CP R80BC IdentityAwareness AdminGuide
CP R80BC IdentityAwareness AdminGuide
Identity Awareness
Administration Guide
Classification: [Protected]
© 2016 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No part
of this product or related documentation may be reproduced in any form or by any means without
prior written authorization of Check Point. While every precaution has been taken in the
preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in
subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page http://www.checkpoint.com/copyright.html for a list of our
trademarks.
Refer to the Third Party copyright notices http://www.checkpoint.com/3rd_party_copyright.html
for a list of relevant copyrights and third-party licenses.
Important Information
Check Point R80
For more about this release, see the R80 home page
http://supportcontent.checkpoint.com/solutions?id=sk108623.
Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments
mailto:[email protected]?subject=Feedback on Identity
Awareness Pre-R80 Security Gateways with R80 Security Management Administration
Guide.
Revision History
Date Description
28 March 2016 First release of this document
Contents
Important Information................................................................................................... 3
About this Guide ............................................................................................................ 5
R80 SmartConsole Toolbars ..................................................................................... 5
Getting Started With Identity Awareness ...................................................................... 7
Introduction to Identity Awareness ........................................................................... 7
Scenario: Laptop Access ........................................................................................... 8
User Identification in the Logs ........................................................................................ 9
Scenario: Guest Users from Unmanaged Device ...................................................... 9
Required R80 SmartConsole Configuration .................................................................... 9
Scenario: Recognized User from Unmanaged Device ............................................. 10
Required R80 SmartConsole Configuration ...................................................................10
User Identification in the Logs .......................................................................................11
Scenario: Endpoint Identity Agent Deployment and User Group Access ................. 12
Scenario: Identifying Users in Application Control Logs ......................................... 12
User Identification in the Logs .......................................................................................12
Configuring Identity Awareness .................................................................................. 13
Enabling Identity Awareness on the Security Gateway ........................................... 13
Working with Access Roles ..................................................................................... 15
Automatic LDAP Group Update ......................................................................................15
Using Identity Awareness in the Rule Base............................................................. 17
Access Role Objects.......................................................................................................18
Negate and Drop............................................................................................................18
Configuring Browser-Based Authentication in R80 SmartConsole......................... 19
Configuring Terminal Servers................................................................................. 20
Configuring the Shared Secret ......................................................................................20
Identity Sources .......................................................................................................... 21
Changing Portal Text in R80 SmartConsole ............................................................ 21
Advanced Endpoint Identity Agents Configuration ...................................................... 22
Customizing Parameters ........................................................................................ 22
Index............................................................................................................................ 23
CHAPTE R 1
Manage & Settings view - review and configure the Security Management
Server settings
Ctrl+4
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 5
About this Guide
Connected The administrators that are connected to the Security Management Server
Users
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 6
CHAPTE R 2
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 7
Getting Started With Identity Awareness
You can see the logs based on user and computer name, and not just IP addresses, in the Logs &
Monitor > Logs tab. You can see events in the Logs & Monitor Access Control views.
Identity Awareness gets identities from these acquisition sources. You must enable them on the
Gateway, from the Identity Awareness page of the Gateway object:
• Browser-Based Authentication
• Active Directory (AD) Query
• Identity Agents (installed on the Endpoint)
• Terminal Servers Agent
• Radius Accounting
• Remote Access
Identity Awareness Security Gateways can share the identity information that they acquire with
Identity Awareness Security Gateways. In this way, users that need to pass through many Security
Gateways are only identified once. See Advanced Deployment (on page 21) for more information.
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 8
Getting Started With Identity Awareness
his desk. The current Rule Base contains a rule that lets James Wilson access the HR Web Server
from his laptop with a static IP (10.0.0.19).
He wants to move around the organization and continue to have access to the HR Web Server.
To make this scenario work, the IT administrator does these steps:
1. Enables Identity Awareness on a Security Gateway, selects AD Query as one of the Identity
Sources and installs the policy.
2. Checks the logs in the Logs & Monitor view of R80 SmartConsole to make sure the system
identifies James Wilson in the logs.
3. Adds an access role object to the Firewall Rule Base that lets James Wilson access the HR
Web Server from any computer and from any location.
4. Sees how the system tracks the actions of the access role in in the Logs & Monitor view of R80
SmartConsole.
Note - AD Query maps the users based on AD activity. This can take some time and
depends on user activity. If James Wilson is not identified (the IT administrator does not
see the log), he should lock and unlock the computer.
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 9
Getting Started With Identity Awareness
The log entry in the Logs tab of the Logs & Monitor view shows how the system recognizes Daniel
David from his iPad. This uses the identity acquired from Captive Portal.
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 11
Getting Started With Identity Awareness
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 12
CHAPTE R 3
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 13
Configuring Identity Awareness
When the R80 SmartConsole client computer is part of the AD domain, R80 SmartConsole
suggests this domain automatically. If you select this domain, the system creates an LDAP
Account Unit with all of the domain controllers in the organization's Active Directory.
Note - We highly recommend that you go to the LDAP Account Unit and make sure that only
necessary domain controllers are in the list. If AD Query is not required to operate with some
of the domain controllers, delete them from the LDAP Servers list.
With the Identity Awareness configuration wizard you can use existing LDAP Account units or
create a new one for one AD domain.
When creating new AD domain, if the SmartConsole computer is part of the domain, the wizard
fetches and configures all the domain controllers of the domain.
If you choose Create new domain, the LDAP account unit that the system creates contains
only the domain controller you set manually.
If it is necessary for AD Query to fetch data from other domain controllers, you must add them
at a later time manually to the LDAP Servers list after you complete the wizard.
To view/edit the LDAP Account Unit object, open Object Explorer (Ctrl + E), and select Servers
> LDAP Account units in the Categories tree.
The LDAP Account Unit name syntax is: <domain name>_ _ AD
For example, CORP.ACME.COM_ _ AD.
6. From the Select an Active Directory list, select the Active Directory to configure from the list
that shows configured LDAP account units or create a new domain. If you have not set up
Active Directory, you need to enter a domain name, username, password and domain
controller credentials.
7. Enter the Active Directory credentials and click Connect to verify the credentials.
Important - For AD Query you must enter domain administrator credentials. For
Browser-Based Authentication standard credentials are sufficient.
8. If you selected Browser-Based Authentication or Terminal Servers and do not wish to
configure Active Directory, select I do not wish to configure Active Directory at this time and
click Next.
9. Click Next.
If you selected Browser-Based Authentication on the first page, the Browser-Based
Authentication Settings page opens.
10. In the Browser-Based Authentication Settings page, select a URL for the portal, where
unidentified users will be directed.
All IP addresses configured for the Security Gateway show in the list. The IP address selected
by default is the Security Gateway main IP address. The same IP address can be used for other
portals with different paths. For example:
• Identity Awareness Browser-Based Authentication – 192.0.2.2./connect
• DLP Portal - 192.0.2.2/DLP
• Mobile Access Portal - 192.0.2.2/sslvpn
11. By default, access to the portal is only through internal interfaces. To change this, click Edit.
We do not recommend that you let the portal be accessed through external interfaces on a
perimeter Security Gateway.
12. Click Next. The Identity Awareness is Now Active page opens with a summary of the
acquisition methods.
If you selected Terminal Servers, the page includes a link to download the agent.
13. Click Finish.
14. Select Install Policy (Ctrl+Shift+Enter).
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 14
Configuring Identity Awareness
The system recalculates LDAP group membership for ALL users in ALL Groups. Be very careful
when you deactivate user-related notifications.
LDAP Group Update is activated by default. You can manually deactivate LDAP Group Update with
the CLI.
Important - Automatic LDAP group update works only with Microsoft Active Directory
when AD Query is activated.
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 16
Configuring Identity Awareness
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 17
Configuring Identity Awareness
Example 1 - If an unidentified Finance user tries to access the Finance Web Server with http, a
redirect to the Captive Portal occurs. After the user enters credentials, the Security Gateway
allows access to the Finance Web Server. Access is allowed based on rule number 1, which
identifies the user through the Captive Portal as belonging to the Finance access role.
Example 2 - If an unidentified administrator tries to access the Finance Web Server with http, a
redirect to the Captive Portal occurs despite rule number 2. After the administrator is identified,
rule number 2 matches. To let the administrator access the Finance Web Server without
redirection to the Captive Portal, switch the order of rules 1 and 2 or add a network restriction to
the access role.
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 18
Configuring Identity Awareness
To prevent access to unidentified users, add another rule that ensures that only identified
employees are allowed access.
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 19
Configuring Identity Awareness
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 20
CHAPTE R 4
CHAPTE R 5
Identity Sources
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 21
CHAPTE R 6
Customizing Parameters
You can change settings for Endpoint Identity Agent parameters to control Endpoint Identity Agent
behavior. You can change some of the settings in R80 SmartConsole and others using the
Endpoint Identity Agent Configuration tool.
Parameter Description
Nac_agent_disable_settings Whether users can right click the Endpoint Identity Agent
client (umbrella icon on their desktops) and change
settings.
Nac_agent_email_for_sending_logs You can add a default email address for to which to send
client troubleshooting information.
Nac_agent_disable_quit Whether users can right click the Endpoint Identity Agent
client (umbrella icon on their desktops) and close the
agent.
Nac_agent_hide_client Whether to hide the client (the umbrella icon does not
show on users' desktops).
Identity Awareness Administration Guide Pre-R80 Security Gateways with R80 Security Management
| 22
U
Index
User Identification in the Logs • 9, 11, 12
Using Identity Awareness in the Rule Base • 17
W
A
Working with Access Roles • 15
About this Guide • 5
Access Role Objects • 18
Advanced Deployment • 21
Advanced Endpoint Identity Agents
Configuration • 23
Automatic LDAP Group Update • 15
C
Changing Portal Text in R80 SmartConsole • 22
Configuring Browser-Based Authentication in
R80 SmartConsole • 19
Configuring Identity Awareness • 13
Configuring Terminal Servers • 19
Configuring the Shared Secret • 19
Customizing Parameters • 23
E
Enabling Identity Awareness on the Security
Gateway • 13
G
Getting Started With Identity Awareness • 7
I
Identity Sources • 22
Important Information • 3
Introduction to Identity Awareness • 7
N
Negate and Drop • 18
R
R80 SmartConsole Toolbars • 5
Required R80 SmartConsole Configuration • 9,
10
S
Scenario
Endpoint Identity Agent Deployment and
User Group Access • 11
Guest Users from Unmanaged Device • 9
Identifying Users in Application Control Logs
• 12
Laptop Access • 8
Recognized User from Unmanaged Device •
10
T
Testing Identity Sources • 21