Site VPN Deployment..........................................................................181
VPN Communities........................................................................................................181
Sample Star Deployment .............................................................................................182
Sample Combination VPN Community .........................................................................184
Allowing VPN Connections...........................................................................................184
Sample VPN Access Control Rules ..............................................................................185
To Learn More About Site-to-Site VPN ........................................................................185
Remote Access VPN .............................................................................................. 186
VPN Connectivity Modes ..............................................................................................186
Sample Remote Access VPN Workflow........................................................................187
Configuring the Security Gateway for a Remote Access Community ........................... 188
To Learn More About Remote Access VPN ..................................................................188
Mobile Access to the Network ............................................................................... 189
Check Point Mobile Access Solutions ..........................................................................189
Configuring Mobile Access to Network Resources ......................................................190
Connecting to a Citrix Server .......................................................................................195
Compliance Check .......................................................................................................198
Secure Workspace.......................................................................................................199
To Learn More About Mobile Access ............................................................................200
Creating a Threat Prevention Policy ......................................................................... 201
Threat Prevention Components ............................................................................ 201
IPS ...............................................................................................................................202
Anti-Bot .......................................................................................................................203
Anti-Virus ....................................................................................................................205
SandBlast ....................................................................................................................205
Assigning Administrators for Threat Prevention .................................................. 207
Analyzing Threats ................................................................................................. 207
Out-of-the-Box Protection from Threats .............................................................. 208
Getting Quickly Up and Running with the Threat Prevention Policy ............................. 208
Enabling the Threat Prevention Software Blades ........................................................208
Installing the Threat Prevention Policy........................................................................211
Introducing Profiles .....................................................................................................212
Optimized Protection Profile Settings..........................................................................213
Predefined Rule...........................................................................................................214
The Threat Prevention Policy ................................................................................ 215
Workflow for Creating a Threat Prevention Policy.......................................................215
Threat Prevention Policy Layers ..................................................................................215
Threat Prevention Rule Base .......................................................................................218
Creating Threat Prevention Rules......................................................................... 219
Configuring Mail Settings ............................................................................................219
Configuring IPS Profile Settings ..................................................................................223
Configuring Anti-Virus Settings ...................................................................................224
Configuring Anti-Bot Settings ......................................................................................227
Configuring Threat Emulation Settings .......................................................................230
Configuring Threat Extraction Settings .......................................................................233
Configuring a Malware DNS Trap ................................................................................237
Exception Rules ...........................................................................................................238
The Check Point ThreatCloud................................................................................ 240
Threat Prevention Scheduled Updates.................................................................. 241
Introduction to Scheduled Updates..............................................................................241
Configuring Threat Prevention Scheduled Updates .....................................................242
To Learn More About Threat Prevention ............................................................... 242
Managing User Accounts ........................................................................................... 243
Authentication Methods for Users and Administrators......................................... 243
Check Point Password .................................................................................................243
Operating System Password ........................................................................................243
RADIUS ........................................................................................................................244
SecurID........................................................................................................................244
TACACS .......................................................................................................................244
Configuring Authentication Methods for Users ..................................................... 245
Granting User Access Using RADIUS Server Groups ...................................................245
Configuring a Security Gateway to use SecurID Authentication ................................... 245
Configuring TACACS+ Authentication ..........................................................................248
User Database ....................................................................................................... 249
Creating, Modifying, Removing User Accounts ............................................................249
Configuring Default Expiration Settings for Users .......................................................252
Delete a User ...............................................................................................................252
Managing User Groups .......................................................................................... 253
Adding User Groups.....................................................................................................253
LDAP and User Directory ...................................................................................... 254
User Directory and Identity Awareness .......................................................................254
User Directory Considerations ....................................................................................254
The User Directory Schema .........................................................................................255
Check Point Schema for LDAP .....................................................................................255
User Directory Profiles ................................................................................................263
Microsoft Active Directory ...........................................................................................273
Retrieving Information from a User Directory Server ..................................................276
Deploying User Directory.............................................................................................278
Enabling User Directory ..............................................................................................278
Account Units ..............................................................................................................279
Managing Users on a User Directory Server ................................................................285
Access Roles ......................................................................................................... 286
Adding Access Roles....................................................................................................287
Authentication Rules ............................................................................................. 287
Client Certificates for Smartphones and Tablets ...................................................... 288
Managing Client Certificates ................................................................................. 288
Creating Client Certificates ................................................................................... 289
Revoking Certificates ............................................................................................ 290
Creating Templates for Certificate Distribution .................................................... 290
Cloning a Template ............................................................................................... 291
Giving Permissions for Client Certificates ............................................................ 291
Preferences and Management Settings .................................................................... 292
Database Revisions ............................................................................................... 292
Working with Database Revisions ................................................................................292
Managing a Crisis Using Database Revisions ...............................................................293
Setting IP Address Versions of the Environment .................................................. 294
Restoring Window Defaults ................................................................................... 294
Configuring the Login Window .............................................................................. 294
Testing New SmartConsole Features ................................................................... 295
Sync with User Center ........................................................................................... 295
Inspection Settings................................................................................................ 295
Configuring Inspection Settings...................................................................................296
Management High Availability ................................................................................... 298
Overview of Management High Availability ........................................................... 298
The High Availability Environment ........................................................................ 299
Configuring a Secondary Server in SmartConsole ................................................ 299
Synchronizing Active and Standby Servers ........................................................... 300
Monitoring High Availability .........................................................................................300
Changeover Between Active and Standby ............................................................. 301
Changing a Server to Active or Standby ................................................................ 301
Working in Collision Mode ...........................................................................................302
High Availability Troubleshooting ......................................................................... 302
Environments with Endpoint Security ................................................................... 303
High Availability Disaster Recovery ...................................................................... 303
Creating a New Primary Management Server .............................................................303
Promoting a Secondary Server to Primary ..................................................................304
The ICA Management Tool ........................................................................................ 305
Using the ICA Management Tool ........................................................................... 306
Enabling and Connecting to the ICA Management Tool......................................... 306
The ICA Management Tool GUI .............................................................................. 307
User Certificate Management ............................................................................... 307
Modifying the Key Size for User Certificates ................................................................308
Performing Multiple Simultaneous Operations .................................................... 308
ICA Administrators with Reduced Privileges ........................................................ 309
Management of SIC Certificates ............................................................................ 309
Management of Gateway VPN Certificates ............................................................ 309
Management of User Certificates in SmartConsole .............................................. 309
Notifying Users about Certificate Initialization ..................................................... 309
Retrieving the ICA Certificate ................................................................................ 310
Searching for a Certificate .................................................................................... 310
Basic Search Parameters ............................................................................................310
Advanced Search Attributes ........................................................................................311
The Search Results......................................................................................................311
Viewing and Saving Certificate Details.........................................................................311
Removing and Revoking Certificates and Sending Email Notifications ................. 312
Submitting a Certificate Request to the CA ........................................................... 312
Initializing Multiple Certificates Simultaneously .................................................. 313
CRL Management .................................................................................................. 314
CRL Operations ..................................................................................................... 315
CA Cleanup ............................................................................................................ 315
Configuring the CA ................................................................................................ 315
CA Data Types and Attributes................................................................................ 316
Certificate Longevity and Statuses ........................................................................ 319
Command Line Reference ......................................................................................... 320
Package
Terms
Group of files, and data about those files,
delivered as one software archive (usually
TGZ or RPM), for distribution and installation.
Administrator
Permissions Profile
A SmartConsole user with permissions to
A set of access, and feature-based roles for
manage Check Point security products and
SmartConsole administrators.
the network environment.
Policy
DAIP Gateway
A collection of rules that control network
A Dynamically Assigned IP (DAIP) Security
traffic and enforce organization guidelines
Gateway is a Security Gateway where the IP
for data protection and access to resources
address of the external interface is assigned
with packet inspection.
dynamically by the ISP.
Rule Base
Database
The database that contains the rules in a
The Check Point database includes all
security policy and defines the sequence, in
objects, including network objects, users,
which they are enforced.
services, servers, and protection profiles.
Security Gateway
External Users
A computer that runs Check Point software
Users defined on external servers. External
to inspect traffic and enforces Security
users are not defined in the Security
Policies for connected network resources.
Management Server database or on an LDAP
server. External user profiles tell the system
Security Management Server
how to identify and authenticate externally
defined users. A computer that runs Check Point software
to manage the objects and policies in Check
Identity Awareness Point environment.
Lets you enforce network access and audit
SIC
data based on network location, the identity
of the user, and the identity of the computer. Secure Internal Communication. The Check
Point proprietary mechanism with which
LDAP Check Point computers that run Check Point
software authenticate each other over SSL,
Lightweight Directory Access Protocol. An
for secure communication. This
open industry standard for user and device
authentication is based on the certificates
data storage and directory-access.
issued by the ICA on a Check Point
LDAP Groups Management Server.
User Database
Check Point internal database that contains
all users defined and managed in
SmartConsole.
User Groups
Named groups of users with related
responsibilities.
User Template
Property set that defines a type of user on
which a security policy will be enforced.
Users
Personnel authorized to use network
resources and applications.
Welcome
Welcome
Check Point offers effective Security Management solutions to help you keep up with constantly
growing needs and challenges of your organizational network. This Administration Guide focuses
on the basic Security Management Server deployment.
If you are interested in deployments for organizations with multiple sites, refer to the R80.30
Multi-Domain Security Management Administration Guide
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_Multi-DomainSe
curityManagement_AdminGuide/html_frameset.htm.
These are the basic components of Check Point security architecture.
Item Description
1 SmartConsole - Check Point Graphical User Interface for connection to and management
of Security Management Servers.
2 Security Management Server - Manages Security Gateways with defined security policies
and monitors security events on the network.
3 Security Gateway - Placed at the perimeter of the network topology, to protect your
environment through enforcement of the security policies.
Getting Started
In This Section:
Understanding SmartConsole .....................................................................................14
Connecting to the Security Management Server through SmartConsole .................23
Setting Up for Security Management ..........................................................................23
Setting up for Team Work ............................................................................................24
Managing Security through API and CLI .....................................................................25
Planning Security Management ...................................................................................27
Before you begin deploying a Check Point security solution, familiarize yourself with:
• Check Point SmartConsole
• Basic setup of a Check Point Security Management Server
• Basic setup of Check Point Security Gateways
• Administrative task delegation
• Security management in a non-GUI environment
Understanding SmartConsole
Check Point SmartConsole makes it easy to manage security for complex networks. Before you
start to configure your cyber security environment and policies, become familiar with Check Point
SmartConsole.
SmartConsole
SmartConsole Toolbars
Global Toolbar (top of SmartConsole)
Description
The main SmartConsole Menu. When SmartConsole is connected to a Security
Management Server, this includes:
• Manage policies and layers
• Open Object Explorer
• New object (opens menu to create a new object)
• Publish session
• Discard session
• Session details
• Install policy
• Verify Access Control Policy
• Install Database
• Uninstall Threat Prevention policy
• Management High Availability
• Manage Licenses and Packages
• Global Properties
• View (opens menu to select a View to open)
Create new objects or open the Object Explorer
Enter session details and see the number of changes made in the session.
Keyboard Description
Shortcut
Ctrl+4 Manage & Settings view - review and configure the Security
Management Server settings:
• Administrators
• Permissions profiles
• Trusted clients
• Administrator sessions, and session settings
• Blades
• Revisions
• Preferences
• Sync with User Center
For more SmartConsole shortcuts, see Keyboard Shortcuts for SmartConsole (on page 21).
Server Details See the IP address of the server to which SmartConsole is connected. If
Management High Availability is configured, click to see the details.
Session Status See the number of changes made in the session and the session status.
Search Engine
In each view you can search the Security Management Server database for information relevant to
the view. For example:
• Gateway, by name or IP address
• Access Control rule
• NAT rule
• Threat Prevention profile
• Specific threat or a threat category
• Object tags
IP Search
You can run an advanced search for an IP address, network, or port. It returns direct and indirect
matches for your search criteria.
• IP address: xxx.xxx.xxx.xxx
• Network: xxx.xxx.0.0/16 or xxx.xxx
• Port: svc:<xxx>
These are the different IP search modes:
• General – (Default). Returns direct matched results and indirect results in IP ranges,
networks, groups, groups with exclusion, and rules that contain these objects.
• Packet – Matches rules as if a packet with your IP address arrives at the gateway.
General IP Search
This is the default search mode. Use it to search in Rule Bases and in objects. If you enter a string
that is not a valid IP or network, the search engine treats it as text.
When you enter a valid IP address or network, an advanced search is done and on these objects
and rules:
• Objects that have the IP address as a text value for example, in a comment
• Objects that have an IP address property (direct results)
• Groups, networks, and address ranges that contain objects with the text value or address value
• Rules that contain those objects
Packet Search
A Packet Search matches rules as if a packet with your IP address arrives at the gateway. It
matches rules that have:
• The IP address in a column of the rule
• "Any"
• A Group-with-exclusion or negated field with the IP address in its declaration
Known Limitation:
• Packet search does not support IPv6.
Tool Description
VPN Communities Create, edit, or delete VPN Communities.
Updates Update the Application & URL Filtering database, schedule updates, and
configure updates.
UserCheck Configure UserCheck interaction objects for Access Control policy
actions.
Client Certificates Create and distribute client certificates that allow users to authenticate
to the Gateway from handheld devices.
Tool Description
Application Wiki Browse to the Check Point AppWiki. Search and filter the Web 2.0
Applications Database, to use Check Point security research in your
policy rules for actions on applications, apps, and widgets.
Installation History See the Policy installation history for each Gateway, and who made the
changes. See the revisions that were made during each installation, and
who made them. Install a specific version of the Policy.
Tool Description
Profiles Create, edit, or delete profiles.
IPS Protections Edit IPS protections per profile.
Protections See statistics on different protections
Whitelist Files Configure Whitelist Files list
Indicators Configure indicators of malicious activity and how to handle it
Updates Configure updates to the Malware database, Threat Emulation engine
and images, and the IPS database.
UserCheck Configure UserCheck interaction objects for Threat Prevention policy
actions.
Threat Wiki Browse to the Check Point ThreatWiki. Search and filter Check Point's
Malware Database, to use Check Point security research to block
malware before it enters your environment, and to best respond if it does
get in.
Installation History See the Policy installation history for each Gateway, and who made the
changes. See the revisions that were made during each installation, and
who made them. Install a specific version of the Policy.
Shared Policies
The Shared Policies section in the Security Policies shows the policies that are not in a Policy
package. They are shared between all Policy packages.
Shared policies are installed with the Access Control Policy.
Geo Policy Create a policy for traffic to or from specific geographical or political
locations.
Click to open the API reference (in the command line interface).
Use the Command Line Reference to learn about Session management commands,
Host commands, Network commands, and Rule commands.
In addition to the command line interface, you can create and run API scripts to manage
configuration and operations on the Security Management Server (on page 25).
2. Open the object properties window, and enable the Management Software Blades, as
necessary:
• Network Policy Management - Manage a comprehensive security policy, unified for all
security functionalities. This is automatically enabled.
• Endpoint Policy Management - Manage security and data on end-user computers and
hand-held devices. Enable this Software Blade if you have or will install an Endpoint
Security Management Server.
• Logging & Status - Monitor security events and status of gateways, VPNs, users, and more,
with advanced visuals and data management features.
• Identity Logging - Add user identities, and data of their computers and devices, from Active
Directory domains, to log entries.
• User Directory - Populate your security scope with user accounts from the LDAP servers in
your environment.
• Compliance - Optimize your security settings and comply with regulatory requirements
• SmartEvent - Manage and correlate security events in real-time.
Define users and user groups that your security environment protects
You can add users (on page 249) and groups (on page 253) to the database manually, through
LDAP and User Directory (on page 254), or with the help of Active Directory (on page 273).
Deleting an Administrator
To make sure your environment is secure, the best practice is to delete administrator accounts
when personnel leave or transfer.
Permissions:
• Selected - The administrator has this feature.
• Not selected - The administrator does not have this feature.
Note - If you cannot clear a feature selection, the administrator access to it is mandatory.
Some features have Read and Write Options. If the feature is selected:
• Read - The administrator has the feature but cannot make changes.
• Write - The administrator has the feature and can make changes.
Unlocking Administrators
An administrator who has the Manage Administrators permission can unlock another
administrator if the locked administrator authenticates to the Security Management Server using
a Check Point password.
To unlock an administrator:
1. Go to the Manage & Settings view or to the Multi-Domain view.
2. Right-click the locked administrator and select Unlock Administrator.
Or:
Use the unlock administrator API command
https://sc1.checkpoint.com/documents/R80/APIs/#gui-cli/unlock-administrator%20.
Note - the Unlock Administrator feature does not apply to administrators using other
authentication methods.
Publishing a Session
The validations pane in SmartConsole shows configuration error messages. Examples of errors
are object names that are not unique, or the use of objects that are not valid in the Rule Base.
Make sure you correct these errors before publishing.
To publish a session:
On the SmartConsole toolbar, click Publish. When a session is published, a new database version
is created and shows in the list of database revisions.
To discard a session:
In the SmartConsole toolbar, click Discard.
Administrators without the Manage Administrators with the Manage Session Permission
Session permission can: can:
• Publish and discard their own sessions • Publish and discard their own sessions
• See sessions opened by other • See sessions opened by other administrators, the
administrators, the number the locks number the locks they have and number changes
they have and number of changes they they have made
have made
• Publish & Disconnect the private sessions of
• Take over sessions created by other administrators
applications, for example sessions
• Disconnect & Discard the private sessions of
created by the API command line tool
other administrators
• Disconnect another administrator's private
session
• Take over sessions created by applications, for
example sessions created by the API command
line tool
• Take over the private sessions of other
administrators.
Note: If you want to keep changes made in your
own private session, publish these changes
before you take over the session of another
administrator. If you do not publish your changes,
you will lose them. When you take over, you
disconnect the other administrator's
SmartConsole session.
• Publish & Disconnect the private sessions of
other administrators. The action applies to both
SmartConsole sessions and command line API
sessions.
• Disconnect the private session of other
administrators
• Discard & Disconnect the private session of other
administrators
Option Description
Edit sessions details Lets you change the session name and description.
Create new session In the current window
Opens a new session in the current SmartConsole
In a new window
Opens a new session in a new SmartConsole
Recent Shows a list of recent sessions. Selecting a session opens the
session in the current SmartConsole
More Opens the Open Session window that shows sessions that you
previously created and saved.
• Sessions shown in this window are owned by the current
user in the current domain.
• The Open Session > Actions menu has options to open a
saved session in the current SmartConsole or open the
session in a new SmartConsole.
Security Management Administration Guide R80.30 | 41
Managing Administrator Accounts
Managing Gateways
In This Section:
Creating a New Security Gateway................................................................................47
Manually Updating the Gateway Topology ..................................................................48
Dynamically Updating the Topology ............................................................................48
Secure Internal Communication (SIC) .........................................................................49
Managing Software Blade Licenses ............................................................................53
Dynamic Anti-Spoofing
When Anti-Spoofing is selected and you click Get interfaces, the Security Gateway generates a list
of valid IP addresses based on the IP address and netmask of the interface and the routes
assigned to the interface.
Anti-Spoofing drops packets with a source IP address that does not belong to the network behind
the packet’s interface. For example, packets with an internal IP address that comes from an
external interface.
When the Network defined by routes option is selected along with Perform Anti-Spoofing based
on interface topology, you get Dynamic Anti-Spoofing. The valid IP addresses range is
automatically calculated without the administrator having to do click Get Interfaces or install a
policy.
Initializing Trust
To establish the initial trust, a gateway and a Security Management Server use a one-time
password. After the initial trust is established, further communication is based on security
certificates.
Note - Make sure the clocks of the gateway and Security Management Server are synchronized,
before you initialize trust between them. This is necessary for SIC to succeed. To set the time
settings of the gateway and Security Management Server, go to the Gaia Portal > System
Management > Time.
To initialize Trust:
1. In SmartConsole, open the gateway network object.
2. In the General Properties page of the gateway, click Communication.
3. In the Communication window, enter the Activation Key that you created during installation of
the gateway.
4. Click Initialize.
The ICA signs and issues a certificate to the gateway.
Trust state is Initialized but not trusted. The Internal Certificate Authority (ICA) issues a
certificate for the gateway, but does not yet deliver it.
The two communicating peers authenticate over SSL with the shared Activation Key. The
certificate is downloaded securely and stored on the gateway. The Activation Key is deleted.
The gateway can communicate with Check Point hosts that have a security certificate signed by
the same ICA.
SIC Status
After the gateway receives the certificate issued by the ICA, the SIC status shows if the Security
Management Server can communicate securely with this gateway:
• Communicating - The secure communication is established.
• Unknown - There is no connection between the gateway and Security Management Server.
• Not Communicating - The Security Management Server can contact the gateway, but cannot
establish SIC. A message shows more information.
Trust State
If the Trust State is compromised (keys were leaked, certificates were lost) or objects changed
(user leaves, open server upgraded to appliance), reset the Trust State. When you reset Trust, the
SIC certificate is revoked.
The Certificate Revocation List (CRL) is updated for the serial number of the revoked certificate.
The ICA signs the updated CRL and issues it to all gateways during the next SIC connection. If two
gateways have different CRLs, they cannot authenticate.
Troubleshooting SIC
If SIC fails to Initialize:
1.
Make sure there is connectivity between the gateway and Security Management Server.
2. Make sure that the Security Management Server and the gateway use the same SIC activation
key (one-time password).
3. If the Security Management Server is behind a gateway, make sure there are rules that allow
connections between the Security Management Server and the remote gateway. Make sure
Anti-spoofing settings are correct.
4. Make sure the name and the IP address of the Security Management Server are in the
/etc/hosts file on the gateway.
If the IP address of the Security Management Server mapped through static NAT by its local
gateway, add the public IP address of the Security Management Server to the /etc/hosts file
on the remote gateway. Make sure the IP address resolves to the server's hostname.
5. Make sure the date and the time settings of the operating systems are correct. If the Security
Management Server and remote the gateway reside in different time zones, the remote
gateway may have to wait for the certificate to become valid.
6. Remove the security policy on the gateway to let all the traffic through: In the command line
interface of the gateway, type: fw unloadlocal
7. Try to establish SIC again.
In SmartConsole:
1. In the General Properties window of the gateway, click Communication.
2. In the Trusted Communication window, enter the one-time password (activation key) that you
entered on the gateway.
3. Click Initialize.
4. Wait for the Certificate State field to show Trust established.
5. Click OK.
ICA Clients
In most cases, certificates are handled as part of the object configuration. To control the ICA and
certificates in a more granular manner, you can use one of these ICA clients:
• The Check Point configuration utility - This is the cpconfig CLI utility. One of the options
creates the ICA, which issues a SIC certificate for the Security Management Server.
• SmartConsole - SIC certificates for Security Gateways and administrators, VPN certificates,
and user certificates.
• ICA Management tool - VPN certificates for users and advanced ICA operations (on page 305).
See audit logs of the ICA in SmartConsole Logs & Monitor > New Tab > Open Audit Logs View.
To learn more about key size values, see RSA key lengths
http://supportcontent.checkpoint.com/solutions?id=sk96591.
Column Description
License Status The general state of the Software Blade licenses:
• OK - All the blade licenses are valid.
• Not Activated - Blade licenses are not installed. This is only possible in
the first 15 days after the establishment of the SIC with the Security
Management Server. After the initial 15 days, the absence of licenses
will result in the blade error message.
• Error with <number> blade(s) - The specified number of blade licenses
are not installed or not valid.
• Warning with <number> blade(s) - The specified number of blade
licenses have warnings.
• N/A - No available information.
CK Unique Certificate Key of the license instance.
SKU Catalog ID from the Check Point User Center.
Account ID User's account ID.
Support Level Check Point level of support.
Support Expiration Date when the Check Point support contract expires.
2 In the Summary tab below, click the object's License Status (for example: OK).
The Device & License Information window opens. It shows basic object information and
License Status, license Expiration Date, and important quota information (in the
Additional Info column) for each Software Blade.
Notes:
• Quota information, quota-dependent license statuses, and blade information messages
are only supported for R80.
• The tooltip of the SKU is the product name.
The possible values for the Software Blade License Status are:
Status Description
Active The Software Blade is active and the license is valid.
Available The Software Blade is not active, but the license is valid.
No License The Software Blade is active but the license is not valid.
Expired The Software Blade is active, but the license expired.
About to Expire The Software Blade is active, but the license will expire in thirty days
(default) or less (7 days or less for an evaluation license).
Quota Exceeded The Software Blade is active, and the license is valid, but the quota of
related objects (gateways, files, virtual systems, and so on, depending on the
blade) is exceeded.
Quota Warning The Software Blade is active, and the license is valid, but the number of
objects of this blade is 90% (default) or more of the licensed quota.
N/A The license information is not available.
Option Description
License Status view To see and export license information for Software Blades on each
specific Security Management Server, gateway, or Log Server object.
License Status report To see, filter and export license status information for all configured
Security Management Server, gateway, or Log Server objects.
License Inventory To see, filter and export license information for Software Blades on all
report configured Security Management Server, gateway, or Log Server
objects.
The SmartEvent Software Blade lets you customize the License Status and License Inventory
information from the Logs & Monitor view of SmartConsole.
It is also possible to view license information from the Gateways & Servers view of SmartConsole
without enabling the SmartEvent blade on Security Management Server.
The Gateways & Servers view in SmartConsole lets you see and export the License
Inventory report.
Step Description
1 To see the License Inventory report from the Gateways & Servers view:
In SmartConsole, from the left navigation panel, click Gateways & Servers.
a)
b) From the top toolbar, click Actions > License Report.
c) Wait for the SmartView to load and show this report.
By default, this report contains:
Inventory page: Blade Names, Devices Names, License Statuses
License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date
2 To export the License Inventory report from the Gateways & Servers view:
In the top right corner, click the Options button.
a)
b) Select the applicable export option - Export to Excel, or Export to PDF.
The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Status report.
Step Description
1 To see the License Status report from the Logs & Monitor view:
In SmartConsole, from the left navigation panel, click Logs & Monitor
a)
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Views.
d) In the list of reports, double-click License Status.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
Names of the configured objects, License status for each object, CK, SKU,
Account ID, Support Level, Next Expiration Date
2 To filter the License Status report in the Logs & Monitor view:
In the top right corner, click the Options button > View Filter.
a)
The Edit View Filter window opens.
b) Select a Field to filter results. For example, Device Name, License Status, Account
ID.
c) Select the logical operator - Equals, Not Equals, or Contains.
d) Select or enter a filter value.
Note - Click the X icon to delete a filter.
e) Optional: Click the + icon to configure additional filters.
f) Click OK to apply the configured filters.
The report is filtered based on the configured filters.
3 To export the License Status report in the Logs & Monitor view:
In the top right corner, click the Options button.
a)
b) Select the applicable export option - Export to Excel, or Export to PDF.
The Logs & Monitor view in SmartConsole lets you see, filter and export the License
Inventory report.
Step Description
1 To see the License Inventory report from the Logs & Monitor view:
In SmartConsole, from the left navigation panel, click Logs & Monitor
a)
b) At the top, open a new tab by clicking New Tab, or [+].
c) In the left section, click Reports.
d) In the list of reports, double-click License Inventory.
e) Wait for the SmartView to load and show this report.
By default, this report contains:
Inventory page: Blade Names, Devices Names, License Statuses
License by Device page: Devices Names, License statuses, CK, SKU, Account ID,
Support Level, Next Expiration Date
2 To filter the License Inventory report in the Logs & Monitor view:
In the top right corner, click the Options button > Report Filter.
a)
The Edit Report Filter window opens.
b) Select a Field to filter results. For example, Blade Name, Device Name, License
Overall Status, Account ID.
c) Select the logical operator - Equals, Not Equals, or Contains.
d) Select or enter a filter value.
Note - Click the X icon to delete a filter.
e) Optional: Click the + icon to configure additional filters.
f) Click OK to apply the configured filters.
The report is filtered based on the configured filters.
3 To export the License Inventory report in the Logs & Monitor view:
In the top right corner, click the Options button.
a)
b) Select the applicable export option - Export to Excel, or Export to PDF.
Managing Objects
In This Section:
Object Categories .........................................................................................................59
Adding, Editing, Cloning, Deleting, and Replacing Objects ........................................60
Object Tags ....................................................................................................................61
Network Object Types...................................................................................................62
Network Objects, defined in SmartConsole and stored in the proprietary Check Point object
database, represent physical and virtual network components (such as gateways, servers, and
users), and logical components (such as IP address ranges and Dynamic Objects). Before you
create Network Objects, analyze the needs of your organization:
• What are the physical components of your network: devices, hosts, gateways and their active
Software Blades?
• What are the logical components: services, resources, applications, ranges?
• Who are the users? How should you group them, and with what permissions?
Object Categories
Objects in SmartConsole represent networks, devices, protocols and resources. SmartConsole
divides objects into these categories:
To clone an object:
1. In the object tree or in the Object Explorer, right-click the object and select Clone.
The Clone Object window opens.
2. Enter a name for the cloned object.
3. Click OK.
Object Tags
Object tags are keywords or labels that you can assign to the network objects or groups of objects
for search purposes. These are the types of tags you can assign:
• User tags - Assigned manually to individual objects or groups of objects
• System tags - Predefined keywords, such as "application"
Each tag has a name and a value. The value can be static, or dynamically filled by detection
engines.
Networks
A Network is a group of IP addresses defined by a network address and a net mask. The net mask
indicates the size of the network.
A Broadcast IP address is an IP address which is destined for all hosts on the specified network. If
this address is included, the Broadcast IP address will be considered as part of the network.
Network Groups
A network group is a collection of hosts, gateways, networks or other groups. Groups can be used
to facilitate and simplify network management. When you have the same set of objects which you
want to use in different places in the Rule Base, you can create a group to include such set of
objects and reuse it. Modifications are applied to the group instead of to each member of the
group.
Groups are also used where SmartConsole lets you select only one object, but you need to work
with more than one. For example, in the gateway editor > Network Management > VPN Domain >
Manually defined, you can only select on object from the drop-down menu. If you want to select
more than one object for your VPN Domain, you can create a group, add the required objects to
the group, and select the group from the drop-down menu.
Gateway Cluster
A gateway cluster is a group of Security Gateways with Cluster software installed: ClusterXL, or
another Clustering solution. Clustered gateways add redundancy through High Availability or Load
Sharing.
Updatable Objects
An updatable object is a network object which represents an external service, such as Office 365,
AWS, GEO locations and more. External services providers publish lists of IP addresses or
Domains or both to allow access to their services. These lists are dynamically updated. Updatable
objects derive their contents from these published lists of the providers, which Check Point
uploads to the Check Point cloud. The updatable objects are updated automatically on the Security
Gateway each time the provider changes a list. There is no need to install policy for the updates to
take effect. You can use an updatable object in the Access Control policy as a source or a
destination.
These are the currently supported external services for updatable objects:
• Online services - Office 365, Azure, and AWS
• GEO locations - The GEO database provides mapping of location data to IP addresses. For each
location, there is a network object you can import to SmartConsole. You can block or allow
access to and from specific locations based on their IP addresses.
Note - This feature is only supported for R80.20 and above gateways.
You can monitor the updates in the Logs & Monitor Logs view.
Wildcard Netmask: 0. 0. 3. 0
The third octet represents the mask of bits. If we convert the 3 to binary, we get 00000011. The 0
parts of the mask must match the equivalent bits of the IP address. The 1 parts of the mask do not
have to match, and can be any value.
0 0 0 0 0 0 1 1
Must match the equivalent bits in the IP address Do not have to match
128 64 32 16 8 4 2 1
Decimal
Binary
0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 1 1
0 0 0 0 0 0 1 0 2
0 0 0 0 0 0 1 1 3
Use Cases
Scenario One
A supermarket chain has all of its cash registers on subnet 194.29.x.1, where x defines the region.
In this use case, all the cash registers in this region must have access to the database server at
194.30.1.1.
Instead of defining 256 hosts (194.29.0.1, 194.29.1.1, 194.29.2.1....194.29.255.1), the administrator
creates a wildcard object that represents all the cash registers in the region:
The wildcard object can now be added to the access control policy.
Scenario Two
In this use case, a supermarket chain has stores in Europe and Asia.
The 192.30.0-255.1 network contains both the Asian and European regions, and the stores within
those regions.
Item Description
1 Database Server for Europe
2 Database Server for Asia
3 European and Asia network
The administrator wants stores in the European and Asia regions to access different database
servers. In this topology, the third octet of the European and Asia network's IP address will be
subject to a wildcard. The first four bits of the wildcard will represent the region and the last four
bits will represent the store number.
Bits that represent the region Bits that represent the store number
0000 0000
Binary Decimal
Region Store
To include all the stores of a particular region, the last four bits of the wildcard mask must be set
to 1 (15 in Decimal):
Binary Decimal
Region Store
A wildcard object that represents all the Asian stores will look like this:
Scenario Three
In this scenario, the netmask bits are not consecutive.
Wildcard IP 1 1 0 1
Security Management Administration Guide R80.30 | 67
Managing Objects
Wildcard mask 0 0 5 0
Wildcard IP 00000001.00000001.00000000.00000001
Mask:
0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0
IPv6
The same principles apply to IPv6 addresses. For example, if the wildcard object has these values:
Domains
A Domain object lets you define a host or DNS domain by its name only. It is not necessary to have
the IP address of the site.
You can use the Domain object in the source and destination columns of an Access Control Policy.
You can configure a Domain object in two ways:
• Select FQDN
In the object name, use the Fully Qualified Domain Name (FQDN). Use the format .x.y.z (with
a dot "." before the FQDN). For example, if you use .www.example.com then the Gateway
matches www.example.com
This option is supported for R80.10 and higher, and is the default. It is more accurate and
faster than the non-FQDN option.
The Security Gateway looks up the FQDN with a direct DNS query, and uses the result in the
Rule Base.
This option supports SecureXL Accept templates. Using domain objects with this option in a
rule has no effect on the performance of the rule, or of the rules that come after it.
• Clear FQDN
This option enforces the domain and its sub-domains. In the object name, use the format .x.y
for the name. For example, use .example.com or .example.co.uk for the name. If you use
.example.com, then the Gateway matches www.example.com and support.example.com
The Gateway does the name resolution using DNS reverse lookups, which can be inaccurate.
The Gateway uses the result in the Rule Base, and caches the result to use again.
When upgrading from R77, this option is enforced.
Dynamic Objects
A dynamic object is a "logical" object where the IP address is resolved differently for each Security
Gateway, using the dynamic_objects command.
For R80.10 Security Gateways and higher, dynamic objects support SecureXL Accept templates.
Therefore, there is no performance impact on a rule that uses a dynamic object, or on rules that
come after it.
Dynamic Objects are predefined for LocalMachine-all-interfaces. The DAIP computer interfaces
(static and dynamic) are resolved into this object.
Security Zones
Security Zones let you to create a strong Access Control Policy that controls the traffic between
parts of the network.
A Security Zone object represents a part of the network (for example, the internal network or the
external network). You assign a network interface of a Security Gateway to a Security Zone. You
can then use the Security Zone objects in the Source and Destination columns of the Rule Base.
Use Security Zones to:
• Simplify the Policy. Apply the same rule to many Gateways.
• Add networks to Gateways interfaces without changing the Rule Base.
For example, in the diagram, we have three Security Zones for a typical network: ExternalZone (1),
DMZZone (2) and InternalZone (3).
• Gateway (4) has three interfaces. One interface is assigned to ExternalZone (1), one interface is
assigned to DMZZone (2), and one interface is assigned to InternalZone (3).
• Gateway (5) has two interfaces. One interface is assigned to ExternalZone (1) and one interface
is assigned to InternalZone (3).
A Security Gateway interface can belong to only one Security Zone. Interfaces to different
networks can be in the same Security Zone.
Workflow
1.
Define Security Zone objects. Or, use the predefined Security Zones (on page 71).
2. Assign Gateway interfaces to Security Zones (on page 71).
3. Use the Security Zone objects in the Source and Destination of a rule. For example:
Source Destination VPN Service Action
1.
Install the Access Control Policy (on page 124).
Interoperable Devices
An Interoperable Device is a device that has no Check Point Software Blades installed. The
Interoperable Device:
• Cannot have a policy installed on it
• Can participate in Check Point VPN communities and solutions.
VoIP Domains
There are five types of VoIP Domain objects:
• VoIP Domain SIP Proxy
• VoIP Domain H.323 Gatekeeper
• VoIP Domain H.323 Gateway
• VoIP Domain MGCP Call Agent
• VoIP Domain SCCP CallManager
In many VoIP networks, the control signals follow a different route through the network than the
media. This is the case when the call is managed by a signal routing device. Signal routing is done
in SIP by the Redirect Server, Registrar, and/or Proxy. In SIP, signal routing is done by the
Gatekeeper and/or gateway.
Enforcing signal routing locations is an important aspect of VoIP security. It is possible to specify
the endpoints that the signal routing device is allowed to manage. This set of locations is called a
VoIP Domain. For more information refer to the R80.30 VoIP Administration Guide
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_VoIP_AdminGui
de/html_frameset.htm.
Logical Servers
A Logical Server is a group of machines that provides the same services. The workload of this
group is distributed between all its members.
When a Server group is stipulated in the Servers group field, the client is bound to this physical
server. In Persistent server mode the client and the physical server are bound for the duration of
the session.
• Persistency by Service — once a client is connected to a physical server for a specified service,
subsequent connection to the same Logical Server and the same service will be redirected to
the same physical server for the duration of the session.
• Persistency by Server — once a client is connected to a physical server, subsequent
connections to the same Logical Server (for any service) will be redirected to the same
physical server for the duration of the session.
Balance Method
The load balancing algorithm stipulates how the traffic is balanced between the servers. There are
several types of balancing methods:
• Server Load — The Security Gateway determines which Security Management Server is best
equipped to handle the new connection.
• Round Trip Time — On the basis of the shortest round trip time between Security Gateway and
the servers, executed by a simple ping, the Security Gateway determines which Security
Management Server is best equipped to handle the new connection.
• Round Robin — the new connection is assigned to the first available server.
• Random — the new connection is assigned to a server at random.
• Domain — the new connection is assigned to a server based on domain names.
The Check Point Rule Base must not have these objects. If it does, the Security Management
Server will not generate Access Lists.
• Drop (in the Action column)
• Encrypt (Action)
• Alert (Action)
• RPC (Service)
• ACE (Service)
• Authentication Rules
• Negate Cell
Defining OSE Device Interfaces
OSE devices report their network interfaces and setup at boot time. Each OSE device has a
different command to list its configuration. You must define at least one interface for each device,
or Install Policy will fail.
To define an OSE Device:
From the Object Explorer, click New > More.
1.
2. Click Network Object > More > OSE Device.
3. Enter the general properties (on page 74).
We recommend that you also add the OSE device to the host lists on other servers: hosts
(Linus) and lmhosts (Windows).
4. Open the Topology tab and add the interfaces of the device.
You can enable Anti-Spoofing on the external interfaces of the device. Double-click the
interface. In the Interface Properties window > Topology tab, select External and Perform
Anti-Spoofing.
5. Open the Setup tab and define the OSE device and its administrator credentials (on page 74).
Managing Policies
In This Section:
Working with Policy Packages .....................................................................................75
Viewing Rule Logs.........................................................................................................80
Policy Installation History ............................................................................................81
SmartConsole offers a number of tools that address policy management tasks, both at the
definition stage and for maintenance.
At the definition stage:
• Policy Packages let you group different types of policies, to be installed together on the same
installation targets.
• Predefined Installation Targets let you associate each package with a set of gateways. You do
not have to repeat the gateway selection process each time you install a Policy Package.
At the maintenance level:
• Search gives versatile search capabilities for network objects and the rules in the Rule Base.
• Database version control lets you track past changes to the database.
Example:
An organization has four sites, each with its own requirements. Each site has a different set of
Software Blades installed on the Security Gateways:
To manage these different types of sites efficiently, you need to create three different Policy
Packages. Each Package includes a combination of policy types that correspond to the Software
Blades installed on the site's gateway. For example:
• A policy package that includes the Access Control policy type. The Access Control policy type
controls the firewall, NAT, Application & URL Filtering, and Content Awareness Software
Blades. This package also determines the VPN configuration.
Install the Access Control policy package on all Security Gateways.
• A policy package that includes the QoS policy type for the QoS blade on gateway that manages
bandwidth.
Install this policy package on the executive management Gateway.
• A policy package that includes the Desktop Security Policy type for the gateway that handles
Mobile Access.
Install this policy package on the executive management Gateway.
There is no need to manage separate Rule Bases. For example, you can define one, intuitive rule
that: Allows users in specified networks, to use a specified application, but prevents downloading
files larger than a specified size. You can use all these objects in one rule:
• Security Zones
• Services
• Applications and URLs
• Data Types
• Access Roles
Information about these features is collected in one log:
• Network
• Protocol
• Application
• User
• Accessed resources
• Data Types
Basic Rules
Best Practice - These are basic Access Control rules we recommend for all Rule Bases:
• Stealth rule that prevents direct access to the Security Gateway
• Cleanup rule that drops all traffic that is not matched by the earlier rules in the policy
Note - If you delete the cleanup rule, there will still be an implicit drop rule that drops all traffic
that did not match all other rules. This rule does not create log entries. If you want to log the
traffic, create an explicit Cleanup rule.
5 DNS server Any DNS Domain UDP Accept None Policy Targets
6 Mail and Web servers Any DMZ HTTP Accept Log Policy Targets
HTTPS
SMTP
8 DMZ & Internet IntGroup Any Any Accept Log Policy Targets
Rule Explanation
1 Admin Access to Gateways - SmartConsole administrators are allowed to connect to the
Security Gateways.
2 Stealth - All internal traffic that is NOT from the SmartConsole administrators to one of
the Security Gateways is dropped. When a connection matches the Stealth rule, an alert
window opens in SmartView Monitor.
3 Critical subnet - Traffic from the internal network to the specified resources is logged.
This rule defines three subnets as critical resources: Finance, HR, and R&D.
4 Tech support - Allows the Technical Support server to access the Remote-1 web server
which is behind the Remote-1 Security Gateway. Only HTTP traffic is allowed. When a
packet matches the Tech support rule, the Alert action is done.
5 DNS server - Allows UDP traffic to the external DNS server. This traffic is not logged.
6 Mail and Web servers - Allows incoming traffic to the mail and web servers that are
located in the DMZ. HTTP, HTTPS, and SMTP traffic is allowed.
7 SMTP - Allows outgoing SMTP connections to the mail server. Does not allow SMTP
connections to the internal network, to protect against a compromised mail server.
8 DMZ and Internet - Allows traffic from the internal network to the DMZ and Internet.
9 Cleanup rule - Drops all traffic that does not match one of the earlier rules.
3 R&D department R&D Roles Any Any Any TechSupport Layer N/A
3.1 R&D servers Any R&D servers Any Any Accept Log
(Group)
QA network
3.2 R&D source control InternalZone Source control ssh, http, https Any Accept Log
servers (Group)
4.1 Allow access to Any R&D Servers Web Services Any Accept Log
R&D servers (Group)
5 Allow all users to Any Employee portal Web Services Any Accept None
access employee
portal
Rules Explanation
1 General rules for the whole organization.
2
3 An Inline Layer for the R&D department.
3.1 Rule 3 is the parent rules of the Inline Layer. The Action is the name of the Inline Layer.
3.2 If a packet does not match on parent rule 3:
---
Matching continues to the next rule outside the Inline Layer (rule 4).
3.X
If a packet matches on parent rule 3:
Matching continues to 3.1, first rule inside the Inline Layer. If a packet matches on this
rule, the rule action is done on the packet.
If a packet does not match on rule 3.1, continue to the next rule inside the Inline Layer,
rule 3.2. If there is no match, continue to the remaining rules in the Inline Layer. ---
means one or more rules.
The packet is matched only inside the inline layer. It never leaves the inline layer,
because the inline layer has an implicit cleanup rule. It is not matched on rules 4, 5 and
the other rules in the Ordered Layer.
Rule 3.X is a cleanup rule. It drops all traffic that does not match one of the earlier rules
in the Inline Layer. This is a default explicit rule. You can change or delete it.
Best Practice - Have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.
4 Another Inline Layer, for the QA department.
4.1
---
4.Y
5 More general rules for the whole organization.
-- One or more rules.
9 Cleanup rule - Drop all traffic that does not match one of the earlier rules in the Ordered
Layer. This is a default explicit rule. You can change or delete it.
Best Practice - Have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.
Monitoring Applications
Scenario: I want to monitor all Facebook traffic in my organization. How can I do this?
To block an application or category of applications and tell the user about the policy
violation:
In the Security Policies view of SmartConsole, go to the Access Control Policy.
1.
2. Choose a Layer with Applications and URL Filtering enabled.
3. Create a rule that includes these components:
• Services & Applications - Select the Pornography category.
• Action - Drop, and a UserCheck Blocked Message - Access Control
The message informs users that their actions are against company policy and can include a
link to report if the website is included in an incorrect category.
• Track - Log
Note - This Rule Base example contains only those columns that are applicable to this subject.
The rule blocks traffic to pornographic sites and logs attempts to access those sites. Users who
violate the rule receive a UserCheck message that informs them that the application is blocked
according to company security policy. The message can include a link to report if the website is
included in an incorrect category.
Important - A rule that blocks traffic, with the Source and Destination parameters
defined as Any, also blocks traffic to and from the Captive Portal.
To create a rule that allows streaming media with time and bandwidth limits:
1. In the Security Policies view of SmartConsole, go to the Access Control Policy.
2. Choose a Layer with Applications and URL Filtering enabled.
3. Click one of the Add Rule toolbar buttons to add the rule in the position that you choose in the
Rule Base.
4. Create a rule that includes these components:
• Services & Applications - Media Streams category.
Note - Applications are matched on their Recommended services, where each service runs
on a specific port, such as the default Application Control Web browsing Services: http,
https, HTTP_proxy, and HTTPS_proxy. To change this, see Services & Applications
Column (on page 105).
• Action - Click More and select Action: Accept, and a Limit object.
• Time - Add a Time object that specifies the hours or time period in which the rule is active.
Note - The Time column is not shown by default in the Rule Base table. To see it,
right-click on the table header and select Time.
Note - In a cluster environment, the specified bandwidth limit is divided between all defined
cluster members, whether active or not. For example, if a rule sets 1Gbps limit in a three member
cluster, each member has a fixed limit of 333 Mbps.
Blocking Sites
Scenario: I want to block sites that are associated with categories that can cause liability issues.
Most of these categories exist in the Application Database but there is also a custom defined site
that must be included. How can I do this?
You can do this by creating a custom group and adding all applicable categories and the site to it.
If you enable Identity Awareness on a Security Gateway, you can use it together with URL Filtering
to make rules that apply to an access role. Use access role objects to define users, machines, and
network locations as one object.
In this example:
• You have already created
• An Access Role that represents all identified users in the organization (Identified_Users).
• A custom application for a site named FreeMovies.
• You want to block sites that can cause liability issues for everyone within your organization.
• You will create a custom group that includes Application Database categories as well as the
previously defined custom site named FreeMovies.
In This Section
The Need for Ordered Layers and Inline Layers .........................................................93
Order of Rule Enforcement in Inline Layers ...............................................................93
Order of Rule Enforcement in Ordered Layers ...........................................................94
Creating an Inline Layer ...............................................................................................94
Creating a Ordered Layer .............................................................................................95
Enabling Access Control Features ..............................................................................96
Types of Rules in the Rule Base ..................................................................................98
Administrators for Access Control Layers ................................................................100
Sharing Layers ............................................................................................................100
Visual Division of the Rule Base with Sections .........................................................101
Exporting Layer Rules to a .CSV File .........................................................................101
Managing Policies and Layers ...................................................................................102
The Inline Layer has a parent rule (Rule 2 in the example), and sub rules (Rules 2.1 and 2.2). The
Action of the parent rule is the name of the Inline Layer.
If the packet does not match the parent rule of the Inline Layer, the matching continues to the next
rule of the Ordered Layer (Rule 3).
If a packet matches the parent rule of the Inline Layer (Rule 2), the Firewall checks it against the
sub rules:
• If the packet matches a sub rule in the Inline Layer (Rule 2.1), no more rule matching is done.
• If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup Rule is
applied (Rule 2.2). If this rule is missing, the Implicit Cleanup Rule (on page 98) is applied. No
more rule matching is done.
Important - Always add an explicit Cleanup Rule at the end of each Inline Layer, and make sure
that its Action is the same as the Action of the Implicit Cleanup Rule.
Item Description
1 Ordered Layer 1
2 Ordered Layer 2
3 Ordered Layer 3
If none of the rules in the Ordered Layer match the packet, the explicit Default Cleanup Rule is
applied. If this rule is missing, the Implicit Cleanup Rule (on page 98) is applied.
Every Ordered Layer has its own implicit cleanup rule. You can configure the rule to Accept or
Drop in the Layer settings (on page 100).
Important - Always add an explicit Cleanup Rule at the end of each Ordered Layer, and make sure
that its Action is the same as the Action of the Implicit Cleanup Rule.
Pre-R80.10 Gateways: To create a Layer for URL Filtering and Application Control:
1. In SmartConsole, click Security Policies.
2. Right-click a Layer in the Access Control Policy section and select Edit Policy.
The Policy window opens.
3. In the Access Control section, click the plus sign.
4. Click New Layer.
The Layer Editor window opens and shows the General view.
5. Enable Application & URL Filtering on the Layer.
a) Enter a name for the Layer.
We recommend the name Application.
b) In the Blades section, select Applications & URL Filtering.
c) Click OK and the Layer Editor window closes.
d) Click OK and the Policy window closes.
6. Publish the session.
Explicit rules
The rules that the administrator configures explicitly, to allow or to block traffic based on
specified criteria.
Important - The default Cleanup rule is an explicit rule that is added by default to every
new layer. You can change or delete the default Cleanup rule. We recommend that you
have an explicit Cleanup rule as the last rule in each layer.
Implied rules
The default rules that are available as part of the Global properties configuration and cannot be
edited. You can only select the implied rules and configure their position in the Rule Base:
• First - Applied first, before all other rules in the Rule Base - explicit or implied
• Last - Applied last, after all other rules in the Rule Base - explicit or implied, but before the
Implicit Cleanup Rule
• Before Last - Applied before the last explicit rule in the Rule Base
Implied rules are configured to allow connections for different services that the Security Gateway
uses. For example, the Accept Control Connections rules allow packets that control these
services:
• Installation of the security policy on a Security Gateway
• Sending logs from a Security Gateway to the Security Management Server
• Connecting to third party application servers, such as RADIUS and TACACS authentication
servers
Sharing Layers
You may need to use the same rules in different parts of a Policy, or have the same rules in
multiple Policy packages.
There is no need to create the rules multiple times. Define an Ordered Layer or an Inline Layer
one time, and mark it as shared. You can then reuse the Inline Layer or Ordered layer in multiple
policy packages or use the Inline Layer in multiple places in an Ordered Layer. This is useful, for
example, if you are an administrator of a corporation and want to share some of the rules among
multiple branches of the corporation:
• It saves time and prevents mistakes.
• To change a shared rule in all of the corporation's branches, you must only make the change
once.
Column Description
No. Rule number in the Rule Base Layer.
Hits Number of times that connections match a rule (on page 124).
Name Name that the system administrator gives this rule.
Source Network objects (on page 103) that define
• Where the traffic starts
Destination
• The destination of the traffic.
VPN The VPN Community to which the rule applies (on page 104).
Services & Services, Applications, Categories, and Sites (on page 105).
Applications If Application & URL Filtering is not enabled, only Services show.
Content The data asset to protect, for example, credit card numbers or medical
records (on page 108).
You can set the direction of the data to Download Traffic (into the
organization), Upload Traffic (out of the organization), or Any Direction.
Action Action that is done when traffic matches the rule (on page 110). Options
include: Accept, Drop, Ask, Inform (UserCheck message), Inline Layer,
and Reject.
Track Tracking and logging action that is done when traffic matches the rule
(on page 112).
Install On Network objects that will get the rule(s) of the policy (on page 124).
Time Time period that this rule is enforced.
Comment An optional field that lets you summarize the rule.
VPN Column
You can configure rules for Site-to-Site VPN, Remote Access VPN, and the Mobile Access portal
and clients.
To make a rule for a VPN Community, add a Site-to-Site Community or a Remote Access VPN
Community object to this column, or select Any to make the rule apply to all VPN Communities.
When you enable Mobile Access on a gateway, the gateway is automatically added to the
RemoteAccess VPN Community. Include that Community in the VPN column of the rule or use Any
to make the rule apply to Mobile Access gateways. If the gateway was removed from the VPN
Community, the VPN column must contain Any.
IPsec VPN
The IPsec VPN solution lets the Security Gateway encrypt and decrypt traffic to and from other
gateways and clients. Use SmartConsole to easily configure VPN connections between Security
Gateways and remote devices.
For Site-to-Site Communities, you can configure Star and Mesh topologies for VPN networks, and
include third-party gateways.
The VPN tunnel guarantees:
• Authenticity - Uses standard authentication methods
• Privacy - All VPN data is encrypted
• Integrity - Uses industry-standard integrity assurance methods
Service Matching
The Firewall identifies (matches) a service according to IP protocol, TCP and UDP port number,
and protocol signature.
To make it possible for the Firewall to match services by protocol signature, you must enable
Applications and URL Filtering on the Gateway and on the Ordered Layer (on page 96).
You can configure TCP and UDP services to be matched by source port.
Application Matching
If an application is allowed in the policy, the rule is matched only on the Recommended services of
the application. This default setting is more secure than allowing the application on all services.
For example: a rule that allows Facebook, allows it only on the Application Control Web Browsing
Services: http, https, HTTP_proxy, and HTTPS_proxy.
If an application is blocked in the policy, it is blocked on all services. It is therefore blocked on all
ports.
You can change the default match settings for applications.
Services and Applications on R80 and Lower Gateways, and after Upgrade
For R77.xx and lower Gateways:
• The Firewall matches TCP and UDP services by port number. The Firewall cannot match
services by protocol signature.
• The Firewall matches applications by the application signature.
When you upgrade the Security Management Server and the Gateway to R80 and higher, this
change of behavior occurs:
• Applications that were defined in the Application & URL Filtering Rule Base are accepted on
their recommended ports
Content Column
You can add Data Types to the Content column of rules in the Access Control Policy.
To use the Content column, you must enable Content Awareness, in the General Properties page
of the Security Gateway, and on the Layer.
A Data Type is a classification of data. The Firewall classifies incoming and outgoing traffic
according to Data Types, and enforces the Policy accordingly.
You can set the direction of the data in the Policy to Download Traffic (into the organization),
Upload Traffic (out of the organization), or Any Direction.
There are two kinds of Data Types: Content Types (classified by analyzing the file content) and File
Types (classified by analyzing the file ID).
Actions Column
Action Meaning
Accept Accepts the traffic
Drop Drops the traffic. The Firewall does not send a response to the originating end of
the connection and the connection eventually does a time-out. If no UserCheck
object is defined for this action, no page is displayed.
Ask Asks the user a question and adds a confirmatory check box, or a reason box.
Uses a UserCheck object.
Inform Sends a message to the user attempting to access the application or the
content. Uses a UserCheck object.
Reject Rejects the traffic. The Firewall sends an RST packet to the originating end of
the connection and the connection is closed.
UserCheck Configure how often the user sees the configured message when the action is
Frequency ask, inform, or block.
Enable Redirects HTTP traffic to an authentication (captive) portal. After the user is
Identity authenticated, new connections from this source are inspected without requiring
Captive Portal authentication.
Important - A rule that drops traffic, with the Source and Destination parameters
defined as Any, also drops traffic to and from the Captive Portal.
UserCheck Actions
UserCheck lets the Security Gateways send messages to users about possible non-compliant or
dangerous Internet browsing. In the Access Control Policy, it works with URL Filtering, Application
Control, and Content Awareness. (You can also use UserCheck in the Data Loss Prevention Policy,
in SmartConsole). Create UserCheck objects and use them in the Rule Base, to communicate with
the users. These actions use UserCheck objects:
• Inform
• Ask
• Drop
UserCheck on a computer
The UserCheck client is installed on endpoint computers. This client:
• Sends messages for applications that are not based on Internet browsers, such as Skype and
iTunes, and Internet browser add-ons and plug-ins.
• Shows a message on the computer when it cannot be shown in the Internet browser.
Tracking Column
These are some of the Tracking options:
• None - Do not generate a log.
• Log - This is the default Track option. It shows all the information that the Security Gateway
used to match the connection.
• Accounting - Select this to update the log at 10 minute intervals, to show how much data has
passed in the connection: Upload bytes, Download bytes, and browse time.
No. Name Source Destinati VPN Services & Content Action Track
on Applications
General compliance (1)
3 Allow uploading Finance Web Servers Any https Upload Accept Log
of credit cards (Access Role) Traffic
numbers, by PCI –
finance, and Credit Card
only over HTTPS Numbers
4 Block other Any Web Servers Any Any Any Drop Log
credit cards Direction
from company PCI –
Web servers Credit Card
Numbers
5 Inform the user Any Any RemoteAccess Any Any Inform Log
about sensitive Direction
data from VPN Salary
sites Survey
Report
cleanup (6)
Rule Explanation
1 General Compliance section - Block access to unacceptable Web sites and applications.
2 Block risky executables section - Block downloading of high risk executable files.
3-4 Credit card data section - Allow uploading of credit cards numbers only by the finance
department, and only over HTTPS. Block other credit cards.
5 Block sensitive data over VPN section - A remote user that connects over the
organization's VPN sees an informational message.
6 cleanup rule - Accept all traffic that does not match one of the earlier rules.
4 Web Servers InternalZone Web Servers Web Any Web Servers N/A
protection
4.2 Inform user when Any Any https Upload Traffic Inform Log
uploading Credit PCI - Credit Access Noti...
Cards only over Card Numbers once a day
HTTPS per applic...
4.3 Block Credit Any Any Any Any Direction Drop Log
Cards PCI - Credit Block
Card Numbers Message
5 Ask user when InternalZone Internet PayPal Any Direction Ask Log
sending credit PCI - Credit Company
cards to PayPal Card Numbers Policy
Access Noti...
once a day
per applic...
Rule Explanation
4 This is the parent rule of the Inline Layer. The Action is the name of the Inline Layer. If a
packet matches on the parent rule, the matching continues to rule 4.1 of the Inline Layer. If
a packet does not match on the parent rule, the matching continues to rule 5.
4.1 If a packet matches on rule 4.1, the rule action is done on the packet, and no more rule
-4.4 matching is done. If a packet does not match on rule 4.1, continue to rule 4.2. The same
logic applies to the remaining rules in the Inline Layer.
4.5 If none of the higher rules in the Ordered Layer match the packet, the explicit Cleanup
Rule is applied. The Cleanup rule is a default explicit rule. You can change or delete it. We
recommend that you have an explicit cleanup rule as the last rule in each Inline Layer and
Ordered Layer.
2 Allow uploading Finance Web Servers https Upload Traffic Accept Log
of credit cards (Access Role) PCI – Credit Card
numbers by Numbers
finance users,
only over HTTPS
3 Block other credit InternalZone Web Servers Any Any Direction Drop Log
cards from PCI – Credit Card Block Message
company Web Numbers
servers
Human Resources
6 Ask user when InternalZone Internet Any Upload Traffic Ask Log
uploading Salary Survey Report Company Policy
documents once a day
containing salary per applicati...
survey reports.
Intellectual Property
7 Matches data InternalZone Internet Any Any Direction Restrict source N/A
containing source Source Code code
code
Rule Explanation
1-3 Regulatory Compliance section - Control the upload and download of executable files and
credit cards.
You can set the direction of the Content. In rule 1 it is Download Traffic, in rule 2 it is
Upload Traffic, and in rule 3 it is Any Direction.
Rule 1 controls executable files, which are File Types. The File Type rule is higher in the
Rule Base than rules with Content Types (Rules 2 to 7). This improves the efficiency of the
Rule Base, because File Types are matched sooner than Content Types.
4-5 Personally Identifiable Information section - Controls the upload and download of social
security number and medical records.
The rule Action for rule 4 is Inform. When an internal user uploads a file with a social
security number, the user sees a message.
6 Human resources section - controls the sending of salary survey information outside of
the organization.
The rule action is Ask. If sensitive content is detected, the user must confirm that the
upload complies with the organization's policy.
7 Intellectual Property section - A group of rules that control how source code leaves the
organization.
Rule 7 is the parent rule of an Inline Layer (on page 92). The Action is the name of the
Inline Layer.
If a packet matches on rule 7.1, matching stops.
If a packet does not match on rule 7.1, continue to rule 7.2. In a similar way, if there is no
match, continue to 7.3. The matching stops on the last rule of the Inline Layer. We
recommend that you have an explicit cleanup rule as the last rule in each Inline Layer
Rule Explanation
1 Liability sites- Blocks traffic to sites and applications in the custom Potential_liability
group. The UserCheck Blocked Message is shown to users and explains why their traffic is
blocked.
2 High risk applications - Blocks traffic to sites and applications in the High Risk category
and blocks the iTunes application. The UserCheck Block Message is shown to users and
explains why their traffic is blocked.
3 Allow IT department Remote Admin - Allows the computers in the IT department
network to use the Radmin application. Traffic that uses Radmin is allowed only during the
Work-Hours (set to 8:00 through 18:30, for example).
4 Allow Facebook for HR - Allows computers in the HR network to use Facebook. The total
traffic downloaded from Facebook is limited to 1 Gbps, there is no upload limit.
5 Block these categories - Blocks traffic to these categories: Streaming Media, Social
Networking, P2P File Sharing, and Remote Administration. The UserCheck Blocked
Message is shown to users and explains why their traffic is blocked.
Note - The Remote Administration category blocks traffic that uses the Radmin
application. If this rule is placed before rule 3, then this rule can also block Radmin for the
IT department.
6 Log all applications- Logs all traffic that matches any of the URL Filtering and Application
Control categories.
This is the matching procedure when browsing to a file sharing Web site. Follow the rows from top
to bottom. Follow each row from left to right:
This is the matching procedure when downloading an executable file from a business Web site.
Follow the rows from top to bottom. Follow each row from left to right:
Reason for 2 and 3: Application Control and Content Awareness rules require content
inspection. Therefore, they:
• Allow the connection until the Firewall has inspected connection header and body.
• May affect performance.
4. For rules with Data Types (on page 108): Place rules that check File Types higher in the Rule
Base than rules that check for Content Types.
Reason: File Types are matched sooner than Content Types.
To see examples of some of these best practices, see the Unified Rule Base Use Cases (on page
112) and Creating a Basic Access Control Policy (on page 83).
Preventing IP Spoofing
IP spoofing replaces the untrusted source IP address with a fake, trusted one, to hijack
connections to your network. Attackers use IP spoofing to send malware and bots to your
protected network, to execute DoS attacks, or to gain unauthorized access.
Anti-Spoofing detects if a packet with an IP address that is behind a certain interface, arrives from
a different interface. For example, if a packet from an external network has an internal IP
address, Anti-Spoofing blocks that packet.
Example:
The diagram shows a Gateway with interfaces 2 and 3, and 4, and some example networks behind
the interfaces.
Configuring Anti-Spoofing
Make sure to configure Anti-Spoofing protection on all the interfaces of the Security Gateway,
including internal interfaces.
10. Configure Anti-Spoofing options (on page 129). Make sure that Perform Anti-Spoofing based
on interface topology is selected.
11. Select an Anti-Spoofing action:
• Prevent - Drops spoofed packets
• Detect - Allows spoofed packets. To monitor traffic and to learn about the network topology
without dropping packets, select this option together with the Spoof Tracking Log option.
12. Configure Anti-Spoofing exceptions (optional). For example, configure addresses, from which
packets are not inspected by Anti-Spoofing:
Select Don't check packets from.
a)
b) Select an object from the drop-down list, or click New to create a new object.
13. Configure Spoof Tracking - select the tracking action that is done when spoofed packets are
detected:
• Log - Create a log entry (default)
• Alert - Show an alert
• None - Do not log or alert
14. Click OK twice to save Anti-Spoofing settings for the interface.
For each interface, repeat the configuration steps. When finished, install the Access Control
policy.
Anti-Spoofing Options
• Perform Anti-Spoofing based on interface topology - Select this option to enable spoofing
protection on this external interface.
• Anti-Spoofing action is set to - Select this option to define if packets will be rejected (the
Prevent option) or whether the packets will be monitored (the Detect option). The Detect option
is used for monitoring purposes and should be used in conjunction with one of the tracking
options. It serves as a tool for learning the topology of a network without actually preventing
packets from passing.
• Don't check packets from - Select this option to make sure anti-spoofing does not take place
for traffic from internal networks that reaches the external interface. Define a network object
that represents those internal networks with valid addresses, and from the drop-down list,
select that network object. The anti-spoofing enforcement mechanism disregards objects
selected in the Don't check packets from drop-down menu.
• Spoof Tracking - Select a tracking option.
13. In the Rule Base, add a rule that allows the multicast address range as the Destination.
14. In the Services of the rule, add the multicast protocols.
• Multicast routing protocols - For example: Protocol-Independent Multicast (PIM),
Distance Vector Multicast Routing Protocol (DVMRP), and Multicast Extensions to OSPF
(MOSPF).
• Dynamic registration - Hosts use the Internet Group Management Protocol (IGMP) to let
the nearest multicast router know they want to belong to a specified multicast group. Hosts
can leave or join the group at any time.
15. Install the policy.
New Access Control Policy for pre-R80 Security Gateways on an R80 Security
Management Server must have this structure:
The first Policy Layer is the Network Layer (with the Firewall blade enabled on it).
1.
2. The second Policy Layer is the Application & URL Filtering Layer (with the Application & URL
Filtering blade enabled on it).
3. There are no other Policy Layers.
If the Access Control Policy has a different structure, the policy will fail to install.
You can change the names of the Layers, for example, to make them more descriptive.
Each new Policy Layer will have the explicit default rule, added automatically and set to Drop all
the traffic that does not match any rule in that Policy Layer. We recommend that the Action is set
to Drop for the Network Policy Layer and Accept for the Application Control Policy Layer.
If you remove the default rule, the Implicit Cleanup Rule will be enforced. The Implicit Cleanup
Rule is configured in the Policy configuration window and is not visible in the Rule Base table.
Make sure the Implicit Cleanup Rule is configured to Drop the unmatched traffic for the Network
Policy Layer and to Accept the unmatched traffic for the Application Control Policy Layer.
Item Description
3 External computers and servers in the Internet
2 Security Gateway - Firewall is configured with Static NAT
1 Internal computers
Internal computer A
Firewall translates this Internet receives packet
(10.10.0.26) sends packet
address to 192.0.2.5 from 192.0.2.5
to Internet
Internal computer B
Firewall translates this Internet receives packet
(10.10.0.37) sends packet
address to 192.0.2.16 from 192.0.2.16
to Internet
Hide NAT
Firewalls that do Hide NAT use different port numbers to translate internal IP address to one
external IP address. External computers cannot start a connection to an internal computer.
Item Description
1 Internal computers
2 Security Gateway - Firewall is configured with Hide NAT
3 External computers and servers in the Internet
Item Description
1 Internal networks
2 Security Gateway - Firewall is configured with automatic Hide NAT.
2A and 2B Two external interfaces 192.0.2.1 and 192.0.2.100.
1 -->3 External computers and servers on the Internet
Source IP addresses are translated to the applicable external interface IP address: 192.0.2.1 or
192.0.2.100.
Note - If a connection matches a regular NAT rule and a NAT-for-internal-networks rule, the
regular NAT rule takes precedence.
Item Description
1 Internal computers (Alaska_LAN 2001:db8::/64)
2 Web server (Alaska.Web 2001:db8:0:10::5 translated to 2001:db8:0:a::5)
3 Mail server (Alaska.Mail 2001:db8:0:10::6 translated to 2001:db8:0:a::6)
4 Security Gateway (External interface 2001:db8:0:a::1)
5 External computers and servers in the Internet
Item Description
1 External computers and servers in the Internet
2 Security Gateway (Alaska_GW external interface 2001:db8:0:c::1)
3 DMZ network (Alaska_DMZ 2001:db8:a::/128)
4 Web server (Alaska_DMZ_Web 2001:db8:a::35:5 translated to 2001:db8:0:c::1)
5 Mail server (Alaska_DMZ_Mail 2001:db8:a::35:6 translated to 2001:db8:0:c::1)
2. Create a manual NAT rule that translates HTTP traffic from the Security Gateway to the web
server.
In SmartConsole, go to Security Policies > Access Control > NAT.
a)
b) Add a rule below the automatic rules.
c) Right-click the cell and select Add new items to configure these settings:
Original Destination - Alaska_GW
Original Service - HTTP
Translated Destination - Alaska_DMZ_Web
3. Create a manual NAT rule that translates SMTP traffic from the Security Gateway to the mail
server.
a)
Add a rule below the automatic rules.
b) Right-click the cell and select Add new items to configure these settings:
Original Destination - Alaska_GW
Original Service - SMTP
Translated Destination - Alaska_DMZ_Web
4. Create a rule in the Firewall Rule Base that allows traffic to the servers.
In SmartConsole, go to Security Policies > Access Control > NAT.
a)
b) Add a rule to the Rule Base.
c) Right-click the cell and select Add new items to configure these settings:
Destination - Alaska_DMZ
Service - HTTP, SMTP
Action - Allow
5. Install the policy.
NAT Rule Base for Manual Rules for Port Translation Sample Deployment
Step Instructions
1 Make sure that an IPv6 address is assigned to the interface that connects to the
destination IPv4 network, and the IPv6 network prefix length is equal to, or less than 96.
Note - This can be any valid IPv6 address with the IPv6 network prefix length equal to,
or less than 96.
• In Gaia Portal:
Click Network Management > Network Interfaces.
• In Gaia Clish:
Run: show interface <Name of Interface> ipv6-address
If such IPv6 address is not assigned yet, assign it now. For details, see R80.30 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_Gaia_
AdminGuide/html_frameset.htm - Chapter Network Management - Section Network
Interfaces - Section Physical Interfaces.
2 Make sure that the IPv6 routing is configured to send the traffic that is destined to the
NATed IPv6 addresses (defined in the Original Destination column in the NAT64 rule)
through the interface that connects to the destination IPv4 network.
• In Gaia Portal:
Click Advanced Routing > Routing Monitor.
• In Gaia Clish:
Run: show ipv6 route
If such route does not already exist, add it in Gaia Clish. For details, see R80.30 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_Gaia_
AdminGuide/html_frameset.htm. Run these commands in Gaia Clish:
et ipv6 static-route <NATed Destination IPv6 Addresses>/<96 or less>
1. s
nexthop gateway <Any IPv6 Address from the IPv6 subnet of the Interface that
connects to the destination real IPv4 network> on
Example topology:
[IPv6 Client] --- (NATed IPv6 of IPv4 side are 1111:2222::/96) [Security Gateway]
(eth3 with IPv6 3333:4444::1) --- [IPv4 Server]
In such case, configure the IPv6 route using this command:
set ipv6 static-route 1111:2222::/96 nexthop gateway
3333:4444::10 on
2. save config
Step Instructions
3 Make sure that the number of IPv6 CoreXL FW instances is equal to the number of IPv4
CoreXL FW instances.
1.
Connect to the command line on the Security Gateway.
2. Log in to Gaia Clish, or Expert mode.
3. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
4. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
5. If the number of IPv6 CoreXL FW instances is less than the number of IPv4 CoreXL
FW instances, then do these steps:
a)
Run:
cpconfig
b) Select Check Point CoreXL
c) Select Change the number of IPv6 firewall instances
d) Configure the number of IPv6 CoreXL FW instances to be the same as the
number of IPv4 CoreXL FW instances
e) Select Exit
f) Reboot the Security Gateway
6. Connect to the command line on the Security Gateway.
7. Log in to Gaia Clish, or Expert mode.
8. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
9. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
Example output:
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#
[Expert@GW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#
To define a source IPv6 Network object that represents the source IPv6 address, which
you translate to source IPv4 addresses:
1. Click Objects menu > New Network.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
a) In the Network address field, enter the IPv6 address of your IPv6 network, which you
translate to source IPv4 addresses.
b) In the Prefix field, enter the prefix of your IPv6 network.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.
To define a translated destination IPv6 Host object with static IPv6 address that
represents the IPv6 address, to which the IPv6 sources connect:
1. Click Objects menu > New Host.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
In the Network address field, enter the destination static IPv6 address, to which the IPv6
sources connect.
7. On the NAT page of this object:
Do not configure anything.
8. Configure the applicable settings on other pages of this object.
9. Click OK.
To define a translated source IPv4 Address Range object that represents the IPv4
addresses, to which you translate the source IPv6 addresses:
1. Click Objects menu > More object types > Network Object > Address Range > New Address
Range.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
a) In the First IP address field, enter the first IPv4 address of your IPv4 addresses range, to
which you translate the source IPv6 addresses.
b) In the Last IP address field, enter the last IPv4 address of your IPv4 addresses range, to
which you translate the source IPv6 addresses.
Notes:
• This IPv4 addresses range must not use private IPv4 addresses (see RFC 1918
https://tools.ietf.org/html/rfc1918 and Menu > Global properties > Non Unique IP Address
Range).
• This IPv4 addresses range must not be used on the IPv4 side of the network.
• We recommend that you define a large IPv4 addresses range for more concurrent NAT64
connections.
6. In the IPv6 section:
Do not enter anything.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.
To summarize, you must configure only these Manual NAT64 rules (rule numbers are for
convenience only):
Xlate (NAT ) Shows the translated destination IPv4 address, to which the Security Gateway
Destination IP translated the original destination IPv6 address
Item Description
IPv6 Client IPv6 real address is 1111:1111::0100/96
Security Gateway IPv6 address is 1111:1111::1/96
external interface
Security Gateway IPv4 address is 10.0.0.1/24
internal interface IPv6 address is 3333:4444::1/96
IPv4 Server IPv4 real address is 10.0.0.100/24
IPv6 NATed address is 1111:2222::0A00:0064/96
IPv6 NATed network IPv6 address of the network on the external Security Gateway side is
1111:2222::/96
These IPv6 addresses are used to translate the IPv4 address of the IPv4
Server to the IPv6 address
IPv4 NATed network IPv4 address of the network on the internal Security Gateway side is
1.1.1.0/24
These IPv4 addresses are used to translate the IPv6 address of the IPv6
Client to the IPv4 address
Traffic flow:
1.
IPv6 Client opens an IPv6 connection to the NATed IPv6 address of the IPv4 Server:
From the IPv6 Client's IPv6 real address 1111:1111::0100 to the IPv4 Server's NATed IPv6
address 1111:2222::0A00:0064
Where:
The "1111:2222::" part is the NATed IPv6 subnet
The "0A00:0064" part is 10.0.0.100
2. Security Gateway performs these NAT translations:
ranslate the IPv6 Client's source address from the real IPv6 address 1111:1111::0100 to
a) T
the special concatenated source IPv6 address 0064:FF9B::0101:01XX
Where:
The "0064:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the RFC)
The "0101:01XX" part is 1.1.1.X
b) Translate the IPv6 Client's source address from the special concatenated source IPv6
address 0064:FF9B::0101:01XX to the source IPv4 address 1.1.1.X
c) Translate the IPv6 Client's NATed destination address from the IPv6 address
1111:2222::0A00:0064 to the NATed destination IPv4 address 10.0.0.100
3. IPv4 Server receives this request connection as from the source IPv4 address 1.1.1.X to the
destination IPv4 address 10.0.0.100
4. IPv4 Server replies to this connection from the source IPv4 address 10.0.0.100 to the
destination IPv4 address 1.1.1.X
5. Security Gateway performs these NAT translations:
ranslate the IPv4 Server's source real IPv4 address 10.0.0.100 to the source NATed IPv6
a) T
address 1111:2222::0A00:0064
b) Translate the IPv6 Client's NATed destination IPv4 address 1.1.1.X to the destination
special concatenated IPv6 address 0064:FF9B::0101:01XX
Where:
The "64:FF9B::" part is a well-known prefix reserved for NAT64 (as defined by the RFC)
The "0101:01XX" part is 1.1.1.X
c) Translate the IPv6 Client's destination special concatenated IPv6 address
0064:FF9B::0101:01XX to the destination IPv6 real address 1111:1111::0100
6. IPv6 Client receives this reply connection as from the source IPv6 address
1111:2222::0A00:0064 to the destination IPv6 address 1111:1111::0100
To summarize:
• Request: [IPv6 Client] ---> [Security Gateway] ---> [IPv4 Server]
Field in packet Original IPv6 packet NATed IPv4 packet
Source IP 1111:1111::0100 / 96 1.1.1.X / 24
Destination IP 1111:2222::0A00:0064 / 96 10.0.0.100 / 24
Step Instructions
1 Make sure that an IPv6 address is assigned to the interface that connects to the
destination IPv6 network, and the IPv6 network prefix length is equal to 96.
Note - This can be any valid IPv6 address with the IPv6 network prefix length equal to
96.
• In Gaia Portal:
Click Network Management > Network Interfaces.
• In Gaia Clish:
Run: show interface <Name of Interface> ipv6-address
If such IPv6 address is not assigned yet, assign it now. For details, see R80.30 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_Gaia_
AdminGuide/html_frameset.htm - Chapter Network Management - Section Network
Interfaces - Section Physical Interfaces.
2 Make sure that the routing is configured to send the traffic that is destined to the
NATed IPv4 addresses (defined in the Translated Destination column in the NAT46 rule)
through the interface that connects to the destination IPv6 network.
• In Gaia Portal:
Click Advanced Routing > Routing Monitor.
• In Gaia Clish:
Run: show route
If such route does not already exist, add it in Gaia Clish. For details, see R80.30 Gaia
Administration Guide
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_Gaia_
AdminGuide/html_frameset.htm. Run these commands in Gaia Clish:
1. set static route <NATed Destination IPv4 Addresses>/<NATed IPv4 Net Mask>
nexthop gateway logical <Name of Interface that connects to the real IPv6
Network> on
Example topology:
[IPv4 Client] --- (NATed IPv4 of IPv6 side are 1.1.1.0/24) [Security Gateway] (eth3) ---
[IPv6 Server]
In such case, configure the IPv4 route using this command:
set static route 1.1.1.0/24 nexthop gateway logical eth3 on
2. save config
Step Instructions
3 Make sure that the number of IPv6 CoreXL FW instances is equal to the number of IPv4
CoreXL FW instances.
1. Connect to the command line on the Security Gateway.
2. Log in to Gaia Clish, or Expert mode.
3. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
4. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
5. If the number of IPv6 CoreXL FW instances is less than the number of IPv4 CoreXL
FW instances, then do these steps:
a) Run:
cpconfig
b) Select Check Point CoreXL
c) Select Change the number of IPv6 firewall instances
d) Configure the number of IPv6 CoreXL FW instances to be the same as the
number of IPv4 CoreXL FW instances
e) Select Exit
f) Reboot the Security Gateway
6. Connect to the command line on the Security Gateway.
7. Log in to Gaia Clish, or Expert mode.
8. Show the number of IPv6 CoreXL FW instances. Run:
fw6 ctl multik stat
9. Show the number of IPv4 CoreXL FW instances. Run:
fw ctl multik stat
Example output:
[Expert@GW:0]# fw6 ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 0 | 0
1 | Yes | 2 | 0 | 4
2 | Yes | 1 | 0 | 2
[Expert@GW:0]#
[Expert@GW:0]# fw ctl multik stat
ID | Active | CPU | Connections | Peak
----------------------------------------------
0 | Yes | 3 | 10 | 14
1 | Yes | 2 | 6 | 15
2 | Yes | 1 | 7 | 15
[Expert@GW:0]#
To define a translated source IPv6 Network object with an IPv6 address defined with the
96-bit prefix:
Click Objects menu > New Network.
1.
2. In the Object Name field, enter the applicable name.
3. In the Comment field, enter the applicable text.
4. Click the General page of this object.
5. In the IPv4 section:
Do not enter anything.
6. In the IPv6 section:
In the Network address field, enter the translated source IPv6 address.
a)
b) In the Prefix field, enter the number 96.
7. On the NAT page of this object:
Do not configure anything.
8. Click OK.
Do these steps:
In the Original Source column, add the applicable IPv4 object.
a)
In this rule column, NAT46 rules support only these types of objects:
*Any
Host with a static IPv4 address
Address Range with IPv4 addresses
Network with IPv4 address
b) In the Original Destination column, add the IPv4 Host object that represents the
destination IPv4 address, to which the IPv4 sources connect.
In this rule column, NAT46 rules support only IPv4 Host objects.
c) In the Original Services column, you must leave the default Any.
d) In the Translated Source column, add the IPv6 Network object with an IPv6 address
defined with the 96-bit prefix.
In this rule column, NAT64 rules support only IPv6 Network objects with an IPv6 address
defined with the 96-bit prefix.
e) In the Translated Source column, right-click the IPv6 Network object with the 96-bit prefix
> click NAT Method > click Stateless NAT46.
The 46 icon shows in the Translated Source column.
f) In the Translated Destination column, add the IPv6 Host object represents the translated
destination IPv6 address, to which the translated IPv4 sources connect.
In this rule column, NAT46 rule supports only an IPv6 Host objects.
g) In the Translated Services column, you must leave the default = Original.
To summarize, you must configure only these NAT46 rules (rule numbers are for convenience
only):
# Original Original Original Translated Translated Translated
Source Destination Services Source Destination Services
1 *Any IPv4 *Any IPv6 IPv6 = Original
Host Network Host
object object object
with an
IPv6 address
defined with
the 96-bit
prefix
2 IPv4 IPv4 *Any IPv6 IPv6 = Original
Host Host Network Host
object object object object
with with an
a static IPv6 address
IPv4 defined with
address the 96-bit
prefix
3 IPv4 IPv4 *Any IPv6 IPv6 = Original
Address Host Network Host
Range object object object
object with an
IPv6 address
defined with
the 96-bit
prefix
4 IPv4 IPv4 *Any IPv6 IPv6 = Original
Network Host Network Host
object object object object
with an
IPv6 address
defined with
the 96-bit
prefix
# Original Original Original Translated Translated Translated
Source Destination Services Source Destination Services
1 *Any IPv4 *Any IPv6 IPv6 = Original
Host Network Host
object object object
with an
IPv6 address
defined with
the 96-bit
prefix
Xlate (NAT ) Shows the translated destination IPv6 address, to which the Security Gateway
Destination IP translated the original destination IPv4 address
Item Description
IPv4 Client IPv4 real address is 192.168.2.55
IPv6 NATed address is 2001:DB8:90::192.168.2.55/96
Security Gateway internal IPv4 address is 192.168.2.1/24
interface
Security Gateway external IPv6 address is 2001:DB8:5001::1/96
interface
IPv6 Server IPv6 real address is 2001:DB8:5001::30/96
IPv4 NATed address is 1.1.1.66/24
IPv6 NATed network IPv6 address of the network on the external Security Gateway
side is 2001:DB8:90::/96
These IPv6 addresses are used to translate the IPv4 address
of the IPv4 Client to IPv6 address
IPv4 NATed network IPv4 address of the network on the internal Security Gateway
side is 1.1.1.0/24
These IPv4 addresses are used to translate the IPv6 address
of the IPv6 Server to IPv4 address
Traffic flow:
1. IPv4 Client opens an IPv4 connection to the NATed IPv4 address of the IPv6 Server
From IPv4 address 192.168.2.55 to IPv4 address 1.1.1.66
2. Security Gateway performs these NAT translations:
a) From the source IPv4 address 192.168.2.55 to the source IPv6 address
2001:DB8:90::192.168.2.55/96
b) From the destination IPv4 address 1.1.1.66 to the destination IPv6 address
2001:DB8:5001::30
3. IPv6 Server receives this request connection as from the IPv6 address
2001:DB8:90::192.168.2.55/96 to the IPv6 address 2001:DB8:5001::30
4. IPv6 Server replies to this connection from the IPv6 address 2001:DB8:5001::30 to the IPv6
address 2001:DB8:90::192.168.2.55/96
5. Security Gateway performs these NAT translations:
a) From the source IPv6 address 2001:DB8:5001::30 to the source IPv4 address 1.1.1.66
b) From the destination IPv6 address 2001:DB8:90::192.168.2.55/96 to the destination IPv4
address 192.168.2.55
6. IPv4 Client receives this reply connection as from the IPv4 address 1.1.1.66 to the IPv4 address
192.168.2.55
To summarize:
• Request: [IPv4 Client] ---> [Security Gateway] ---> [IPv6 Server]
Field in packet Original IPv4 packet NATed IPv6 packet
Source IP 192.168.2.55 / 24 2001:DB8:90::192.168.2.55 / 96
Destination IP 1.1.1.66 / 24 2001:DB8:5001::30 / 96
Deployment Configurations
This section discusses how to configure NAT in some network deployments.
Item Description
1 Computer on the internal network with IP address 10.1.1.3
2 Security Gateway with external interface IP address 192.168.0.2 responds to ARP
Requests on behalf of translated internal objects
3 Translated IP Address 192.168.0.3 on the external network
4 External network
If you are using manual NAT rules, you must configure Proxy ARP entries to associate the
translated IP address with the MAC address of the Security Gateway interface that is on the same
network as the translated IP addresses.
See sk30197 http://supportcontent.checkpoint.com/solutions?id=sk30197 for more information
about configuring:
• Proxy ARP for IPv4 Manual NAT
• Proxy ARP for Scalable Platforms
See sk91905 http://supportcontent.checkpoint.com/solutions?id=sk91905 for more about
configuring Proxy NDP for IPv6 Manual NAT.
For example, assume both Network 2A and Network 2B share the same address space
(192.168.1.0/24), therefore standard NAT cannot be used to enable communication between the
two networks. Instead, overlapping NAT must be performed on a per interface basis.
Users in Network 2A who want to communicate with users in Network 2B must use the
192.168.30.0/24 network as a destination. Users in Network 2B who want to communicate with
users in Network 2A must use the 192.168.20.0/24 network as a destination.
The Security Gateway (4) translates the IP addresses in the following way for each individual
interface:
Interface 4A
• Inbound source IP addresses are translated to the virtual network 192.168.20.0/24.
• Outbound destination IP addresses are translated to the network 192.168.1.0/24.
Interface 4B
• Inbound source IP addresses are translated to the network 192.168.30.0/24.
• Outbound destination IP addresses are translated to the network 192.168.1.0/24.
Interface 4C
Overlapping NAT is not configured for this interface. Instead, use NAT Hide in the normal way (not
on a per-interface basis) to hide source addresses behind the interface's IP address (192.168.4.1).
Communication Examples
This section describes how to enable communication between internal networks, and between an
internal network and the Internet
Security Gateway enforces the security policy for packets from network 192.168.20.0/24 to
network 192.168.30.0/24.
The Security Gateway (4) enforces the security policy for packets from network 192.168.20.0/24
to the Internet (3).
Routing Considerations
To allow routing from Network 2A to Network 2B, routing must be configured on the Security
Gateway.
These sections contain sample routing commands for Windows and Linux operating systems (for
other operating systems, use the equivalent commands).
On Windows
• route add 192.168.30.0 mask 255.255.255.0 192.168.3.2
• route add 192.168.20.0 mask 255.255.255.0 192.168.2.2
On Linux
• route add -net 192.168.30.0/24 gw 192.168.3.2
• route add -net 192.168.20.0/24 gw 192.168.2.2
Object Database Configuration
To activate the overlapping NAT feature, use GuiDBedit Tool (see sk13009
http://supportcontent.checkpoint.com/solutions?id=sk13009), or dbedit (see skI3301
http://supportcontent.checkpoint.com/solutions?id=skI3301). In the sample network
configuration, the per interface values for interface 4A and interface 4B are set in the following
way:
Sample Network Configuration: Interface Configuration
Parameter Value
enable_overlapping_nat true
overlap_nat_dst_ipaddr The overlapping IP addresses (before NAT). In the sample
network configuration, 192.168.1.0 for both interfaces.
Item Description
1 Primary_Security_Management object with IP address 10.0.0.1. Translated address
192.168.55.1
In ordinary Hide NAT configurations, connections cannot be established from the external side the
NAT A Security Gateway. However, when using Hide NAT on the Security Management Server,
gateways can send logs to the Security Management Server.
When using the Security Management behind NAT feature, the remote gateway automatically
selects the Security Management address to be addressed and simultaneously applies NAT
considerations.
Notes:
• Only one object can be defined with these settings, unless the second object is defined as a
Secondary Security Management Server or as a Log Server.
• Ensure that you properly define the Topology settings on all gateways. All workarounds
required for previous versions still function with no changes in their behavior.
IP Pool NAT
An IP Pool is a range of IP addresses (an address range, a network or a group of one of these
objects) that is routable to the gateway. IP Pool NAT ensures proper routing for encrypted
connections for the following two connection scenarios:
• Remote Access Client to MEP (Multiple Entry Point) gateways
• Gateway to MEP gateways
When a connection is opened from a Remote Access Client or a client behind a gateway, to a
server behind the MEP Gateways, the packets are routed through one of the MEP gateways.
Return packets in the connection must be routed back through the same gateway in order to
maintain the connection. To ensure that this occurs, each of the MEP gateways maintains a pool of
IP addresses that are routable to the gateway. When a connection is opened to a server, the
gateway substitutes an IP address from the IP pool for the source IP address. Reply packets from
the server return to the gateway, which restores the original source IP address and forwards the
packets to the source.
Item Description
1 Packets from source host:
Source: Original
Destination:
2 VPN tunnel through the Internet
3 MEP Gateway
3A IP Pool 1 packets:
Source: 10.55.8.x
Destination:
3B IP Pool 2 packets:
Source: 10.55.10.x
Destination:
4 Internal network 10.8.8.0
5 Target host in internal network 10.10.10.0
If a remote client opens a connection to the internal network, reply packets from hosts inside the
internal networks are routed to the correct gateway interface through the use of static IP pool
NAT addresses.
The remote client's IP address is NATed to an address in the IP pool on one of the gateway
interfaces. The addresses in the IP pool can be routed only through that gateway interface so that
all reply packets from the target host are returned only to that interface. Therefore, it is important
that the IP NAT pools of the interfaces do not overlap.
When the packet returns to the gateway interface, the gateway restores the remote peer's source
IP address.
The routing tables on the routers that lie behind the gateway must be edited so that addresses
from a gateway IP pool are returned to the correct gateway interface.
Switching between IP Pool NAT per gateway and IP Pool NAT per interface and then installing the
security policy deletes all IP Pool allocation and all NATed connections.
Security Management Administration Guide R80.30 | 176
Creating an Access Control Policy
NAT Priorities
IP Pool NAT can be used both for encrypted (VPN) and non-encrypted (decrypted by the gateway)
connections.
Note - To enable IP Pool NAT for clear connections through the gateway, configure INSPECT
changes in the user.def file (see sk98239
http://supportcontent.checkpoint.com/solutions?id=sk98239). Contact Check Point Technical
Support.
For non-encrypted connections, IP Pool NAT has the following advantages over Hide NAT:
• New back connections (for example, X11) can be opened to the NATed host.
• User-to-IP server mapping of protocols that allow one connection per IP can work with a
number of hosts instead of only one host.
• IPsec, GRE and IGMP protocols can be NATed using IP Pool NAT (and Static NAT). Hide NAT
works only with TCP, UDP and ICMP protocols.
Because of these advantages, you can specify that IP Pool NAT has priority over Hide NAT, if both
match the same connection. Hide NAT is only applied if the IP pool is used up.
The order of NAT priorities are:
1.
Static NAT
2. IP Pool NAT
3. Hide NAT
Since Static NAT has all of the advantages of IP Pool NAT and more, it has a higher priority than
the other NAT methods.
Item Description
1 Gateway with IP Pool addresses A to Z
2 Clients.
Source: Original
Destination:
6A This server cannot open a connection with Destination A back to the client.
The default Do not reuse IP Pool NAT behavior means that each IP address in the IP Pool is used
once (connections 1 and 2 in the following illustration). In this mode, if an IP pool contains 20
addresses, up to 20 different clients can be NATed and back connections can be opened from any
source to the client (connection 3).
Item Description
1 Gateway with IP Pool addresses A to Z.
2 Clients.
Source: Original
Destination:
5 Connection.
Source: Original
Destination: A
Switching between the Reuse and Do not reuse modes and then installing the security policy,
deletes all IP Pool allocations and all NATed connections.
4. For each gateway or gateway interface, create a network object that represents its IP pool NAT
addresses. The IP pool can be a network, group, or address range. For example, for an
address range, do the following:
rom the Objects Bar (F11), In the network objects tree, select New > More > Network
a) F
Object > Address Range > Address Range.
The Address Range Properties window opens.
b) In the General tab, enter the first and last IP of the address range.
c) Click OK. The new address range appears in the Address Ranges branch of the network
objects tree.
5. Edit the gateway object, and select NAT > IP Pool NAT.
6. In the IP Pool NAT page, select one of the following:
a) A
llocate IP Addresses from and then select the address range you created to configure IP
Pool NAT for the whole gateway, or
b) Define IP Pool NAT on Gateway interfaces to configure IP Pool NAT per interface.
7. If required, select one or more of the following options:
Use IP Pool NAT for VPN client connections
a)
b) Use IP Pool NAT for gateway to gateway connections
c) Prefer IP Pool NAT over Hide NAT to specify that IP Pool NAT has priority over Hide NAT, if
both match the same connection. Hide NAT is only applied if the IP pool is used up.
8. Click Advanced.
a) R
eturn unused addresses to IP Pool after: Addresses in the pool are reserved for 60
minutes (default), even if the user logs off. If the user disconnects from their ISP and then
redials and reconnects, there will be two Pool NAT addresses in use for the user until the
first address from the IP Pool times out. If users regularly lose their ISP connections, you
may want to decrease the time-out to prevent the IP Pool from being depleted.
b) Reuse IP addresses from the pool for different destinations: This is a good option unless
you need to allow back connections to be opened to clients from any source, rather than
just from the specific server to which the client originally opened the connection.
9. Click OK.
10. Edit the routing table of each internal router so that packets with an IP address assigned from
the NAT pool are routed to the appropriate gateway or, if using IP Pools per interface, the
appropriate gateway interface.
Site-to-Site VPN
The basis of Site-to-Site VPN is the encrypted VPN tunnel. Two Security Gateways negotiate a link
and create a VPN tunnel and each tunnel can contain more than one VPN connection. One Security
Gateway can maintain more than one VPN tunnel at the same time.
Item Description
A, B Security Gateways
2 VPN tunnel
3 Internal network in VPN domain
4 Host 4
5 Host 5
In this sample VPN deployment, Host 4 and Host 5 securely send data to each other. The Security
Gateways perform IKE negotiation and create a VPN tunnel. They use the IPsec protocol to encrypt
and decrypt data that is sent between Host 4 and Host 5.
VPN Workflow
VPN Communities
A VPN Domain is a collection of internal networks that use Security Gateways to send and receive
VPN traffic. Define the resources that are included in the VPN Domain for each Security Gateway.
Then join the Security Gateways into a VPN community - collection of VPN tunnels and their
attributes. Network resources of different VPN Domains can securely communicate with each
other through VPN tunnels that terminate at the Security Gateways in the VPN communities.
VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN
tunnels between each pair of Security Gateway. In a Star community, each satellite Security
Security Management Administration Guide R80.30 | 181
Creating an Access Control Policy
Gateway has a VPN tunnel to the central Security Gateway, but not to other Security Gateways in
the community.
Item Description
1 Security Gateway
2 Satellite Security Gateways
3 Central Security Gateway
• For the central Security Gateway, click Manually defined and select the Internal-network
object
• For a satellite Security Gateway, select All IP addresses
4. From the navigation tree, click IPsec VPN.
5. Configure the Security Gateway as a member of a VPN star community.
a) In the This Security Gateway participates in the following VPN Communities section, click
Add.
The Add this Gateway to Community window opens.
b) Select the VPN Community and click OK.
6. Click OK.
After you create a community and configure Security Gateways, add those Security Gateways to
the community as a center or as a satellite gateway.
Item Description
1 London Security Gateway
2 New York Security Gateway
3 London - New York Mesh community
4 London company partner (external network)
5 London Star community
6 New York company partner (external network)
7 New York Star community
This deployment is composed of a Mesh community for London and New York Security Gateways
that share internal networks. The Security Gateways for external networks of company partners
do not have access to the London and New York internal networks. However, the Star VPN
communities let the company partners access the internal networks of the sites that they work
with.
Install policy
Configure
Select the policy Update the
Enable Mobile settings in
type and add Authentication
Access Mobile Access
rules to policy settings
wizard
Item Description
1 Mobile devices
2 Mobile Access tunnels
3 Internet (external networks)
4 Mobile Access Security Gateway
5 Internal network resources, AD and Exchange servers
In this sample Mobile Access deployment, a mobile device uses a Mobile Access tunnel to connect
to the internal network. The Mobile Access Security Gateway decrypts the packets and
authenticates the user. The connection is allowed and the mobile device connects to the internal
network resources.
All connections from the RemoteAccess VPN community to the Exchange server are allowed.
These are the only protocols that are allowed: HTTP, HTTPS, and MS Exchange. This rule is
installed on Security Gateways in the MobileAccessGW group.
To configure SSO:
1. In SmartConsole, go to Security Policies > Shared Policies > Mobile Access.
2. Click Open Mobile Access Policy in SmartDashboard.
3. In the Mobile Access tab, select Additional Settings > Single Sign On.
The Single Sign On page opens.
4. Select an application and click Edit.
The application properties window opens and shows the Single Sign On page.
5. For Web form applications:
a) In the Application Single Sign On Method section, select Advanced and click Edit.
The Advanced window opens.
b) Select This application reuses the portal credentials. Users are not prompted.
c) Click OK.
d) Select This application uses a Web form to accept credentials from users.
e) Click OK.
6. Install the policy.
Item Description
1 Mobile devices
2 Mobile Access tunnels
3 Internet (external networks)
4 Security Gateway for the internal network
5 Mobile Access Security Gateway in the DMZ
6 Citrix web interface
7 Internal network resources
8 Citrix XenApp (MetaFrame) server
8. Enter the settings for the Citrix web interface server and the click OK.
9. In Services, select one or more of these services that the Citrix web interface server supports:
• HTTP
• HTTPS
10. From the navigation tree, click Link in Portal.
11. Configure the settings for the link to the Citrix services in the Mobile Access portal:
• Link text - The text that is shown for the Citrix link
• URL - The URL for the directory or subdirectory of the Citrix application
• Tooltip - Text that is shown when the user pauses the mouse pointer above the Citrix link
12. From the navigation tree, select Additional Settings > Single Sign On.
13. Enable Single Sign On for Citrix services, select these options:
• Turn on single Sign On for this application
• Prompt users for their credentials, and store them for future use
14. Click OK.
The Citrix server object is added to Defined Citrix Services.
15. From the Mobile Access navigation tree, select Policy.
16. Add the Citrix services object to the applicable rules.
Right-click on the Applications cell of a rule and select Add Applications.
a)
b) Select the Citrix services object.
17. Install the policy.
Compliance Check
The Mobile Access Software Blade lets you use the Endpoint Security on Demand feature to create
compliance policies and add more security to the network. Mobile devices and computers are
scanned one time to make sure that they are compliant before they can connect to the network.
The compliance scanner is installed on mobile devices and computers with ActiveX (for Internet
Explorer on Windows) or Java. The scan starts when the Internet browser tries to open the Mobile
Access Portal.
Secure Workspace
Secure Workspace is a security solution that allows remote users to connect to enterprise
network resources safely and securely. The Secure Workspace virtual workspace provides a
secure environment on endpoint computers that is segregated from the "real" workspace. Users
can only send data from this secure environment through the Mobile Access portal. Secure
Workspace users can only access permitted applications, files, and other resources from the
virtual workspace.
Secure Workspace creates an encrypted folder on the computer called My Secured Documents
and can be accessed from the virtual desktop. This folder contains temporary user files. When the
session terminates, Secure Workspace deletes this folder and all other session data.
For more about configuring Secure Workspace, see the R80.30 Mobile Access Administration
Guide
https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_MobileAccess_A
dminGuide/html_frameset.htm.
Each Software Blade gives unique network protections. When combined, they supply a strong
Threat Prevention solution. Data from malicious attacks are shared between the Threat
Prevention Software Blades and help to keep your network safe. For example, the signatures from
threats that Threat Emulation identifies are added to the ThreatCloud for use by the other Threat
Prevention blades.
IPS
The IPS Software Blade delivers complete and proactive intrusion prevention. It delivers 1,000s of
signatures, behavioral and preemptive protections. It gives another layer of security on top of
Check Point firewall technology. IPS protects both clients and servers, and lets you control the
network usage of certain applications. The hybrid IPS detection engine provides multiple defense
layers, which allows it excellent detection and prevention capabilities of known threats, and in
many cases future attacks as well. It also allows unparalleled deployment and configuration
flexibility and excellent performance.
Elements of Protection
IPS protection includes:
• Detection and prevention of specific known exploits.
• Detection and prevention of vulnerabilities, including both known and unknown exploit tools,
for example protection from specific CVEs.
• Detection and prevention of protocol misuse which in many cases indicates malicious activity
or potential threat. Examples of commonly manipulated protocols are HTTP, SMTP, POP, and
IMAP.
• Detection and prevention of outbound malware communications.
• Detection and prevention of tunneling attempts. These attempts may indicate data leakage or
attempts to circumvent other security measures such as web filtering.
• Detection, prevention or restriction of certain applications which, in many cases, are
bandwidth consuming or may cause security threats to the network, such as Peer to Peer and
Instant Messaging applications.
• Detection and prevention of generic attack types without any pre-defined signatures, such as
Malicious Code Protector.
Check Point constantly updates the library of protections to stay ahead of emerging threats.
Capabilities of IPS
The unique capabilities of the Check Point IPS engine include:
• Clear, simple management interface.
• Reduced management overhead by using one management console for all Check Point
products
• Integrated management with SmartConsole.
• Easy navigation from business-level overview to a packet capture for a single attack.
• #1 security coverage for Microsoft and Adobe vulnerabilities.
• Resource throttling so that high IPS activity will not impact other blade functionality
• Complete integration with Check Point configuration and monitoring tools in SmartConsole, to
let you take immediate action based on IPS information.
For example, some malware can be downloaded by a user unknowingly when he browses to a
legitimate web site, also known as a drive-by-download. This malware can exploit a browser
vulnerability to create a special HTTP response and sending it to the client. IPS can identify and
block this type of attack even though the firewall may be configured to allow the HTTP traffic to
pass.
Anti-Bot
A bot is malicious software that can infect your computer. It is possible to infect a computer when
you open attachments that exploit a vulnerability, or go to a web site that results in a malicious
download.
When a bot infects a computer, it:
• Takes control of the computer and neutralizes its Anti-Virus defenses. It is not easy to find bots
on your computer, they hide and change how they look to Anti-Virus software.
• Connects to a C&C (Command and Control center) for instructions from cyber criminals. The
cyber criminals, or bot herders, can remotely control it and instruct it to do illegal activities
without your knowledge. Your computer can do one or more of these activities:
• Steal data (personal, financial, intellectual property, organizational)
• Send spam
• Attack resources (Denial of Service Attacks)
• Consume network bandwidth and reduce productivity
One bot can often create multiple threats. Bots are frequently used as part of Advanced
Persistent Threats (APTs) where cyber criminals try to damage individuals or organizations.
The Anti-Bot Software Blade detects and prevents these bot and botnet threats. A botnet is a
collection of compromised and infected computers.
The Anti-Bot Software Blade uses these procedures to identify bot infected computers:
• Identify the C&C addresses used by criminals to control bots
These web sites are constantly changing and new sites are added on an hourly basis. Bots can
attempt to connect to thousands of potentially dangerous sites. It is a challenge to know which
sites are legitimate and which are not.
• Identify the communication patterns used by each botnet family
These communication fingerprints are different for each family and can be used to identify a
botnet family. Research is done for each botnet family to identify the unique language that it
uses. There are thousands of existing different botnet families and new ones are constantly
emerging.
• Identify bot behavior
Identify specified actions for a bot such as, when the computer sends spam or participates in
DoS attacks.
After the discovery of bot infected machines, the Anti-Bot Software Blade blocks outbound
communication to C&C sites based on the Rule Base. This neutralizes the threat and makes sure
that no sensitive information is sent out.
Anti-Virus
Malware is a major threat to network operations that has become increasingly dangerous and
sophisticated. Examples include worms, blended threats (combinations of malicious code and
vulnerabilities for infection and dissemination) and trojans.
The Anti-Virus Software Blade scans incoming and outgoing files to detect and prevent these
threats, and provides pre-infection protection from malware contained in these files. The
Anti-Virus blade is also supported by the Threat Prevention API.
The Anti-Virus Software Blade:
• Identifies malware in the organization using the ThreatSpect engine and ThreatCloud
repository:
• Prevents malware infections from incoming malicious files types (Word, Excel, PowerPoint,
PDF, etc.) in real-time. Incoming files are classified on the gateway and the result is then
sent to the ThreatCloud repository for comparison against known malicious files, with
almost no impact on performance.
• Prevents malware download from the internet by preventing access to sites that are known
to be connected to malware. Accessed URLs are checked by the gateway caching
mechanisms or sent to the ThreatCloud repository to determine if they are permissible or
not. If not, the attempt is stopped before any damage can take place.
• Uses the ThreatCloud repository to receive binary signature updates and query the repository
for URL reputation and Anti-Virus classification.
SandBlast
Cyber-threats continue to multiply and now it is easier than ever for criminals to create new
malware that can easily bypass existing protections. On a daily basis, these criminals can change
the malware signature and make it virtually impossible for signature-based products to protect
networks against infection. To get ahead, enterprises need a multi-faceted prevention strategy
that combines proactive protection that eliminates threats before they reach users. With Check
Point's Threat Emulation and Threat Extraction technologies, SandBlast provides zero-day
protection against unknown threats that cannot be identified by signature-based technologies.
Threat Emulation
Threat Emulation gives networks the necessary protection against unknown threats in web
downloads and e-mail attachments. The Threat Emulation engine picks up malware at the exploit
phase, before it enters the network. It quickly quarantines and runs the files in a virtual sandbox,
which imitates a standard operating system, to discover malicious behavior before hackers can
apply evasion techniques to bypass the sandbox.
Threat Emulation receives files through these methods of delivery:
• E-mail attachments transferred using the SMTP or SMTPS protocols.
• Web downloads.
• Files sent to Threat Emulation through the Threat Prevention API.
• Files transferred using FTP and SMB protocols
• E-mail attachments transferred using the IMAP protocol.
Threat Extraction
Threat Extraction is supported on R77.30 and higher.
The Threat Extraction blade extracts potentially malicious content from files before they enter the
corporate network. To remove possible threats, the Threat Extraction does one of these two
actions:
• Extracts exploitable content out of the file, or
• Creates a safe copy of the file by converting it to PDF
Threat Extraction receives files through these methods of delivery:
• E-mail attachments received through the Mail transfer Agent (on page 233).
• Web downloads (on page 233).
• Files sent to Threat Extraction through the Threat Prevention API.
Threat Extraction delivers the reconstructed file to users and blocks access to the original
suspicious version, while Threat Emulation analyzes the file in the background. This way, users
have immediate access to content, and can be confident they are protected from the most
advanced malware and zero-day threats.
Threat Emulation runs in parallel to Threat Extraction for version R80.10 and higher.
Here are examples for exploitable content in Microsoft Office Suite Applications and PDF files:
• Queries to databases where the query contains a password in the clear
• Embedded objects
• Macros and JavaScript code that can be exploited to propagate viruses
• Hyperlinks to sensitive information
• Custom properties with sensitive information
• Automatic saves that keep archives of deleted data
• Sensitive document statistics such as owner, creation and modification dates
• Summary properties
• PDF documents with:
• Actions such as launch, sound, or movie URIs
• JavaScript actions that run code in the reader's Java interpreter
• Submit actions that transmit the values of selected fields in a form to a specified URL
• Incremental updates that keep earlier versions of the document
• Document statistics that show creation and modification dates and changes to hyperlinks
• Summarized lists of properties
Analyzing Threats
Networks today are more exposed to cyber-threats than ever. This creates a challenge for
organizations in understanding the security threats and assessing damage.
SmartConsole helps the security administrator find the cause of cyber-threats, and remediate the
network.
The Logs & Monitor > Logs view presents the threats as logs.
The other views in the Logs & Monitor view combine logs into meaningful security events. For
example, malicious activity that occurred on a host in the network, in a selected time interval (the
last hour, day, week or month). They also show pre- and post-infections statistics.
You can create rich and customizable views and reports for log and event monitoring, which
inform key stakeholders about security activities. For each log or event, you can see a lot of useful
information from the ThreatWiki and IPS Advisories about the malware, the virus or the attack.
Notes:
• The Optimized (on page 213) profile is installed by default.
• The Protection/Site column is used only for protection exceptions.
Configuring LDAP
If you use LDAP for user authentication, you must activate User Directory for Security Gateways.
Introducing Profiles
Check Point Threat Prevention provides instant protection based on pre-defined Threat Prevention
Profiles. You can also configure a custom Threat Prevention profile to give the exact level of
protection that the organization needs.
When you install a Threat Prevention policy on the Security Gateways, they immediately begin to
enforce IPS protection on network traffic.
A Threat Prevention profile determines which protections are activated, and which Software
Blades are enabled for the specified rule or policy. The protections that the profile activates
depend on the:
• Performance impact of the protection.
• Severity of the threat.
• Confidence that a protection can correctly identify an attack.
• Settings that are specific to the Software Blade.
A Threat Prevention profile applies to one or more of the Threat Prevention Software Blades: IPS,
Anti-Bot, Anti-Virus, Threat Emulation and Threat Extraction.
Predefined Rule
When you enable one of the Threat Prevention Software Blades, a predefined rule is added to the
Rule Base. The rule defines that all traffic for all network objects, regardless of who opened the
connection, (the protected scope value equals any) is inspected for all protections according to the
optimized profile. By default, logs are generated and the rule is installed on all Security Gateways
that use a Threat Prevention Software Blade.
The result of this rule (according to the Optimized profile) is that:
• All protections that can identify an attack with a high or medium confidence level, have a
medium or lower performance impact, and a medium or above severity are set to Prevent
mode.
• All protections that can identify an attack with a low confidence level, have a medium or lower
performance impact, and a medium or above severity, are set to Detect mode.
Use the Logs & Monitor page to show logs related to Threat Prevention traffic. Use the data there
to better understand the use of these Software Blades in your environment and create an effective
Rule Base. You can also directly update the Rule Base from this page.
You can add more exceptions that prevent or detect specified protections or have different
tracking settings.
Example 1
Data Center Layer Corporate LAN Layer
Rule matched Rule 3 Rule 1
Profile action Prevent Detect
Example 2
Data Center Layer Corporate LAN Layer
Rule matched Rule 3 Rule 1
Profile action Prevent Detect
Exception for protection X Inactive -
Example 3
Data Center Layer Corporate LAN Layer
Exception is prior to override and profile action. Therefore, the action for the Data Center Layer is
Inactive.
The action for the Corporate LAN Layer is Detect.
Enforced action for protection X: Detect.
Example 4
Data Center Layer Corporate LAN Layer
Rule matched Rule 3 Rule 1
Profile action Deep Scan all files Process specific file type families: Inspect doc files
and Drop rtf files.
Enforced action: Deep Scan doc files and Drop rtf files.
Example 5
MIME nesting level and Maximum archive scanning time
The strictest action is:
Block combined with the minimum nesting level/scanning time, or
Allow combined with the maximum nesting level/scanning time, or
If both Block and Allow are matched, the enforced action is Block.
Example 6
UserCheck
Create and manage the policy for the Threat Prevention Software Blade as part of the Threat
Prevention Policy.
• The Threat Prevention page shows the rules and exceptions for the Threat Prevention policy.
The rules set the Threat profiles for the network objects or locations defined as a protected
scope.
Click the Add Rule button to get started.
• You can configure the Threat Prevention settings in the Threat Prevention profile for the
specified rule.
• To learn about bots and protections, look through the ThreatWiki.
Best Practice - Disable a rule when you work on it. Enable the rule when you want to use it.
Disabled rules do not affect the performance of the Gateway. To disable a rule, right click in the
No. column of the rule and select Disable.
Use Case
The configuration in the Mail page lets you block or allow malicious emails. However, you do not
want to configure a global decision regarding all malicious emails. You prefer to make a decision
per each email separately, on a case-by-case basis. For that purpose, you need to create a system
in which Threat Emulation allows the emails, but does not send them to the recipient right away.
Instead, it puts them in a container where you can check them and then decide whether to block or
allow them.
subject and Add customized text to the email body, change the email, and therefore must be
cleared.
6. Click OK.
7. Install Policy.
In the Next Hop:
1. Configure a rule which quarantines all emails which were marked with an X-Header by the
MTA.
You can now see the emails in the Next Hop in their original forms and examine them. After you
examine the emails in the Next Hop, you can decide whether to allow or block them.
Exceptions
You can exclude specific email addresses from the Threat Emulation or Threat Extraction
protections.
MIME Nesting
This is an optional configuration. In this section, you can configure the maximum number of MIME
nesting levels to be scanned (A nesting level is an email within an email). These settings are the
same for Anti-Virus, Threat Emulation and Threat Extraction.
• Maximum MIME nesting is (levels) - Set the maximum number of levels in the email which the
engine scans.
• When nesting level is exceeded (action on file) - If there are more MIME nested levels than
the configured amount, select to Block or Allow the email.
Updates
There are numerous protections available in IPS. It takes time to become familiar with those that
are relevant to your environment. Some are easily configured for basic security and can be safely
activated automatically.
In the Threat Prevention profile, you can configure an updates policy for IPS protections that were
newly updated. You can do this with the IPS > Updates page in the Profiles navigation tree. Select
one of these settings for Newly Updated Protections:
• Active - According to profile settings - Selected by default. Protections are activated
according to the settings in the General page of the Profile. This is the Check Point
recommended configuration.
Set activation as staging mode - Newly updated protections remain in staging mode until you
change their configuration. The default action for protections in staging mode is Detect. You
can change the action manually in the IPS Protections page.
Click Configure to exclude specific protections from staging mode.
• Inactive - Newly updated protections are not activated
Best Practice - In the beginning, allow IPS to activate protections based on the IPS policy. During
this time, you can analyze the alerts that IPS generates and how it handles network traffic, while
you minimize the impact on the flow of traffic. Then you can manually change the protection
settings to suit your needs.
Pre-R80 Settings
The Pre-R80 Settings are relevant for the pre-R80 gateways only.
Protections Activation
Activate protections of the following types:
• Client Protections - Select to activate protections that protect only clients (for example,
personal computers).
• Server Protections - Select to activate protections that protect only servers.
If a network has only clients or only servers, you can enhance gateway performance by
deactivation of protections. If you select Client Protections and Server Protections, all
protections are activated, except for those that are:
• Excluded by the options selected here
• Application Controls or Engine Settings
• Defined as Performance Impact — Critical
Excluded Protections Categories
Do not activate protections of the following categories - The IPS protection categories you select
here are not automatically activated. They are excluded from the Threat Prevention policy rule
that has this profile in the action of the Rule Base.
Blocking Viruses
To block viruses and malware in your organization:
1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.
2. In the General Properties page, select the Anti-Virus Software Blade.
The First Time Activation window opens.
3. Select According to the Anti-Bot and Anti-Virus policy and click OK.
4. Close the gateway Properties window and publish the changes.
5. Click Security Policies > Threat Prevention > Policy > Threat Prevention.
6. Click Add Rule.
A new rule is added to the Threat Prevention policy. The Software Blade applies the first rule
that matches the traffic.
7. Make a rule that includes these components:
• Name - Give the rule a name such as Block Virus Activity.
• Protected Scope - The list of network objects you want to protect. In this example, the Any
network object is used.
• Action - The Profile that contains the protection settings you want. The default profile is
Optimized.
• Track - The type of log you want to get when detecting malware on this scope. In this
example, keep Log and also select Packet Capture to capture the packets of malicious
activity. You will then be able to view the actual packets in SmartConsole > Logs & Monitor
> Logs.
• Install On - Keep it as All or choose specified gateways to install the rule on.
8. Install the Threat Prevention policy.
Blocking Bots
To block bots in your organization, install this default Threat Policy rule that uses the Optimized
profile, or create a new rule.
UserCheck Settings:
• Prevent - Select the UserCheck message that opens for a Prevent action
• Ask - Select the UserCheck message that opens for an Ask action
Protected Scope:
Select an interface type and traffic direction option:
• Inspect incoming files from the following interfaces:
Sends only incoming files from the specified interface type for inspection. Outgoing files are
not inspected. Select an interface type from the list:
• External - Inspect incoming files from external interfaces. Files from the DMZ and internal
interfaces are not inspected.
• External and DMZ - Inspect incoming files from external and DMZ interfaces. Files from
internal interfaces are not inspected.
• All - Inspect all incoming files from all interface types.
• Inspect incoming and outgoing files - Sends all incoming and outgoing files for inspection.
Protocols
Protocols to be emulated:
• HTTP
• FTP
• Mail (SMTP) - Click Mail to configure the SMTP traffic inspection by the Threat Emulation
blade. This links you to the Mail (on page 219) page of the Profile settings.
File Types
Here you can configure the Threat Emulation Action and Emulation Location for each file type
scanned by the Threat Emulation blade. Select one of these:
• Process all enabled file types - This option is selected by default. Click the blue link to see the
list of supported file types. Out of the supported file types, select the files to be scanned by the
Threat Emulation blade.
Note - you can find this list of supported file types also in Manage & Settings view > Blades >
Threat Prevention > Advanced Settings > Threat Emulation > File Type Support.
• Process specific file type families - Click Configure to change the action or emulation location
for the scanned file types.
To change the emulation action for a file type, click the applicable action in the Action column
and select one of these options:
• Inspect - The Threat Emulation blade scans these files.
• Bypass - Files of this type are considered safe and the Software Blade does not do
emulation for them.
To change the emulation location for a file type, click Emulation Location and select one of
these options:
• According to gateway - The Emulation Location is according to the settings defined in the
Gateway Properties window of each gateway.
• Locally - Emulation for these file types is done on the gateway.
• ThreatCloud - These file types are sent to the ThreatCloud for emulation.
Archives
Block archives containing these prohibited file types. Click Configure to select the prohibited file
types. If a prohibited file type is in an archive, the gateway drops the archive.
Emulation Environment
You can use the Emulation Environment window to configure the emulation location and images
that are used for this profile:
• The Analysis Locations section lets you select where the emulation is done
• To use the Security Gateway settings for the location of the virtual environment, click
According to the gateway.
• To configure the profile to use a different location of the virtual environment, click Specify
and select the applicable option.
Note - In the Remote Emulation Appliances option, for R80.10 gateways with Jumbo Hotfix
and R80.20 gateways, you can select multiple appliances for remote emulation. For older
gateways, you can select only one appliance for remote emulation.
• The Environments section lets you select the operating system images on which the emulation
is run. If the images defined in the profile and the Security Gateway or Emulation appliance are
different, the profile settings are used.
These are the options to select the emulation images:
• To use the emulation environments recommended by Check Point security analysts, click
Use Check Point recommended emulation environments
• To select other images for emulation, that are closest to the operating systems for the
computers in your organization, click Use the following emulation environments
Best Practice - For configurations that use Hold mode for SMTP traffic, we recommend that
you use an MTA deployment.
If you use the Prevent action, a file that Threat Emulation already identified as malware is
blocked. Users cannot get the file even in Background mode.
• Static Analysis optimizes file analysis by doing an initial analysis on files. If the analysis finds
that the file is simple and cannot contain malicious code, the file is sent to the destination
without additional emulation. Static analysis significantly reduces the number of files that are
sent for emulation. If you disable it, you increase the percentage of files that are sent for full
emulation. The Security Gateways do static analysis by default, and you have the option to
disable it.
• Logging lets you configure the system to generate logs for each file after emulation is
complete.
UserCheck Settings
• Allow the user to access the original file
• Allow access to original files that are not malicious according to Threat Emulation
Note - This option is only configurable when the Threat Emulation blade is activated in the
General Properties pane of the profile.
• UserCheck Message
Select a message to show the user when the user receives the clean file. In this message, the
user selects if they want to download the original file or not. To select the success or
cancelation messages of the file download, go to Manage & Settings > Blades > Threat
Prevention > Advanced Settings > UserCheck. You can create or edit UserCheck messages on
the UserCheck page. You can customize a UserCheck message only for SMTP files. For HTTP
files (supported on R80.30 gateways and above), the message which the user gets is not
customizable in SmartConsole. You can only customize it on the gateway.
• Optional: To give the user access to the original email, you can add the Send Original Mail
field in the Threat Extraction Success Page. Go to Threat Prevention > Threat Tools >
UserCheck > Threat Extraction Success Page > Right-click > Clone > Click inside the
message > Insert Field > Select Send Original Mail.
Send Original Mail is added to the message body.
Protocol
• Web (HTTP/HTTPS) - Supported from R80.30 gateways and above. To allow web support,
enable HTTPS Inspection. By default, Threat Extraction web support works on these standard
ports: HTTP - Port 80, HTTPS - Port 443, HTTPS Proxy - 8080.
To enable web support on other ports, create a new TCP service. In General > Protocol select
HTTP, and in Match By, select Customize and enter the required port number.
Notes:
• After a file is scanned by the Threat Extraction blade, the user receives a message on the
action that was done on the file. To customize the message, see sk142852
http://supportcontent.checkpoint.com/solutions?id=sk142852.
• Threat Extraction web support applies to web downloads, but not web uploads.
• Mail (SMTP) - Click Mail to configure the SMTP traffic inspection by the Threat Extraction
blade. This links you to the Mail (on page 219) page of the Profile settings.
For information on storage of the original files, see Storage of Original Files.
Extraction Method
• Extract potentially malicious parts from files - Selected by default
Click Configure to select which malicious parts the blade extracts. For example, macros,
JavaScript, images and so on.
• Convert to PDF - Converts the file to PDF, and keeps text and formatting. Best Practice - If
you use PDFs in right-to-left languages or Asian fonts, preferably select Extract files from
potential malicious parts to make sure that these files are processed correctly.
Extraction Settings
• Process all files - selected by default
• Process malicious files when the confidence level is:
Set a low, medium or high confidence level. This option is only configurable when the Threat
Emulation blade is activated in the General Properties pane of the profile.
File Types
• Process all enabled file types - This option is selected by default. Click the blue link to see the
list of supported file types. Out of the supported file types, select the files to be scanned by the
Threat Extraction blade.
Note - you can find this list of supported file types also in Manage & Settings view > Blades >
Threat Prevention > Advanced Settings > Threat Extraction > Configure File Type Support.
• Process specific file type families -
Here you can configure a different extraction method for certain file types. Click Configure to
see the list of enabled file types and their extraction methods. To change the extraction
method for a file type, right-click the file type and select: bypass, clean or convert to pdf. You
can select a different extraction method for Mail and Web.
Notes:
• Supported file types for web are: Word, Excel, PowerPoint and PDF.
For e-mail attachments:
• For jpg, bmp, png, gif, and tiff files - Threat Extraction supports only extraction of potentially
malicious content.
• For hwp, jtd, eps, files - Threat Extraction supports only conversion to pdf.
• For Microsoft Office and PDF files and all other file types on the list - Threat Extraction
supports both extraction of potentially malicious content and conversion to pdf.
• You can also configure supported file types in the configuration file. For explanation, see
sk112240 http://supportcontent.checkpoint.com/solutions?id=sk112240.
Exception Rules
If necessary, you can add an exception directly to a rule. An exception sets a different Action to an
object in the Protected Scope from the Action specified Threat Prevention rule. In general,
exceptions are designed to give you the option to reduce the level of enforcement of a specific
protection and not to increase it. For example: The Research and Development (R&D) network
protections are included in a profile with the Prevent action. You can define an exception which
sets the specific R&D network to Detect. For some Anti-Bot and IPS signatures only, you can
define exceptions which are stricter than the profile action.
You can add one or more exceptions to a rule. The exception is added as a shaded row below the
rule in the Rule Base. It is identified in the No. column with the rule's number plus the letter E and
a digit that represents the exception number. For example, if you add two exceptions to rule
number 1, two lines will be added and show in the Rule Base as E-1.1 and E-1.2.
You can use exception groups to group exceptions that you want to use in more than one rule. See
the Exceptions Groups Pane.
You can expand or collapse the rule exceptions by clicking on the minus or plus sign next to the
rule number in the No. column.
Blade Exceptions
You can also configure an exception for an entire blade.
RADIUS
Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that
provides security and scalability by separating the authentication function from the access server.
Using RADIUS, the Security Gateway forwards authentication requests by remote users to the
RADIUS server. For administrators, the Security Management Server forwards the authentication
requests. The RADIUS server, which stores user account information, does the authentication.
The RADIUS protocol uses UDP to communicate with the gateway or the Security Management
Server.
RADIUS servers and RADIUS server group objects are defined in SmartConsole.
SecurID
SecurID requires users to both possess a token authenticator and to supply a PIN or password.
Token authenticators generate one-time passwords that are synchronized to an RSA ACE/server
and may come in the form of hardware or software. Hardware tokens are key-ring or credit
card-sized devices, while software tokens reside on the PC or device from which the user wants to
authenticate. All tokens generate a random, one-time use access code that changes
approximately every minute. When a user attempts to authenticate to a protected resource, the
one-time use code must be validated by the ACE/server.
Using SecurID, the Security Gateway forwards authentication requests by remote users to the
ACE/server. For administrators, it is the Security Management Server that forwards the requests.
ACE manages the database of RSA users and their assigned hard or soft tokens. The gateway or
the Security Management Server act as an ACE/Agent 5.0 and direct all access requests to the
RSA ACE/server for authentication. For additional information on agent configuration, refer to
ACE/server documentation.
There are no specific parameters required for the SecurID authentication method.
TACACS
Terminal Access Controller Access Control System (TACACS) provides access control for routers,
network access servers and other networked devices through one or more centralized servers.
TACACS is an external authentication method that provides verification services. Using TACACS,
the Security Gateway forwards authentication requests by remote users to the TACACS server. For
administrators, it is the Security Management Server that forwards the requests. The TACACS
server, which stores user account information, authenticates users. The system supports physical
card key devices or token cards and Kerberos secret key authentication. TACACS encrypts the
user name, password, authentication services and accounting information of all authentication
requests to ensure secure communication.
User Database
Users defined in SmartConsole are saved to the User Database on the Security Management
Server, together with the user authentication schemes and encryption keys. Then, the user
database is installed on Security Gateways and Check Point hosts:
• On Security Gateways - When the policy is installed (Install Policy)
• On Check Point hosts with an active Management blade (such as Log Server) - When the
database is installed (Install Database)
The user database does not contain information about users defined elsewhere than on the
Security Management Server (such as users in external User Directory groups), but it does contain
information about the external groups themselves (for example, on which Account Unit the
external group is defined). Changes to external groups take effect only after the policy is installed,
or the user database is downloaded from the management server.
To configure encryption:
1. Open the User Properties window > Encryption page.
2. Select an encryption method for the user.
3. Click Edit.
The encryption Properties window opens.
The next steps are for IKE Phase 2. The options can be different for different methods.
4. Open the Authentication tab.
5. Select the authentication schemes:
a) Password - The user authenticates with a pre-shared secret password. Enter and confirm
the password.
b) Public Key - The user authenticates with a public key contained in a certificate file.
6. Click OK.
7. Click OK.
Delete a User
To delete a user:
1. In the object tree, click Users > Users.
2. Right-click the account and select Delete.
The confirmation window opens.
3. Click Yes.
In This Section
Schema Checking .......................................................................................................255
OID Proprietary Attributes .........................................................................................255
User Directory Schema Attributes.............................................................................256
Netscape LDAP Schema ............................................................................................262
Schema Checking
When schema checking is enabled, User Directory requires that every Check Point object class
and its associated attributes is defined in the directory schema.
Before you work with User Directory, make sure that schema checking is disabled. Otherwise the
integration will fail. After the Check Point object classes and attributes are applied to the User
Directory server's schema, you must enable schema checking again.
The OIDs for the proprietary attributes begin with the same prefix ("1.3.114.7.4.2.0.X"). Only the
value of "X" is different for each attribute. See Attributes (on page 256) for the value of "X".
cn
The entry's name. This is also referred to as "Common Name". For users this can be different
from the uid attribute, the name used to login to the Security Gateway. This attribute is also used
to build the User Directory entry's distinguished name, that is, it is the RDN of the DN.
uid
The user's login name, that is, the name used to login to the Security Gateway. This attribute is
passed to the external authentication system in all authentication methods except for "Internal
Password", and must be defined for all these authentication methods.
The login name is used by the Security Management Server to search the User Directory server(s).
For this reason, each user entry should have its own unique uid value.
It is also possible to login to the Security Gateway using the full DN. The DN can be used when
there is an ambiguity with this attribute or in "Internal Password" when this attribute may be
missing. The DN can also be used when the same user (with the same uid) is defined in more than
one Account Unit on different User Directory servers.
description
Descriptive text about the user.
default
"no value"
mail
User's email address.
default
"no value"
member
An entry can have zero or more values for this attribute.
• In a template: The DN of user entries using this template. DNs that are not users (object
classes that are not one of: "person", "organizationalPerson", "inetOrgPerson" or
"fw1person") are ignored.
• In a group: The DN of user.
userPassword
Must be given if the authentication method (fw1auth-method) is "Internal Password". The value
can be hashed using "crypt". In this case the syntax of this attribute is:
"{crypt}xxyyyyyyyyyyy"
where "xx" is the "salt" and "yyyyyyyyyyy" is the hashed password.
It is possible (but not recommended) to store the password without hashing. However, if hashing
is specified in the User Directory server, you should not specify hashing here, in order to prevent
the password from being hashed twice. You should also use SSL in this case, to prevent sending
an unencrypted password.
The Security Gateway never reads this attribute, though it does write it. Instead, the User Directory
bind operation is used to verify a password.
fw1authmethod
One of these:
RADIUS, TACACS, SecurID, OS Password, Defender
This default value for this attribute is overridden by Default authentication scheme in the
Authentication tab of the Account Unit window in SmartConsole. For example: a User Directory
server can contain User Directory entries that are all of the object-class "person" even though the
proprietary object-class "fw1person" was not added to the server's schema. If Default
authentication scheme in SmartConsole is "Internal Password", all the users will be
authenticated using the password stored in the "userPassword" attribute.
fw1authserver
"X" in OID fw1person fw1template default
1 y y "undefined"
The name of the server that will do the authentication. This field must be given if fw1auth-method
is "RADIUS" or "TACACS". For all other values of fw1auth-method, it is ignored. Its meaning is
given below:
method meaning
RADIUS name of a RADIUS server, a group of RADIUS servers, or "Any"
TACACS name of a TACACS server
fw1pwdLastMod
The date on which the password was last modified. The format is yyyymmdd (for example, 20
August 1998 is 19980820). A password can be modified through the Security Gateway as a part of
the authentication process.
fw1expiration-date
The last date on which the user can login to a Security Gateway, or "no value" if there is no
expiration date. The format is yyyymmdd (for example, 20 August 1998 is 19980820). The default is
"no value".
fw1hour-range-from
The time from which the user can login to a Security Gateway. The format is hh:mm (for example,
8:15 AM is 08:15).
fw1hour-range-to
The time until which the user can login to a Security Gateway. The format is hh:mm (for example,
8:15 AM is 08:15).
fw1day
The days on which the user can login to a Security Gateway. Can have the values "SUN","MON",
and so on.
fw1allowed-src
The names of one or more network objects from which the user can run a client, or "Any" to
remove this limitation, or "no value" if there is no such client. The names should match the name
of network objects defined in Security Management server.
fw1allowed-dst
The names of one or more network objects which the user can access, or "Any" to remove this
limitation, or "no value" if there is no such network object. The names should match the name of
network objects defined on the Security Management server.
fw1allowed-vlan
Not currently used.
fw1SR-keym
The algorithm used to encrypt the session key in SecuRemote. Can be "CLEAR", "FWZ1", "DES" or
"Any".
fw1SR-datam
The algorithm used to encrypt the data in SecuRemote. Can be "CLEAR", "FWZ1", "DES" or "Any".
fw1SR-mdm
The algorithm used to sign the data in SecuRemote. Can be "none" or "MD5".
fw1enc-fwz-expiration
The number of minutes after which a SecuRemote user must re-authenticate himself or herself to
the Security Gateway.
fw1sr-auth-track
The exception to generate on successful authentication via SecuRemote. Can be "none", "cryptlog"
or "cryptalert".
fw1groupTemplate
This flag is used to resolve a problem related to group membership.
The group membership of a user is stored in the group entries to which it belongs, in the user
entry itself, or in both entries. Therefore there is no clear indication in the user entry if information
from the template about group relationship should be used.
If this flag is "TRUE", then the user is taken to be a member of all the groups to which the
template is a member. This is in addition to all the groups in which the user is directly a member.
fw1ISAKMP-EncMethod
The key encryption methods for SecuRemote users using IKE. This can be one or more of: "DES",
"3DES". A user using IKE (formerly known as ISAMP) may have both methods defined.
fw1ISAKMP-AuthMethods
The allowed authentication methods for SecuRemote users using IKE, (formerly known as ISAMP).
This can be one or more of: "preshared", "signatures".
fw1ISAKMP-HashMethods
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one or more of: "MD5", "SHA1". A user using IKE must have both methods defined.
fw1ISAKMP-Transform
The IPSec Transform method for SecuRemote users using IKE, (formerly known as ISAMP). This
can be one of: "AH", "ESP".
fw1ISAKMP-DataIntegrityMethod
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can
be one of: "MD5", "SHA1".
fw1ISAKMP-SharedSecret
The pre-shared secret for SecuRemote users using IKE, (formerly known as ISAMP).
The value can be calculated using the fw ikecrypt command line.
fw1ISAKMP-DataEncMethod
The data encryption method for SecuRemote users using IKE, (formerly known as ISAMP).
fw1enc-Methods
The encryption method allowed for SecuRemote users. This can be one or more of: "FWZ",
"ISAKMP" (meaning IKE).
fw1userPwdPolicy
Defines when and by whom the password should and can be changed.
fw1badPwdCount
Number of allowed wrong passwords entered sequentially.
fw1lastLoginFailure
Time of the last login failure.
memberof template
DN of the template that the user is a member of.
Important - This deletes the objectclass definition from the schema and adds the
updated one in its place.
We recommend that you back up the User Directory server before you run the command.
The ldif file:
• Adds the new attributes to the schema
• Deletes old definitions of fw1person and fw1template
• Adds new definitions of fw1person and fw1template
To change the Netscape LDAP schema, run the ldapmodify command with the schema.ldif file.
On some server versions, the delete objectclass operation can return an error, even if it was
successful. Use ldapmodify with the -c (continuous) option.
To apply a profile:
1.
Open the Account Unit.
2. Select the profile.
To change a profile:
1.
Create a new profile.
2. Copy the settings of a User Directory profile into the new profile.
3. Change the values.
Profile Attributes
Attributes:
UserLoginAttr .............................................................................................................267
UserPasswordAttr ......................................................................................................267
TemplateObjectClass .................................................................................................267
ExpirationDateAttr ......................................................................................................267
ExpirationDateFormat ................................................................................................267
PsswdDateFormat ......................................................................................................267
PsswdDateAttr ............................................................................................................267
BadPwdCountAttr .......................................................................................................268
ClientSideCrypt ...........................................................................................................268
DefaultCryptAlgorith ..................................................................................................268
CryptedPasswordPrefix..............................................................................................268
PhoneNumberAttr ......................................................................................................268
AttributesTranslationMap ..........................................................................................268
ListOfAttrsToAvoid ......................................................................................................269
BranchObjectClass .....................................................................................................269
BranchOCOperator .....................................................................................................269
OrganizationObjectClass ............................................................................................269
OrgUnitObjectClass ....................................................................................................269
DomainObjectClass ....................................................................................................269
UserObjectClass .........................................................................................................270
UserOCOperator .........................................................................................................270
GroupObjectClass .......................................................................................................270
GroupOCOperator .......................................................................................................270
UserMembershipAttr..................................................................................................271
TemplateMembership ................................................................................................271
TemplateMembershipAttr ..........................................................................................271
UserTemplateMembershipAttr ..................................................................................271
OrganizationRDN ........................................................................................................271
OrgUnitRDN ................................................................................................................271
UserRDN .....................................................................................................................271
GroupRDN ...................................................................................................................272
DomainRDN ................................................................................................................272
AutomaticAttrs ............................................................................................................272
GroupObjectClass .......................................................................................................272
OrgUnitObjectClass ....................................................................................................272
OrganizationObjectClass ............................................................................................272
UserObjectClass .........................................................................................................273
DomainObjectClass ....................................................................................................273
UserLoginAttr
The unique username User Directory attribute (uid). In addition, when fetching users by the
username, this attribute is used for query.
default Other
• uid (most servers) One value allowed
default Other
• userPassword (most servers) One value allowed
default Other
fw1template Multiple values allowed
ExpirationDateAttr
The account expiration date is User Directory attribute. This could be a Check Point extended
attribute or an existing attribute.
default Other
• fw1expiration-date (most servers) One value allowed
default Other
CP format is yyyymmdd One value allowed
PsswdDateFormat
The format of the password modified date is User Directory attribute. This formation will be
applied to the value defined at PsswdDateAttr.
default Other
• CP (most servers) format is yyyymmdd One value allowed
• MS (in Microsoft_AD)
PsswdDateAttr
The password last modified date is User Directory attribute.
default Other
• fw1pwdLastMod (most servers) One value allowed
default Other
fw1BadPwdCount One value allowed
ClientSideCrypt
If 0, the sent password will not be encrypted. If 1, the sent password will be encrypted with the
algorithm specified in the DefaultCryptAlgorithm.
default Other
• 0 for most servers One value allowed
• 1 for Netscape_DS
if not using encrypted password, SSL is recommended
DefaultCryptAlgorith
The algorithm used to encrypt a password before updating the User Directory server with a new
password.
default Other
• Plain (for most servers) One value allowed
default Other
{Crypt} (for Netscape_DS) One value allowed
PhoneNumberAttr
User Directory attribute to store and read the user phone number.
default Other
internationalisednumber One value allowed
AttributesTranslationMap
General purpose attribute translation map, to resolve problems related to peculiarities of different
server types. For example, an X.500 server does not allow the "-" character in an attribute name.
To enable the Check Point attributes containing "-", specify a translation entry: (e.g.,
"fw1-expiration =fw1expiration").
default Other
none Multiple values allowed
ListOfAttrsToAvoid
All attribute names listed here will be removed from the default list of attributes included in
read/write operations. This is most useful in cases where these attributes are not supported by
the User Directory server schema, which might fail the entire operation. This is especially relevant
when the User Directory server schema is not extended with the Check Point schema extension.
Default Other
There are no values by default. In case the User Multiple values allowed
Directory server was not extended by the Check
Point schema, the best thing to do is to list here all
the new Check Point schema attributes.
BranchObjectClass
Use this attribute to define which type of objects (objectclass) is queried when the object tree
branches are displayed after the Account Unit is opened in SmartConsole.
Default Other
• Organization OrganizationalUnit Domain (most Multiple values allowed
servers)
• Container (extra for Microsoft_AD)
BranchOCOperator
If One is set, an ORed query will be sent and every object that matches the criteria will be
displayed as a branch. If All, an ANDed query will be sent and only objects of all types will be
displayed.
Default Other
One One value allowed
OrganizationObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new
object type specified here should also be in BranchObjectClass.
Default Other
organization Multiple values allowed
OrgUnitObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new
object type specified here should also be in BranchObjectClass.
Default Other
• organizationalUnit (most servers) Multiple values allowed
Default Other
Domain Multiple values allowed
UserObjectClass
This attribute defines what objects should be read as user objects. The user icon will be displayed
on the tree for object types specified here.
Default Other
• User (in Microsoft_AD) Multiple values allowed
• Person
OrganizationalPerson
InertOrgPerson
FW1 Person (most servers)
UserOCOperator
If 'one' is set, an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' and ANDed query will be sent and only objects of all types will be
displayed.
Default Other
One One value allowed
GroupObjectClass
This attribute defines what objects should be read as groups. The group icon will be displayed on
the tree for objects of types specified here.
Default Other
Groupofnames Multiple values allowed
Groupofuniquenames (most servers)
Group
Groupofnames (in Microsoft_AD)
GroupOCOperator
If 'one' is set an ORed query will be sent and every object that matches one of the types will be
displayed as a user. If 'all' an ANDed query will be sent and only objects of all types will be
displayed.
GroupMembership
Default Other
One One value allowed
Defines the relationship Mode between the group and its members (user or template objects)
when reading group membership.
Default Other
• Member mode defines the member DN in the Group object (most servers) One value
allowed
• MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
• Modes define member DN in Group object and group DN in Member object.
UserMembershipAttr
Defines what User Directory attribute to use when reading group membership from the user or
template object if GroupMembership mode is 'MemberOf' or 'Both' you may be required to extend
the user/template object schema in order to use this attribute.
Default Other
MemberOf One value allowed
TemplateMembership
Defines the user to template membership mode when reading user template membership
information.
Default Other
• Member mode defines the member DN in the Group object (most One value allowed
servers)
• MemberOf mode defines the group DN in the member object (in
Microsoft_AD)
TemplateMembershipAttr
Defines which attribute to use when reading the User members from the template object, as User
DNs, if the TemplateMembership mode is Member.
Default Other
member Multiple values allowed
UserTemplateMembershipAttr
Defines which attribute to use when reading from the User object the template DN associated with
the user, if the TemplateMembership mode is MemberOf.
Default Other
member Multiple values allowed
OrganizationRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when
you create a new organizational unit in SmartConsole.
Default Other
o One value allowed
OrgUnitRDN
This value is used as the attribute name in the Relatively Distinguished Name (RDN) when you
create a new organizational Unit in SmartConsole.
Default Other
ou One value allowed
UserRDN
This value is used as the attribute name in the Relatively Distinguished Name (RDN), when you
create a new User object in SmartConsole.
Default Other
cn One value allowed
GroupRDN
This value is used as the attribute name for the RDN, when you create a new Group object in
SmartConsole.
Default Other
cn One value allowed
DomainRDN
This value is used as the attribute name for the RDN, when you create a new Domain object in
SmartConsole.
Default Other
dc One value allowed
AutomaticAttrs
This field is relevant when you create objects in SmartConsole. The format of this field is
Objectclass:name:value meaning that if the object created is of type ObjectClass then
additional attributes will be included in the created object with name 'name' and value 'value'.
Default Other
user:userAccountControl:66048 Multiple values
For Microsoft_AD This means that when a user object is created an extra allowed
attribute is included automatically: userAccountControl with the value
66048
GroupObjectClass
This field is used when you modify a group in SmartConsole. The format of this field is
ObjectClass:memberattr meaning that for each group objectclass there is a group membership
attribute mapping. List here all the possible mappings for this User Directory server profile. When
a group is modified, based on the group's objectclass the right group membership mapping is
used.
Default Other
groupOfNames:member Multiple values allowed
groupOfUniqueNames:uniqueMember
(All other servers)
OrgUnitObjectClass
This determines which ObjectClass to use when creating/modifying an OrganizationalUnit object.
These values can be different from the read counterpart.
Default Other
OrganizationalUnit Multiple values allowed
OrganizationObjectClass
This determines which ObjectClass to use when creating and/or modifying an Organization object.
These values can be different from the read counterpart.
Default Other
Organization Multiple values allowed
UserObjectClass
This determines which ObjectClass to use when creating and/or modifying a user object. These
values can be different from the read counterpart.
Default Other
User (in Microsoft_AD) Multiple values allowed
person
organizationalPerson
inetOrgPerson
fw1Person
(All other servers)
DomainObjectClass
Determines which ObjectClass to use when creating and/or modifying a domain context object.
These values can be different from the read counterpart.
Default Other
Domain Multiple values allowed
Most of the user objects and group objects created by Windows 2000 tools are stored under the
CN=Users, DCROOT branch, others under CN=Builtin, DCROOT branch, but these objects can
be created under other branches as well.
The branch CN=Schema, CN=Configuration, DCROOT contains all schema definitions.
Check Point can take advantage of an existing Active Directory object as well as add new types.
For users, the existing user can be used "as is" or be extended with fw1person as an auxiliary of
"User" for full feature granularity. The existing Active Directory "Group" type is supported "as is".
A User Directory template can be created by adding the fw1template objectclass. This information
is downloaded to the directory using the schema_microsoft_ad.ldif file (see Adding New
Attributes to the Active Directory (on page 275)).
Performance
The number of queries performed on the directory server is significantly low with Active Directory.
This is achieved by having a different object relations model. The Active Directory group-related
information is stored inside the user object. Therefore, when fetching the user object no additional
query is necessary to assign the user with the group. The same is true for users and templates.
Manageability
SmartConsole allows the creation and management of existing and new objects. However, some
specific Active Directory fields are not enabled in SmartConsole.
Enforcement
It is possible to work with the existing Active Directory objects without extending the schema. This
is made possible by defining an Internal Template object and assigning it with the User Directory
Account Unit defined on the Active Directory server.
For example, if you wish to enable all users with IKE+Hybrid based on the Active Directory
passwords, create a new template with the IKE properties enabled and "Check Point password" as
the authentication method.
Delegating Control
Delegating control over the directory to a specific user or group is important since by default the
Administrator is not allowed to modify the schema or even manage directory objects through User
Directory protocol.
Query conditions:
• Attributes - Select a user attribute from the drop-down list, or enter an attribute.
• Operators - Select an operator from the drop-down list.
• Value - Enter a value to compare to the entry's attribute. Use the same type and format as the
actual user attribute. For example, if Attribute is fw1expiration-date, then Value must be in
the yyyymmdd syntax.
• Free Form - Enter your own query expression. See RFC 1558 for information about the syntax
of User Directory (LDAP) query expressions.
• Add - Appends the condition to the query (in the text box to the right of Search Method).
Example of a Query
If you create a query where:
• Attributes = mail
• Contains
• Value = Andy
The server queries the User Directory with this filter:
filter:(&(|(objectclass=fw1person)(objectclass=person)
(objectclass=organizationalPerson)(objectclass=inetOrgPerson))
(|(cn=Brad)(mail=*Andy*)))
Item Description
1 Security Gateway - Retrieves LDAP user information and CRLs
2 Internet
3 Security Gateway - Queries LDAP user information, retrieves CRLs, and does bind
operations for authentication
4 Security Management Server - Uses User Directory to manage user information
5 LDAP server - Server that holds one or more Account Units
Account Units
An Account Unit represents branches of user information on one or more LDAP servers. The
Account Unit is the interface between the LDAP servers and the Security Management Server and
Security Gateways.
You can have a number of Account Units representing one or more LDAP servers. Users are
divided among the branches of one Account Unit, or between different Account Units.
Note - When you enable the Identity Awareness and Mobile Access Software Blades,
SmartConsole opens a First Time Configuration Wizard. The Active Directory Integration window
of this wizard lets you create a new AD Account Unit. After you complete the wizard, SmartConsole
creates the AD object and Account Unit.
General Tab
These are the configuration fields in the General tab:
• Name - Name for the Account Unit
• Comment - Optional comment
• Color - Optional color associated with the Account Unit
• Profile - LDAP vendor
• Domain - Domain of the Active Directory servers, when the same user name is used in
multiple Account Units (this value is also necessary for AD Query and SSO)
• Prefix - Prefix for non-Active Directory servers, when the same user name is used in multiple
Account Units
• Account Unit usage - Select applicable options:
• CRL retrieval - The Security Management Server manages how the CA sends information
about revoked licenses to the Security Gateways
• User Management - The Security Management Server uses the user information from this
LDAP server (User Directory must be enabled on the Security Management Server)
Note - LDAP SSO (Single Sign On) is only supported for Account Unit objects that use User
Management.
• Active Directory Query - This Active Directory server is used as an Identity Awareness
source.
Note - This option is only available if the Profile is set to Microsoft_AD.
• Enable Unicode support - Encoding for LDAP user information in non-English languages
• Active Directory SSO configuration - Click to configure Kerberos SSO for Active Directory -
Domain Name, Account Name, Password, and Ticket encryption method
Configuring an LDAP Server
You can add, edit, or delete LDAP server objects.
Authentication Tab
These are the configuration fields in the Authentication tab:
• Use common group path for queries - Select to use one path for all the LDAP group objects
(only one query is necessary for the group objects)
• Allowed authentication schemes - Select one or more authentication schemes allowed to
authenticate users in this Account Unit - Check Point Password, SecurID, RADIUS, OS
Password, or TACACS
• Users' default values - The default settings for new LDAP users:
• User template - Template that you created
• Default authentication scheme - one of the authentication schemes selected in the
Allowed authentication schemes section
• Limit login failures (optional):
• Lock user's account after - Number of login failures, after which the account gets locked
• Unlock user's account after - Number of seconds, after which the locked account becomes
unlocked
• IKE pre-shared secret encryption key - Pre-shared secret key for IKE users in this Account
Unit
Item Description
1 Security Management Server. Manages user data in User Directory. It has an
Account Unit object, where the two servers are defined.
2 User Directory server replication.
3 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory
server replication (2).
4 Internet
5 Security Gateway. Queries user data and retrieves CRLs from nearest User Directory
server replication (6).
6 User Directory server replication.
Access Roles
Access role objects let you configure network access according to:
• Networks
• Users and user groups
• Computers and computer groups
• Remote access clients - will be supported with R80.x gateways
After you activate the Identity Awareness Software Blade, you can create access role objects and
use them in the Source and Destination columns of Access Control Policy rules.
Authentication Rules
To make an authentication rule:
1.
Add users to user groups.
2. Define an access role (on page 286) for networks, users and user groups, and computers and
computer groups.
3. Make the authentication rules with the access roles in the Source.
To allow your users to access their resources using their handheld devices, make sure they can
authenticate to the Gateway with client certificates.
In many organizations, the daily task of assigning and maintaining client certificates is done by a
different department than the one that maintains the Security Gateways. The computer help desk,
for example. You can create an administrator that is allowed to use SmartConsole to create client
certificates, while restricting other permissions (on page 291).
To configure client certificates, open SmartConsole and go to Security Policies > Access Control >
Access Tools > Client Certificates.
To configure the Mobile Access policy, go to Manage & Settings > Blades > Mobile Access >
Configure in SmartDashboard. The Client Certificates page in SmartConsole is a shortcut to the
SmartDashboard Mobile Access tab, Client Certificates page.
Revoking Certificates
If the status of a certificate is Pending Enrollment, after you revoke it, the certificate does not
show in the Client Certificate list.
b. Download Application - Direct users to download a Check Point App for their mobile
devices.
• Select the client device operating system:
iOS
Android
• Select the client type to download:
Capsule Workspace - An app that creates a secure container on the mobile device to
give users access to internal websites, file shares, and Exchange servers.
Capsule Connect/VPN - A full L3 tunnel app that gives users network access to all
mobile applications.
• Select which elements will be added to the mail template:
QR Code - Users scan the code with their mobile devices
HTML Link - Users tap the link on their mobile devices.
Display Text - Enter the text to show on the HTML link.
9. Click OK.
10. Optional: Click Preview in Browser to see a preview of how the email will look.
11. Click OK.
12. Publish the changes
Cloning a Template
Clone an email template to create a template that is similar to one that already exists.
Database Revisions
The Security Management architecture has built-in revisions. Each revision is a new restore point
in the database. It contains only the changes from the previous revision. Revisions therefore need
only a small amount of disk space, and are created fast. Other benefits of this architecture are:
• Fast policy verification, based on the difference between installed revisions.
• More efficient Management High Availability.
• Safe recovery from a crisis.
This diagram shows the database revisions over time:
1.
Install
2. Upgrade
3. Publish
4. Publish
5. Publish
To delete all versions of the database that are older than the selected version:
In the Manage & Settings > Revisions window, select a revision.
1.
2. Click Purge.
3. In the confirmation window that opens, click Yes.
Important - Deletion is irreversible. When you purge, that revision and older revisions are deleted
permanently.
Case Network problem after downloading a Threat Prevention update and installing it
on gateways.
Solution rom Security Policies > Threat Prevention > Threat Tools > Updates, in the
1. F
IPS section, choose an update that is known to be good.
2. Click Switch to Version.
3. Install the Threat Prevention Policy.
The Gateway gets that version of the IPS protections. Other network objects and
policies do not change.
Inspection Settings
You can configure inspection settings for the Firewall:
• Deep packet inspection settings
• Protocol parsing inspection settings
• VoIP packet inspection settings
The Security Management Server comes with two preconfigured inspection profiles for the
Firewall:
• Default Inspection
• Recommended Inspection
When you configure a Security Gateway, the Default Inspection profile is enabled for it. You can
also assign the Recommended Inspection profile to the Security Gateway, or to create a custom
profile and assign it to the Security Gateway.
To activate the Inspection Settings, install the Access Control Policy.
Note - In a pre-R80 SmartConsole, Inspection Settings are configured as IPS Protections.
To edit a setting:
In the Inspection Settings > General view, select a setting.
1.
2. Click Edit.
3. In the window that opens, select a profile, and click Edit.
The settings window opens.
4. Select the Main Action:
• Default Action - preconfigured action
• Override with Action - from the drop-down menu, select an action with which to override
the default - Accept, Drop, Inactive (the setting is not activated)
5. Configure the Logging Settings
Select Capture Packets, if you want to be able to examine packets that were blocked in Drop
rules.
6. Click OK.
7. Click Close.
For advanced configuration of SYN attacks, please see sk120476
http://supportcontent.checkpoint.com/solutions?id=sk120476.
Not communicating
Solution:
1.
Check connectivity between the servers.
2. Test SIC.
Collision or HA Conflict
More than one management server is configured as active.
Solution:
From the main SmartConsole menu, select Management High Availability.
1.
The High Availability Status window opens.
2. Use the Actions button to set one of the active servers to standby.
Warning - When this server becomes the Standby, all its data is overwritten by the active server.
Sync Error
Solution:
Do a manual sync.
To set the old Primary Management Server as the new Primary Management Server:
1.
Change the new Secondary Management Server from Standby to Active.
2. Promote the new Secondary Management Server to be the Primary Management Server.
Follow the procedure of Promoting a Secondary Management Server (on page 304) (no need to
do step 5).
3. Create the Secondary Management Server on the old Secondary Management Server with the
original IP of the old Secondary Management Server.
4. Reset SIC and connect with SIC to the Secondary Management Server.
Option Description
on Starts the ICA Management Tool (by opening port 18265)
off Stops the ICA Management Tool (by closing port 18265)
-p Changes the port used to connect to the CA (if the default
port is not being used)
-a "administrator DN" ... Sets the DNs of the administrators that will be allowed to
use the ICA Management Tool
-u "user DN" ... Sets the DNs of users allowed to use the ICA Management
Tool. An option intended for administrators with limited
privileges.
Note - If cpca_client is run without -a or -u parameters, the list of the allowed users and
administrators remains unchanged.
Connect to the ICA Management tool using a browser and HTTPS connection.
Important: Before connecting, make sure to add an administrator certificate to the browser's
store.
To do a certificate search:
In the Manage Certificates page, enter the search parameters, and click Search.
To initiate a certificate:
In the Menu pane, select Create Certificates > Initiate.
1.
2. Enter a User Name or Full DN, or click Advanced and fill in the form:
• Certificate Expiration Date - Select a date or enter the date in the format dd-mmm-yyyy
[hh:mm:ss] (the default value is two years from the date of creation)
• Registration Key Expiration Date - Select a date or enter the date in the format
dd-mmm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)
3. Click Go.
A registration key is created and show in the Results pane.
If necessary, click Send mail to user to email the registration key. The number of characters in
the email is limited to 1900.
4. The certificate becomes usable after entering the correct registration key.
To generate a certificate:
In the Menu pane, select Create Certificates > Generate.
1.
2. Enter a User Name or Full DN, or click Advanced and fill in the form:
• Certificate Expiration Date - Select a date or enter the date in the format dd-mm-yyyy
[hh:mm:ss] (the default value is two years from the date of creation)
• Registration Key Expiration Date - Select a date or enter the date in the format
dd-mm-yyyy [hh:mm:ss] (the default value is two weeks from the date of creation)
3. Enter a password.
4. Click Go.
5. Save the P12 file, and supply it to the user.
• If there is a line with the is otp_validity attribute, then the value at the next line is the
Registration Key Expiration Date.
The date is given in seconds from now.
Here is an example of an LDAP Search output:
not_after
86400
otp_validity
3600
uid=user_1,ou=People,o=intranet,dc=company,dc=com
[email protected]
<blank_line>
…
uid=…
CRL Management
By default, the CRL is valid for one week. This value can be configured. New CRLs are issued:
• When approximately 60% of the CRL validity period has passed
• Immediately following the revocation of a certificate
It is possible to recreate a specified CRL using the ICA Management Tool. The utility acts as a
recovery mechanism in the event that the CRL is deleted or corrupted. An administrator can
download a DER encoded version of the CRL using the ICA Management Tool.
CRL Modes
The ICA can issue multiple CRLs. Multiple CRLs prevent one CRL from becoming larger than 10K.
If the CRL exceeds 10K, IKE negotiations can fail when trying to open VPN tunnels.
Multiple CRLs are created by attributing each certificate issued to a specified CRL. If revoked, the
serial number of the certificate shows in the specified CRL.
The CRL Distribution Point (CRLDP) extension of the certificate contains the URL of the specified
CRL. This ensures that the correct CRL is retrieved when the certificate is validated.
CRL Operations
You can download, update, or recreate CRLs through the ICA management tool.
CA Cleanup
To clean up the CA, you must remove the expired certificates. Before you do that, make sure that
the time set on the Security Management Server is correct.
Configuring the CA
To configure the CA:
1. In the Menu pane, select Configure the CA.
2. Edit the CA data values (on page 316) as necessary.
3. In the Operations pane, select an operation:
• Apply - Save and enter the CA configuration settings.
If the values are valid, the configured settings become immediately effective. All non-valid
strings are changed to the default values.
• Cancel - Reset all values to the values in the last saved configuration.
• Restore Default - Revert the CA to its default configuration settings.
Entering the string Default in one of the attributes will also reset it to the default after
you click Configure. Values that are valid will be changed as requested, and others will
change to default values.
Management Tool Mail The text that appears in the Registration Key:
Text Format body of the message. 3 $REG_KEY
variables can be used in Expiration:
addition to the text: $EXPIRE
$REG_KEY (user's
registration key);
$EXPIRE (expiration time);
$USER (user's DN).
New CRL Mode A Boolean value describing 0 for old CRL true
the CRL mode. mode
1 for new mode
Number of certificates The number of certificates min-1 approx 700
per search page that will be displayed in max-approx 700
each page of the search
window.
Number of Digits for The number of digits of min-5 5
Serial Number certificate serial numbers. max-10