CP R80BC QoS AdminGuide
CP R80BC QoS AdminGuide
Quality of Service
Administration Guide
Classification: [Protected]
© 2016 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Check Point R80
For more about this release, see the R80 home page
http://supportcontent.checkpoint.com/solutions?id=sk108623.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Quality of Service
Pre-R80 Security Gateways with R80 Security Management Administration Guide.
Revision History
Date Description
28 March 2016 First release of this document
Contents
Important Information................................................................................................... 3
About this Guide ............................................................................................................ 5
Introduction to QoS ....................................................................................................... 6
Concurrent Sessions ................................................................................................. 6
R80 SmartConsole Toolbars ..................................................................................... 6
Opening the GUI Clients ............................................................................................ 7
Workflow ................................................................................................................... 8
Features and Benefits ............................................................................................... 8
QoS Policy Types ....................................................................................................... 9
QoS Tutorial ................................................................................................................ 11
Deployment Scenario for this Tutorial .................................................................... 11
Tutorial Workflow ................................................................................................... 12
Installing the System Components ......................................................................... 12
Creating a New QoS Policy ...................................................................................... 13
Configuring the Security Gateway ........................................................................... 13
Defining Interfaces on the Gateway ...............................................................................14
Creating and Configuring Rules .............................................................................. 15
Creating New Rules .......................................................................................................15
Changing New Rule Properties......................................................................................15
Installing a QoS Policy ............................................................................................. 16
Managing QoS.............................................................................................................. 17
Defining QoS Global Properties............................................................................... 17
Interface QoS Properties......................................................................................... 18
Working with QoS Policies ...................................................................................... 19
Creating a New QoS Policy.............................................................................................19
Opening an Existing QoS Policy......................................................................................19
Installing a QoS Policy ...................................................................................................20
Creating Rules ........................................................................................................ 20
Defining a DiffServ Class of Service ........................................................................ 21
Defining a DiffServ Class of Service Group ............................................................. 22
Configuring an Interface for DiffServ ...................................................................... 22
Defining a Low Latency Class.................................................................................. 23
Configuring an Interface for Low Latency ............................................................... 23
Authenticated QoS................................................................................................... 24
Logs & Monitor ............................................................................................................ 26
Overview of Logging ................................................................................................ 26
Confirming Rule is Logged ...................................................................................... 27
Index............................................................................................................................ 29
CHAPTE R 1
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 5
CHAPTE R 2
Introduction to QoS
In This Section:
Concurrent Sessions ......................................................................................................6
R80 SmartConsole Toolbars ..........................................................................................6
Opening the GUI Clients .................................................................................................7
Workflow .........................................................................................................................8
Features and Benefits ....................................................................................................8
QoS Policy Types .............................................................................................................9
Concurrent Sessions
More than one administrator can work with QoS Policies at the same time, each in a different
session. A locking mechanism prevents administrators from working on the same object at one
time. After you complete you work in a session, click Publish to make your changes available to
other sessions and administrators.
Connected The administrators that are connected to the Security Management Server
Users
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 7
Introduction to QoS
Workflow
This topic shows a high-level workflow for creating an effective QoS Policy.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 8
Introduction to QoS
Accounting *
Guarantees Guarantees
(Per connection)
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 9
Introduction to QoS
Sub-rules
Matching by URI
resources
Matching by DNS
string
SecureXL support
CoreXL support
SmartLSM clusters
* You must disable SecureXL and CoreXL before you can use this feature.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 10
CHAPTE R 3
QoS Tutorial
In This Section:
Deployment Scenario for this Tutorial ........................................................................11
Tutorial Workflow .........................................................................................................12
Installing the System Components..............................................................................12
Creating a New QoS Policy ...........................................................................................13
Configuring the Security Gateway ...............................................................................13
Creating and Configuring Rules...................................................................................15
Installing a QoS Policy ..................................................................................................16
This chapter includes a step by step guide for creating a sample deployment with a QoS Policy. We
recommend that you have a working knowledge of these Check Point products and concepts to
use this tutorial effectively:
• Security Gateways and management servers
• Security Policies and the Rule Base
• R80 SmartConsole and SmartDashboard
• Firewall and related Software Blades
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 11
QoS Tutorial
Item Description
1 London - Security Gateway with QoS
5 Internet
This scenario is an organization with offices located in London, Oxford and Cambridge. The QoS
Security Gateway is in London and has three interfaces, one of which is connected to the Internet.
The Security Management Server is in Oxford and the R80 SmartConsole is in Cambridge. The
local network includes the Marketing and Engineering departments.
Tutorial Workflow
This tutorial is a simplified exercise that shows you how to do these QoS activities:
1. Install and configure the system components.
2. Create a new QoS Policy with R80 SmartConsole.
3. Select one of these QoS Policies types:
• Express - Quickly create basic QoS Policies.
• Recommended - Create advanced Policies with the full set of QoS features.
4. Configure the network objects used by QoS rules.
5. Configure specialized services for use in QoS rules.
6. Create QoS Policy rules.
7. Install the Policy on the Security Gateway.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 12
QoS Tutorial
Version R80
OS Gaia
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 13
QoS Tutorial
eth1
Field Value Notes
Net Address 192.32.42.32
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 14
QoS Tutorial
eth2
Field Value Notes
Net Address 192.199.199.32
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 15
QoS Tutorial
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 16
CHAPTE R 4
Managing QoS
In This Section:
Defining QoS Global Properties ...................................................................................17
Interface QoS Properties ..............................................................................................18
Working with QoS Policies ...........................................................................................19
Creating Rules ..............................................................................................................20
Defining a DiffServ Class of Service ............................................................................21
Defining a DiffServ Class of Service Group .................................................................22
Configuring an Interface for DiffServ ..........................................................................22
Defining a Low Latency Class ......................................................................................23
Configuring an Interface for Low Latency ...................................................................23
Authenticated QoS ........................................................................................................24
This chapter shows you how to configure and manage QoS. These procedures assume that you
have opened R80 SmartConsole, as described in Opening the GUI Clients (on page 7).
• Unanswered queried IP expires after: The User Authority Server (UAS) database is queried
to see if a user's IP has been previously authenticated using Client Authentication or SSL.
Until an answer is received, connections from this user will be classified to the next
matching rule. If an answer is not received within the specified time, there will be another
query.
Note - The QoS tab is only enabled for the interfaces of gateways that have QoS
selected on the General Properties page of the Security Gateway.
Notes:
• Interfaces on the WAN side (or interfaces connected to a slower network) are typically defined
as active. On a gateway with only two interfaces, enable QoS only on the interface connected to
the WAN. If the gateway controls DMZ traffic, you can install QoS on the interface connected to
the DMZ.
• Select Inbound Active to control traffic on this interface in the inbound direction.
• From the Rate list, select or enter the available bandwidth in the inbound direction.
• Check Outbound Active to control traffic on this interface in the outbound direction.
• From the Rate list select or enter the available bandwidth in the outbound direction.
• Make sure that the rates correspond to the actual physical capacity of the interfaces. QoS
cannot make sure the defined rates are compatible with the interface hardware.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 18
Managing QoS
If the defined rate is less than the physical capacity, QoS uses only specified capacity. Excess
capacity is not used. If the defined rate greater than the physical capacity, QoS cannot control
traffic correctly.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 19
Managing QoS
Creating Rules
You can change rule fields, as often as you like, until the rule is in the form that you require.
Configure the source and destination of each communication, services that can be used (TCP,
Compound TCP, UDP, and ICMP), actions to be taken with the data packets, whether to maintain a
log of the entries for the selected rule, and interfaces of the QoS Security Gateway that the rule is
enforced.
You work with rules in SmartDashboard. When you add rules, you can put the new rule anywhere
in the Rule Base except after the last rule. The Default Rule must always be at the bottom of the
Rule Base.
After the last rule Rules > Add Rule > Bottom
Before the first rule Rules > Add Rule > Top
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 20
Managing QoS
After the current rule Rules > Add Rule > Below
Before the current rule Rules > Add Rule > Above
Cut Rule Deletes the current rule and puts it in the clipboard.
Paste Rule Pastes the rule in the clipboard (a sub-menu is displayed from
which you can select whether to paste the rule above or below
the current rule).
Hide Rule Hides the current rule. The rule is still part of the Rule Base and
will be installed when the QoS Policy is installed.
Disable Rule Disables the current rule. The rule appears in the Rule Base but
is not enforced by the QoS Policy.
• Type - Select a type from the list. You may select a predefined or user defined class.
• DiffServ code - This is a read-only field that displays the DiffServ marking as a bitmap.
4. Click OK.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 22
Managing QoS
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 23
Managing QoS
Authenticated QoS
Check Point Authenticated QoS gives Quality of Service (QoS) for end-users in dynamic IP
environments, such as remote access and DHCP environments. This lets priority users, such as
corporate CEOs, to receive priority service when remotely connecting to corporate resources.
Authenticated QoS dynamically prioritizes end-users, based on information gathered during
network or VPN authentication. The feature leverages Check Point UserAuthority technology to
classify both inbound and outbound user connections. The User Authority Server (UAS) maintains
a list of authenticated users. When you query the UAS, QoS retrieves the data and allocates
bandwidth accordingly.
QoS supports Client Authentication, Encrypted Client Authentication, and
SecuRemote/SecureClient Authentication. User and Session Authentication are not supported.
Note - Authenticated QoS is available for backward compatibility, but only works in QoS policy
mode and does not support CoreXL or SecureXL acceleration technologies.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 24
Managing QoS
Notes -
• The user must be authenticated in the UAS, for the QoS policy to be enforced.
• Policy-wide properties for Authenticated QoS can be defined in the QoS page of the Global
Properties window.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 25
CHAPTE R 5
This chapter shows you how configure rules to create logs for specified conditions. You can use
the powerful Logs & Monitor features in R80 SmartConsole to see logs and to monitor the
effectiveness of QoS Policies.
Overview of Logging
These events are logged. The table below describes features unique to event logs.
Non-Accounting Log Events
QoS rejects a connection when The name of the matching Generated as a Recommended
the number of guaranteed rule on account of which reject log. policy only.
connections is exceeded the connection was Unified with the
and/or when you have rejected. initial
configured the system not to connection log.
accept additional connections.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 26
Logs & Monitor
The total bytes transmitted through QoS Inbound and outbound bytes Recommended and
for each relevant interface and transmitted by QoS. Express policies.
direction.
Quality of Service Administration Guide Pre-R80 Security Gateways with R80 Security Management | 27
T
Index
Tutorial Workflow • 12
W
Workflow • 8
A
Working with QoS Policies • 19
About this Guide • 5
Authenticated QoS • 24
C
Changing New Rule Properties • 15
Concurrent Sessions • 6
Configuring an Interface for DiffServ • 22
Configuring an Interface for Low Latency • 23
Configuring the Security Gateway • 13
Confirming Rule is Logged • 27
Creating a New QoS Policy • 13, 19
Creating and Configuring Rules • 15
Creating New Rules • 15
Creating Rules • 20
D
Defining a DiffServ Class of Service • 21
Defining a DiffServ Class of Service Group • 22
Defining a Low Latency Class • 23
Defining Interfaces on the Gateway • 14
Defining QoS Global Properties • 17
Deployment Scenario for this Tutorial • 11
F
Features and Benefits • 8
I
Important Information • 3
Installing a QoS Policy • 16, 20
Installing the System Components • 12
Interface QoS Properties • 18
Introduction to QoS • 6
L
Logs & Monitor • 26
M
Managing QoS • 17
O
Opening an Existing QoS Policy • 19
Opening the GUI Clients • 7
Overview of Logging • 26
Q
QoS Policy Types • 9
QoS Tutorial • 11
R
R80 SmartConsole Toolbars • 6