Uploaded by sachin tendulkar

CCSEManual

advertisement
SECURITY ENGINEERING
S t u d e n t
&
L a b
R 8 0 . 1 0
M a n u a l
© 2017 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and de-compilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph
(c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR
52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks.
Refer to the Third Party copyright notices (http:// www.checkpoint.com/
3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses.
International 
Headquarters
5 Ha’Solelim Street
U.S. Headquarters
959 Skyway Road, Suite 300
San Carlos, CA 94070
Tel Aviv 67897, Israel
Tel: +972-3-753 4555
Tel: 650-628-2000
Technical Support, 
Education & Professional
Services
6330 Commerce Drive, Suite 120
Irving, TX 75063
Tel: 972-444-6612
E-mail comments or questions about our courseware to: courseware@us.checkpoint.com
For questions or comments about other Check Point documentation, e-mail:
CP_TechPub_Feedback@checkpoint.com
Document #
DOC-Manual-CCSE-R80.10
Revision
R80.10 v4
Content
Joey Witt, Vanessa Johnson
Graphics
Chunming Jia, Vanessa Johnson
Contributors
Beta Testing, Content Contribution, or Technical Review
Michael Adjei - Wick Hill - United Kingdom
Chris Alblas - QA - England
Eric Anderson - Netanium - USA
Michael Curtin - ContentWise - Australia
Piotr Czopik - CLICO - Poland
Brent Denny - Dimension Data Learning Solutions - Australia
Valery Fraerman - Diona Master Lab - Russia
Alfred Goh - M.Tech Products - Singapore
Desmond Gooh - M.Tech Products - Singapore
Tim Hall - Shadow Peak - USA
Oliver Jantz - Arrow ECS - Germany
Mario Jehmlich - Arrow ECS - Germany
Anthony Joubaire - Arrow ECS - France
Sanjay Kanesamoorthy - Red Education - Australia
Arno Kobarg - Red Education - Australia
Alfred Koebler - Westcon - Germany
Yasushi Kono - Arrow ECS - Germany
Fabrizio Lamanna - Check Point Software Technologies - USA
Jani Lindner - S&T - Slovenia
Dries Mertens - Westcon - Belgium
Carlos Moncayo - Rese - Colombia
Thomas Norbeck - Glasspaper - Norway
Richard Parkin - Arrow ECS - England
Jigarkumar Patel - Check Point Software Technologies - USA
Mika Rantanen - Hawkware Training - Finland
Jason Ross - Red Education - Australia
Niklas Savstrom - Infinigate - Sweden
Fedor Tsyganov - Softline Group - Russia
Madhava V - ITecSys Technologies - India
Sandra Van Loon - Avent - The Netherlands
Erik Wagemans - Proximus ICT Academy - Belgium
Special Thanks:
Glen Bayless - Check Point Software Technologies - USA
Fabrizio Lamanna - Check Point Software Technologies - USA
Kim Winfield - Check Point Software Technologies - USA
Daniel Storey - Red Education - Australia (Sydney Beta Host)
Kia Wentzel - Arrow ECS - Finland (Helsinki Beta Host)
Certification Exam Development:
Jason Tugwell
Check Point Technical Publications Team:
Uri Lewitus, Daly Yam, Eli Har-Even, Paul Grigg, Rachel Teitz, Ronit Segal, Shira Rosenfeld, Yaakov Simon,
Devora Hosseinof
Table of Contents
Preface: Security Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Check Point Security Engineering Course ................................................................................................... 13
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Course Chapters and Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Lab Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Related Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 1: System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Advanced Gaia ............................................................................................................................................. 17
Gaia Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Upgrades ....................................................................................................................................................... 21
Upgrade Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Advanced Upgrade with Database Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Lab 1.1: Upgrading to R80.10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Migrating Management Server Data ............................................................................................................ 25
Installing the Security Management Server .................................................................................................. 38
Configuring Security Management Server Using the Gaia Portal ............................................................... 43
Installing SmartConsole ............................................................................................................................... 59
Importing the Check Point Database ............................................................................................................ 66
Launching SmartConsole and Reconfiguring Existing Security Policies .................................................... 73
END OF LAB 1.1 88
Hotfixes ........................................................................................................................................................ 89
The CPUSE Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
The Central Deployment Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Lab 1.2: Applying Check Point Hotfixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Installing the Hotfix on the Security Gateways
............................................................................................ 95
END OF LAB 1.2 102
4
Check Point Security Engineering
Lab 1.3: Configuring a New Security Gateway Cluster . . . . . . . . . . . . . . . . . . . . . . . 103
Installing a Second Security Gateway ........................................................................................................ 104
Configuring the Bravo Security Gateway with the First Time Configuration Wizard .............................. 113
Using the Gaia Portal to Configure the Security Gateway ......................................................................... 124
Re-configuring the Primary Gateway ......................................................................................................... 135
Configuring the Alpha Security Policy to Manage the Remote Security Gateway Cluster ....................... 146
END OF LAB 1.3 182
CLI Commands .......................................................................................................................................... 183
CPInfo ........................................................................................................................................................ 191
Lab 1.4: Core CLI Elements of Firewall Administration . . . . . . . . . . . . . . . . . . . . . 193
Managing Policy and Verifying Status from the CLI ................................................................................ 194
Using cpinfo ............................................................................................................................................... 196
Reconfiguring the Security Policies ........................................................................................................... 207
Using fw monitor ........................................................................................................................................ 211
Using tcpdump ........................................................................................................................................... 218
END OF LAB 1.4 219
Advanced Firewall ..................................................................................................................................... 220
Check Point Firewall Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
The Firewall Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Packet Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Chain Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Lab 1.5: Viewing the Chain Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Evaluating the Chain Modules ................................................................................................................... 231
Modifying the Security Policy ................................................................................................................... 233
Reviewing Changes to the Chain Modules ................................................................................................ 237
END OF LAB 1.5 246
Stateful Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Security Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Kernel Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Policy Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Rule Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Network Address Translation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Firewall Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
5
Check Point Security Engineering
Lab 1.6: Configuring Manual Network Address Translation . . . . . . . . . . . . . . . . . . 271
Configuring the Security Policy ................................................................................................................. 272
Configuring the ARP Table ........................................................................................................................ 283
Reconfigure the Alpha Rule Base .............................................................................................................. 291
END OF LAB 1.6 293
Review Questions
....................................................................................................................................... 294
Chapter 2: Automation & Orchestration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Automation & Orchestration ...................................................................................................................... 296
Check Point APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Check Point API Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Management API Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Management API Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
Lab 2.1: Managing Objects Using the Check Point API . . . . . . . . . . . . . . . . . . . . . . 308
Configuring the Check Point API .............................................................................................................. 309
Defining and Editing Objects in the API .................................................................................................... 312
END OF LAB 2.1 321
Review Questions
....................................................................................................................................... 322
Chapter 3: Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Advanced ClusterXL .................................................................................................................................. 324
Load Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Proxy ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
VMAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Cluster Synchronization
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Cluster Connectivity Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Add a Member to an Existing Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Sticky Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Management High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
OPSEC Certified Clustering Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Lab 3.1: Deploying a Secondary Security Management Server . . . . . . . . . . . . . . . . 339
Installing the Secondary Management Server ............................................................................................ 340
Configuring Management High Availability ............................................................................................. 344
Testing Management High Availability ..................................................................................................... 350
END OF LAB 3.1 364
VRRP Clusters ........................................................................................................................................... 365
VRRP Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
6
Check Point Security Engineering
Lab 3.2: Enabling Check Point VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
Viewing ClusterXL Failover ...................................................................................................................... 371
Defining a Virtual Router for VRRP .......................................................................................................... 375
Configuring the Security Policy for VRRP ................................................................................................ 387
END OF LAB 3.2 395
Review Questions
....................................................................................................................................... 396
Chapter 4: Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
SecureXL: Security Acceleration ............................................................................................................... 398
Using SecureXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
Packet Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Session Rate Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
SecureXL Connection Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Packet Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
VPN Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Lab 4.1: Working with SecureXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Identifying Status of Current Connections
................................................................................................. 407
END OF LAB 4.1 412
CoreXL: Multicore Acceleration ................................................................................................................ 413
Using CoreXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Processing Core Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Dynamic Dispatcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Packet Flow with CoreXL and SecureXL Enabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Multiple Traffic Queues ............................................................................................................................. 421
Using Multi-Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
Lab 4.2: Working with CoreXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Enabling CoreXL ....................................................................................................................................... 425
Reviewing CoreXL Settings ....................................................................................................................... 433
END OF LAB 4.2 434
Review Questions
....................................................................................................................................... 435
Chapter 5: SmartEvent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
The SmartEvent Solution ........................................................................................................................... 437
SmartEvent Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
SmartEvent Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
SmartEvent Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
SmartEvent Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Defining the Internal Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
7
Check Point Security Engineering
Identifying an Event ................................................................................................................................... 443
Monitoring the Network ............................................................................................................................. 449
Event Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Investigating Security Events ..................................................................................................................... 452
Importing Offline Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Remediating Security Events ..................................................................................................................... 454
Configuring Event Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
Configuring IPS Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Reporting Security Events .......................................................................................................................... 458
Using Predefined Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Defining Custom Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
Preventative Measures ................................................................................................................................ 461
Creating a New Event Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
Reporting an Event to Check Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
Eliminating False Positives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
SmartEvent Example .................................................................................................................................. 463
High Availability Environment .................................................................................................................. 464
Security CheckUp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
Lab 5.1: Evaluating Threats with SmartEvent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Configure the Network Object in SmartConsole ....................................................................................... 467
Monitoring Events with SmartEvent .......................................................................................................... 476
END OF LAB 5.1 484
Review Questions
....................................................................................................................................... 485
Chapter 6: Remote and Mobile Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
Choosing Remote Access Solutions ........................................................................................................... 487
Installation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Secure Connectivity and Endpoint Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
SSL VPN versus IPSec (Layer 3) VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Clients ......................................................................................................................................................... 490
Mobile Access Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
SSL Network Extender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
Check Point Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Check Point Capsule Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
SecuRemote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Additional Remote Access Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
8
Check Point Security Engineering
Check Point Capsule .................................................................................................................................. 492
Capsule Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Capsule Docs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Capsule Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498
Mobile Access Software Blade .................................................................................................................. 500
Mobile Access Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Mobile Access Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
Gateway Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Mobile Access Deployment ....................................................................................................................... 507
Mobile Access Policy ................................................................................................................................. 508
Mobile Access Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Lab 6.1: Managing Mobile Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512
Enable Mobile Access Blade ...................................................................................................................... 513
Configure the Check Point Capsule Policy ................................................................................................ 522
Testing Check Point Mobile Access .......................................................................................................... 538
END OF LAB 6.1 542
Review Questions
....................................................................................................................................... 543
Chapter 7: Threat Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
The Threat Landscape ................................................................................................................................ 545
Zero-Day Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Advanced Persistent Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Intrusion Prevention System ...................................................................................................................... 546
IPS Profile Settings and Protections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
IPS Tuning and Maintenance
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
Lab 7.1: Understanding IPS Protections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Configuring the Protection Profile ............................................................................................................. 550
Configuring the IPS Demonstration Tool .................................................................................................. 563
Testing the Default Protections .................................................................................................................. 569
Modifying the Protection Profile Settings .................................................................................................. 571
Working with Logs & Monitor to Investigate Threats ............................................................................... 580
Modifying an Existing Protection Profile .................................................................................................. 581
END OF LAB 7.1 592
Geo-Protection
............................................................................................................................................ 593
9
Check Point Security Engineering
Lab 7.2: Deploying IPS Geo Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Modifying Anti-Spoofing Settings ............................................................................................................. 596
Configuring IPS Geo Protection ................................................................................................................. 600
END OF LAB 7.2 606
Antivirus ..................................................................................................................................................... 607
Anti-Bot ...................................................................................................................................................... 608
Lab 7.3: Reviewing Threat Prevention Settings and Protections . . . . . . . . . . . . . . . 609
Review Threat Prevention Settings and Protections .................................................................................. 610
Testing EICAR Access ............................................................................................................................... 620
END OF LAB 7.3 622
Sandboxing ................................................................................................................................................. 623
OS-Level Sandboxing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
CPU-Level Sandboxing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
Check Point SandBlast Zero-Day Protection ............................................................................................. 625
SandBlast Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625
SandBlast Appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
SandBlast Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632
SandBlast Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635
SandBlast Deployment ............................................................................................................................... 637
Public Cloud Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Private Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637
Hybrid Solution (SandBlast Appliance and Cloud) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638
SandBlast Mobile ....................................................................................................................................... 639
SandBlast Mobile Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640
SandBlast Mobile Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Lab 7.4: Deploying Threat Emulation and Threat Extraction . . . . . . . . . . . . . . . . . 645
Use ThreatCloud to Verify File Safety ....................................................................................................... 646
Configure Threat Emulation to Inspect Incoming Traffic .......................................................................... 648
END OF LAB 7.4 658
Review Questions
...................................................................................................................................... 659
10
Check Point Security Engineering
Chapter 8: Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
Chapter 1: System Management ................................................................................................................. 661
Chapter 2: Automation and Orchestration .................................................................................................. 662
Chapter 3: Redundancy .............................................................................................................................. 663
Chapter 4: Acceleration .............................................................................................................................. 664
Chapter 5: SmartEvent ............................................................................................................................... 665
Chapter 6: Remote and Mobile Access ...................................................................................................... 666
Chapter 7: Threat Prevention ..................................................................................................................... 667
11
P
R
E
F
A
C
E
Check Point Security Engineering
Security Engineering
P
Welcome to the Check Point Cyber Security Engineering course. This course provides an
advanced and in-depth explanation of Check Point technology. It includes advanced
upgrading, key techniques for building, deploying and enhancing network performance,
and management and troubleshooting features to mitigate security risks. The course is
intended to provide you with an understanding of the skills necessary to effectively design,
maintain and protect your enterprise network.
Preface Outline
• Prerequisites
• Course Chapters and Learning Objectives
• Lab Topology
• Related Certification
_____________________
_____________________
12
Check Point Security Engineering
Check Point Security Engineering Course
This course is designed for security experts and Check Point resellers who need to perform
advanced deployment configurations of a Security Gateway and are working towards their
Check Point Certified Security Engineering (CCSE) certification. The following professionals
benefit best from this course:
• System Administrators
• Support Analysts
• Network Engineers
P r e r e q u i s i te s
Successful completion of this course depends on knowledge of multiple disciplines related to
network-security activities including:
•
•
•
•
•
UNIX and Windows operating systems
Certificate management
System administration
CCSA training/certification
Networking (TCP/IP)
C o u r s e C ha p te r s a nd L ea r ni ng O b j e c t i ve s
Chapter 1: System Management
• Understand system management procedures, including how to perform system
upgrades and apply hotfixes.
• Identify advanced CLI commands.
• Understand the Check Point Firewall infrastructure and other advanced Firewall
processes and procedures.
Chapter 2: Automation and Orchestration
• Recognize how Check Point’s flexible API architecture supports automation and
orchestration of daily operations.
• Understand how to use the management API command line tools and web services to
read information, create objects, work on Security Policies, and send commands to the
Check Point Security Management Server.
_____________________
_____________________
13
Check Point Security Engineering
Chapter 3: Redundancy
• Discuss advanced ClusterXL functions and redundancy.
• Describe VRRP network redundancy and its advantages.
Chapter 4: Acceleration
• Understand how SecureXL acceleration technology enhances and optimizes Security
Gateway performance.
• Understand how CoreXL acceleration technology enhances and improves Security
Gateway performance.
Chapter 5: SmartEvent
• Identify SmartEvent components used to store network activity logs and identify
events.
• Discuss the SmartEvent process that determines which network activities may lead to
critical security issues.
• Understand how SmartEvent can assist in detecting, remediating, and preventing
security threats targeting organizations.
Chapter 6: Remote and Mobile Access
• Recognize Check Point Remote Access solutions and how they differ.
• Discuss Check Point Capsule components and how they work to protect mobile devices
and business documents.
• Discuss the Mobile Access Software Blade and how it secures communication and data
exchange during remote connections.
• Understand Mobile Access deployment options.
Chapter 7: Threat Prevention
• Discuss different Check Point Threat Prevention solutions for dangerous attacks such
as zero-day and Advanced Persistent Threats.
• Understand how SandBlast, Threat Emulation, and Threat Extraction helps to prevent
security incidents.
• Identify how Check Point SandBlast Mobile helps protect an organization from threats
targeting company-issued smartphones and tablets.
_____________________
_____________________
14
Check Point Security Engineering
L a b To p o l o g y
Labs for this course were developed using VMware Workstation. Your instructor will have
information for the specific settings and configuration requirements of each virtual machine.
Most lab exercises will require you to manipulate machines in the virtual network. Review the
starting lab topology pictured below. Note the location of each server in relation to the Security
Gateways and how they are routed. Make sure you understand the purpose of each machine,
and the credentials and applications used throughout the course. As the course progresses, you
will add Virtual Machines to this topology during the lab exercises.
Figure 1 — Starting CCSE Lab Topology
Rel a te d C er ti fi c a t i o n
The Check Point Certified Cyber Security Engineer (CCSE) certification is designed for
partners and customers seeking to validate their expert level knowledge of Check Point’s
software products and security solutions. Students must have a valid CCSA certification before
challenging the CCSE exam.
_____________________
_____________________
15
C
H
A
P
T
E
R
Check Point Security Engineering
System Management
1
Cyber Security experts are expected to acquire and apply in-depth knowledge of systems
used to securely manage the organization’s network infrastructure. This course begins
with a deep dive into the Check Point Gaia operating system, with how to use essential
CLI commands, perform upgrades, and apply hotfixes. We will also take a closer look at
the Check Point Firewall infrastructure, chain modules, kernel tables, packet flow, and
many more advanced Firewall processes and procedures.
Learning Objectives
• Understand system management procedures, including how to perform system upgrades and apply
hotfixes.
• Identify advanced CLI commands.
• Understand the Check Point Firewall infrastructure and other advanced Firewall processes and
procedures.
_____________________
_____________________
16
Check Point Security Engineering
Advanced Gaia
Check Point Gaia is the unified, revolutionary, secure operating system for all Check Point
appliances, open servers, and virtualized gateways. The cutting-edge technology combines the
best features of IPSO and Check Point’s original secure operating system, SecurePlatform, into
a single, harmonious operating system to provide greater operational efficiency and robust
performance.
The Makings of Gaia
Gaia was derived from IPSO and SecurePlatform. The IPSO operating system was developed
by Ipsilon Networks, a computer networking company specializing in IP switching during the
1990s. Nokia purchased Ipsilon Networks in 1997 and incorporated IPSO into their secure
network appliances. Check Point acquired Nokia’s Security business unit in April 2009.
As a stripped down operating system, IPSO provided enough functionality to run Check Point
Firewalls, along with the incorporation of some standard Unix commands, such as top, ps,
and df. It also provided great visibility into kernel statistics, such as network counters,
interrupts, and more.
Check Point’s SecurePlatform operating system is based on a kernel from Red Hat Software.
SecurePlatform’s hardened and optimized operating system eliminated software package
components that were unnecessary for a network security device and modified or removed
components that could present security risks. Its easy-to-use command shell provided a set of
commands required for configuration, administration, and system diagnostics, including
network settings, back up and restore utilities, upgrading, and system log viewing. Routine
management and maintenance of SecurePlatform was performed through a restricted shell
called Standard mode. Standard mode enhanced the security of SecurePlatform by restricting
access to utilities that, if used improperly, would damage system stability. SecurePlatform also
consisted of a Web Graphical User Interface (WebUI), which enabled users to easily configure
settings and perform first time installations.
SecurePlatform allowed all system resources to be dedicated to the operating system and the
installed Check Point products. With SecurePlatform, resources were no longer consumed by
software such as GUIs, office applications, and network file systems.
G a i a Fe a t u r e s a n d B e n e f i t s
Gaia supports the full suite of Check Point technologies, giving you improved connection
capacity and the full power of Check Point security.
_____________________
_____________________
17
Check Point Security Engineering
Check Point Gaia offers these key values:
• Combine the best features of IPSO and SecurePlatform.
• Increase operational efficiency with a wide range of features.
• Provide a secure platform for the most demanding environments.
Gaia simplifies and strengthens management with the segregation of duties by enabling rolebased administrative access. Additionally, Gaia greatly increases operational efficiency with
an advanced and intuitive software update agent, commonly referred to as the Check Point
Update Service Engine (CPUSE). Gaia management is made simple with the intuitive and
feature-rich WebUI, and instant search options for all commands and properties. The same
powerful CLI commands from IPSO and SecurePlatform have been seamlessly integrated into
Gaia, along with new commands and capabilities.
Figure 2 — Gaia Portal
_____________________
_____________________
18
Check Point Security Engineering
Key Features
Key features of Gaia include:
• Web-based User Interface with search navigation — This interface integrates all
Gaia operating system management functions into a dashboard that is accessible via the
most popular Web browsers, such as Internet Explorer, Chrome, Firefox, Opera, and
Safari. The built-in search navigation tool delivers instant results, and for the CLIinclined users, a Shell Emulator pop-up window is only a single click away.
• Full Software Blade support — Gaia provides support for comprehensive Security
Gateway and Security Management Software Blade solutions deployed on Check Point
appliances and open servers.
• High connection capacity — Utilizing the efficiency of a 64-bit operating system,
Gaia is capable of boosting the connection capacity of existing Check Point appliances.
• Role-based administrative access — Segregation of duties is part of a good Security
Policy because it improves operational efficiency and auditing of administrative events.
Role-based administrative access gives Gaia customers the ability and granularity to
customize their security management policies to meet their business needs. User
authentication and authorization is based on industry standard RADIUS and TACACS+
protocols. Specific levels of access can be granted based on each individual’s role and
responsibility.
• Intelligent software updates — With Gaia, software update times are shortened and
post-update testing is performed automatically. New releases and patches can be
scheduled for automatic download and installed during off-peak hours for minimal
business impact. Notification emails are sent about recommended updates and update
statuses.
• Native IPv4 and IPv6 support — Check Point Gaia allows easy interoperability with
both networking protocols.
• Clustering protocol support — Gaia fully supports ClusterXL, Check Point’s
proprietary network redundancy protocol, and standard VRRP on all Check Point
appliances, open servers, and virtualized environments.
• Manageable dynamic routing suite — Multiple dynamic routing and Multicasting
protocols are supported by Gaia, providing flexible and uninterrupted network
connectivity. All can be managed from both the Gaia portal or the CLI.
_____________________
_____________________
19
Check Point Security Engineering
Supported Protocols
Dynamic Routing Protocols
• RIP RFC 1058
• RIPv2 (with authentication) RFC
1723
• OSPFv2 RFC 2328
• OSPFv3 RFC 5340
• OSPF NSSA RFC 3101
• BGP4 RFCs 1771, 1963, 1966,
1997, 2918
Multicasting Protocols
•
•
•
•
•
•
IGMPv2 RFC 2236
IGMPv3 RFC 3376
PIM-SM RFC 4601
PIM-SSM RFC 4601
PIM-DM RFC 3973
PIM-DM state refresh draft-ietf-pim-refresh-02.txt
Table 1: Gaia Supported Dynamic and Multicasting Protocols
_____________________
_____________________
20
Check Point Security Engineering
Upgrades
As a Cyber Security Engineer, it is important to evaluate the overall health, compliance, and
performance of your network. This often entails the task of deciding whether to install new
hardware to fit business needs or to upgrade to newer software versions to ensure the
efficiency of the existing environment. Check Point recommends installing the most recent
software release to stay up-to-date with the latest functional improvements, stability fixes,
security enhancements, and protections against new and evolving attacks.
Upgrades provide added enhancements over an earlier version and eliminate the complexities
of re-creating product configurations, Security Policies, and objects. Before upgrading
appliances or open servers, verify the interoperability and upgrade path of your existing
environment and make use of the appropriate Check Point upgrade tools.
To upgrade from R77.XX to R80.10, an advanced upgrade with database migration process
must be performed. Upgrades from R80 to R80.10, are performed through the software update
agent, CPUSE.
NOTE
Upgrades to R80 and above are not supported from IPSO and
SecurePlatform. For more information, refer to Check Point’s Upgrade
Map.
U p g r a d e Too l s
Upgrade tools back up Check Point configurations, independent of hardware, operating
system, and Check Point security management platform version. Use the upgrade tools to back
up Check Point configuration settings on disk partitions of Check Point appliances and open
servers. Disk space requirements for upgrades vary based on the upgrade version. Before
starting an upgrade, refer to the release notes of the desired platform version to verify the space
requirements for each disk partition, such as the /var/log/ and root partitions.
There is a different package of upgrade tools for each platform. Download the latest version of
upgrade tools from the Check Point support site. Before upgrading, a valid service contract that
includes software upgrades and major releases must be registered to your organization’s Check
Point User Center account.
_____________________
_____________________
21
Check Point Security Engineering
The upgrade tools package consists of several files, including the files noted in the table below.
Package File
Description
migrate.conf
Holds configuration settings for Advanced Upgrade
with Database Migration.
migrate
Runs Advanced Upgrade with migration.
pre_upgrade_verifier
Analyzes compatibility of the currently installed
configuration with the upgrade version. It gives a report
on the actions to take before and after the upgrade.
Table 2: Upgrade Tools Package Files
Ad va n c e d U p g r a d e w i t h D a t a b a s e M i g r a t i o n
As in all upgrade procedures, it is best practice to upgrade the Security Management Server or
Multi-Domain Server before upgrading the Security Gateways. To upgrade from an earlier
software version, such as R77.30, to Check Point’s R80.10 security management platform, use
the Advanced Upgrade with Database Migration method to migrate the database and install the
software. With this method of upgrading, the current environment must meet these
requirements for database migration:
• Available disk space of at least five times the size of the exported database on the target
machine.
• Size of the /var/log folder of the target machine must be at least 25% of the size of
the /var/log directory on the source machine.
• Source and target servers must be connected to a network and the connected network
interface must have an IP address.
• If the source environments uses only IPv4 or only IPv6, the target must use the same IP
address configuration. For example, you cannot migrate to an IPv6 configuration if the
source environment uses only IPv4.
• The target must have the same or higher version and the same set of installed products.
• The appropriate package of upgrade tools must be download for each source platform.
• The correct ports for SmartConsole must be open in order for SmartConsole to
communicate with the Security Management Server.
After the requirements for database migration have been met, create a backup copy of the
existing system settings from the Gaia WebUI. Gaia operating system settings are not backed
up and must be configured manually if the database is restored later due to issues with the
upgrade. Take note of operating system settings (interfaces, servers, routes, system settings,
etc.) before upgrading.
_____________________
_____________________
22
Check Point Security Engineering
It is important to use the correct migration tool package to perform the upgrade. Use the
upgrade tools package for the software version you are upgrading too. For example, if
upgrading from R77.30 to R80.10, use the migration tools package for R80.10. Download and
extract the tools to the old server (R77.30). Use the migrate utility of the upgrade tools
package, to export the source Security Management Server database (R77.30) to a file, and
then import the file to the new server (R80.10).
NOTE
SmartEvent databases are not migrated during an advanced upgrade
because the databases can be very large. Migration of these databases must
be performed separately. Refer to sk110173 for information on how to
migrate the SmartEvent database.
The Upgrade Verification Service
Check Point’s Upgrade Verification Service is an upgrade verification and environment
simulation service created to help customers transition to R80.XX as seamlessly as possible.
The service will use configuration files from your current platform to simulate the environment
and verify that the upgrade can be successfully applied across the key features of the software.
The simulation will also ensure that the database is not corrupted during the upgrade process.
Upon completion, a status update of the simulation results along with advice on how best to
proceed will be provided. For more detailed information regarding the Upgrade Verification
Service, refer to sk110267.
L a b 1 .1
Upgrading to R80.10
_____________________
_____________________
23
L
A
B
Upgrading to R80.10
1.1
This lab illustrates how to perform an upgrade of a Security Management Server from R77.30 to R80.10.
You will export the configuration of your old server to a Windows machine before installing a new R80.10
server. Once the fresh installation of the new OS is complete, you can then import the rules, objects, and
settings of the previous server into the database of the new, upgraded server.
Once the upgrade of the Security Management Server is complete, use CPUSE to upgrade a Security
Gateway.
Ta sks :
• Save the database information.
• Access the migrate file and transfer via SSH/SCP.
• Perform a clean installation of R80.10 Security Management Server.
• Configure the Security Management Server.
• Install R80.10 SmartConsole.
• Import the database.
• Upgrade the Security Gateway.
Pe r for ma n c e Ob j ec t ive s:
• Use the migrate export command to prepare to upgrade a Security Management Server.
• Perform an installation of a Security Management Server.
• Use the migrate import command to populate the database of a Security Management Server.
• Perform an upgrade of Security Gateways in a clustered environment.
_____________________
_____________________
24
Check Point Security Engineering
Migrating Management Server Data
Export the rules and objects off of the existing Security Management Server so that they can be imported
into the new server.
From A-GUI, open a Web browser and use HTTPS to connect to A-SMS (10.1.1.101).
2. Use the following credentials to log into the Gaia Portal on A-SMS:
1.
Username: admin
Password: Chkp!234
In the navigation pane, click User Management > Users.
4. Use the information below to create a new user:
3.
Login Name: scpadmin
Password: Chkp!234
Home Directory: /home/scpadmin
Shell: /bin/bash
Assigned Roles: adminRole
Access Mechanisms: Web
Command Line
Click OK.
6. Sign out of the Gaia Portal.
7. Close the web browser.
5.
_____________________
_____________________
25
Check Point Security Engineering
8.
From A-GUI, use the following credentials to log into WinSCP and connect to the A-SMS:
File Protcol: SCP
Host Name: 10.1.1.101
User Name: scpadmin
Password: Chkp!234
Figure 3 — WinSCP Login
In WinSCP, confirm that the left pane displays the local directory and the right pane displays the
remote directory.
10. In the right pane, navigate to the /var/log directory of the old R77.30 Security Management Server:
11. In the left pane (local directory), browse to the location of the Upgrade Tools.
9.
NOTE
Ask your instructor for the location and name of the upgrade tools file. Though the
name varies, the upgrade tools for R80.10 are called: p1_upgrade_tools.tgz
_____________________
_____________________
26
Check Point Security Engineering
12. Create a new directory called tmp in the /var/log directory, if needed.
13. Move the file from A-GUI to the /var/log/tmp directory on A-SMS, and the system displays the
following window:
Figure 4 — Upload
_____________________
_____________________
27
Check Point Security Engineering
14. Click the Transfer Settings button, and configure the transfer to be in Binary mode:
Figure 5 — Binary Mode
15. Click OK.
16. Click OK, to continue the file transfer.
17. Highlight the copied file in the right pane of WinSCP and right-click.
_____________________
_____________________
28
Check Point Security Engineering
18. From the Context Menu, select Custom Commands > UnTar/Gzip:
Figure 6 — Special Commands - UnTar/Gzip
19. Click OK, to extract the directory to the following location:
/var/log/tmp
_____________________
_____________________
29
Check Point Security Engineering
20. After the extraction completes, verify that the following folder now appears in /var/log/tmp:
migrate_tool
Figure 7 — migrate_tool Folder
_____________________
_____________________
30
Check Point Security Engineering
21. From the WinSCP window, click the PuTTY Login button.
22. PuTTY logs into the A-SMS server (10.1.1.101) at the /home/admin directory:
Figure 8 — PuTTY Session
NOTE
If you are asked to enter the password for scpadmin, enter the following:
Chkp!234
_____________________
_____________________
31
Check Point Security Engineering
23. Verify that all consoles are closed by issuing the following command:
cpstat mg
Figure 9 — cpstat mg
NOTE
The Connected Clients list should be empty. If it is not, execute the cpstop command
to force close all open clients.
24. Change to the following directory by executing the following command:
cd /var/log/tmp/migrate_tool
_____________________
_____________________
32
Check Point Security Engineering
25. Type the following command and press Enter, to view the contents of the folder:
ls
Figure 10 — migrate_tool Folder
26. Type the following command:
./migrate export A-SMS-from-r7730-to-r8010.tgz
_____________________
_____________________
33
Check Point Security Engineering
27. Press Enter, to run the script. The system asks the following question:
Figure 11 — Warning
_____________________
_____________________
34
Check Point Security Engineering
28. Type y, and press Enter. The system exports the data, creates the export file, and identifies its location
on the server:
Figure 12 — Export Complete
NOTE
The time it takes for this process to complete may vary depending on the size of your
Security Policy, number of objects in the database, and database revisions. Once
complete, the system provides the location of the exported file and returns to the
Expert mode command prompt.
_____________________
_____________________
35
Check Point Security Engineering
29. While still in the PuTTY session on A-SMS, initiate an FTP session back to A-GUI (10.1.1.201).
NOTE
You can also use the WinSCP session that is still open to transfer the file.
30. Type the following commands and press Enter, to prepare to transfer the file:
bin
hash
31. Type the following command, and press Enter:
put A-SMS-from-r7730-to-r8010.tgz
NOTE
You may want to transfer the file using WinSCP instead of FTP. Just be sure to use
Binary Mode for the transfer.
32. Verify that the A-SMS-from-r7730-to-r8010.tgz file has been transferred to A-GUI.
_____________________
_____________________
36
Check Point Security Engineering
33. Close the WinSCP session.
34. In the PuTTY session to A-SMS, issue the following command:
shutdown now -h
Figure 13 — shutdown now -h
35. Exit PuTTY.
36. Verify that the A-SMS virtual machine is powered down before continuing.
_____________________
_____________________
37
Check Point Security Engineering
Installing the Security Management Server
Install the R80.10 Management Server. It will manage the Security Gateway cluster for this site.
1.
In VMware, verify that the settings for the new A-SMS Virtual Machine is defined as follows:
◦ Name: A-SMS
◦ Memory: 10GB
◦ Processors: 4
◦ Hard Disk: 80GB
◦ CD/DVD (SATA): Points to R80.10 ISO
◦ Network Adapter: One Interface
• Connected
• Connect at power on
• LAN Segment: LAN 1
NOTE
Your classroom configuration may be different. Check with your instructor before
continuing to the next step.
_____________________
_____________________
38
Check Point Security Engineering
2.
Power on the A-SMS virtual machine, and the Welcome to Check Point Gaia R80.10 screen appears:
Figure 14 — Welcome to Check Point Gaia R80.10
3.
Within 60 seconds, highlight the option Install Gaia on this system.
_____________________
_____________________
39
Check Point Security Engineering
4.
Press the Enter key, to launch the installation:
Figure 15 — Welcome
At the Welcome screen, highlight OK, and press Enter.
6. Select the keyboard to suit your region.
7. At the Partitions Configuration screen, modify the Logs partition to be 30GB:
5.
Figure 16 — Partitions Configuration
_____________________
_____________________
40
Check Point Security Engineering
8.
At the Account Configuration screen, enter and confirm Chkp!234 as the password for the OS Level
admin account.
NOTE
Verify that NumLock is on. It is not on by default after installation. If you haven’t
already turned it on, do so now and re-enter and confirm your password. If you enter
this password without turning NumLock on, you will not be able to log into the
system.
Tab to OK, and press Enter.
10. Use the following information to configure the Management Interface (eth0) screen:
9.
IP Address: 10.1.1.101
Netmask: 255.255.255.0
Default Gateway (IP): 10.1.1.1
Figure 17 — Management Interface (eth0) Configured
11. Select OK, and press Enter. The system displays the Confirmation screen.
_____________________
_____________________
41
Check Point Security Engineering
12. In the Confirmation screen, select OK, and press Enter to proceed. After the drive is formatted and the
installation is complete, the system displays the Installation Complete screen:
Figure 18 — Installation Complete
13. Press Enter to reboot A-SMS.
_____________________
_____________________
42
Check Point Security Engineering
Configuring Security Management Server 
Using the Gaia Portal
Follow these steps to configure the primary Security Management Server for your configuration.
From the A-GUI virtual machine, launch an Internet browser.
2. In the address field, type the following:
1.
https://10.1.1.101
NOTE
Be sure that you are using HTTPS. You may also need to verify that the LANs in
VMware are configured properly before you are able to connect. Both the GUI client
machine (A-GUI) and the Security Management Server (A-SMS) reside on LAN 2,
if you are following the recommended classroom topology. Consult your instructor,
if you are using a different configuration.
3.
Press Enter, and your browser should warn you that the site’s Security Certificate is from an untrusted
source.
NOTE
Ignore this warning and continue to the site.
_____________________
_____________________
43
Check Point Security Engineering
4.
Log into A-SMS with the following credentials:
Login: admin
Password: Chkp!234
Figure 19 — R80.10 Gaia Portal Login
_____________________
_____________________
44
Check Point Security Engineering
5.
Press Enter, and the system displays the following message:
Figure 20 — R80.10 First Time Configuration
Click Next, and the system displays the deployment Options page.
7. Verify that the following option is selected:
6.
Continue with Gaia R80.10 configuration
_____________________
_____________________
45
Check Point Security Engineering
8.
Click Next, and the system displays the Management Connection window:
Figure 21 — Network Connection
9.
Use the information below to verify that the Security Management Server’s network connection is
configured properly:
Interface: eth0
Configure IPv4: Manually
IPv4 Address: 10.1.1.101
Subnet Mask: 255.255.255.0
Default Gateway: 10.1.1.1
Configure IPv6: Off
10. Click Next, and the system displays the Device Information window.
_____________________
_____________________
46
Check Point Security Engineering
11. Use the following information to configure the Device Information window:
Host Name: A-SMS
Domain Name: alpha.cp
Primary DNS Server: 192.168.11.101
Figure 22 — Device Information Configured
NOTE
Check Point prohibits the use of underscores in object names.
12. Click Next, and the system displays the Date and Time Settings window.
13. Select the option Use Network Time Protocol (NTP).
14. In the Primary NTP server field, type 192.168.11.101.
_____________________
_____________________
47
Check Point Security Engineering
15. Select the correct Time Zone for your location:
Figure 23 — Date and Time Settings Configured
16. Click Next, and the system displays the Installation Type window:
Figure 24 — Network Configuration - Host Name Options
_____________________
_____________________
48
Check Point Security Engineering
17. Select Security Gateway or Security Management, and click Next. The system displays the Products
window.
18. In the Products window, clear the Security Gateway option.
19. Use the information below to configure the Products window:
Products: Security Management
Advanced: Define Security Management as Primary
NOTE
Clear the Security Gateway option before continuing. This option must NOT be
selected.
20. Verify that the Products window is configured as follows:
Figure 25 — Products Configured
21. Click Next, and enter newadmin for the Administrator name.
_____________________
_____________________
49
Check Point Security Engineering
22. Enter and confirm Chkp!234 as the password:
Figure 26 — Security Management Administrator
23. Click Next, and confirm that the option Any IP Address is selected in the Security Management GUI
Clients window.
_____________________
_____________________
50
Check Point Security Engineering
24. Click Next, and the system displays the Summary page:
Figure 27 — Summary
25. Clear the following option:
Improve product experience by sending data to Check Point
NOTE
Though this option is recommended, it is not necessary in our lab. We are not in a
production environment and only have limited connection to the Internet.
26. Click Finish, and the system prompts you for a response to the following question:
Figure 28 — First Time Configuration Wizard Message
_____________________
_____________________
51
Check Point Security Engineering
27. Click Yes, and the system proceeds with the configuration:
Figure 29 — Summary (Progress)
28. Once complete, a message displays indicating that the configuration was successful:
Figure 30 — Message
_____________________
_____________________
52
Check Point Security Engineering
29. Click OK, and the Gaia Portal displays the configuration settings of the newly configured Security
Management Server:
Figure 31 — Check Point Gaia Portal - Security Management Server Configured
_____________________
_____________________
53
Check Point Security Engineering
30. In the System Management section, click Messages.
31. Enter the following for the Banner Message:
A-SMS
Unauthorized access of this server is prohibited and punishable by law.
Figure 32 — Messages Configured
32. Click Apply.
_____________________
_____________________
54
Check Point Security Engineering
33. In the User Management section of the navigation pane, select Users:
Figure 33 — Users
_____________________
_____________________
55
Check Point Security Engineering
34. Click the Add button, and the system displays the Add User window:
Figure 34 — Add User
_____________________
_____________________
56
Check Point Security Engineering
35. Use the following information to configure the new user:
Login Name: adminbash
Password: Chkp!234
Real Name: Adminbash
Home Directory: /home/adminbash
Shell: /bin/bash
Access Mechanisms: Web
Clish Access
Assigned Roles: adminRole
Figure 35 — Add User Configured
NOTE
When you log into the Security Management Server as adminbash, the correct shell
is now available for adminbash to connect and transfer files. There is no longer a
need to specifically define the shell in the command line. Since this is an OS level
user, you must perform this action on every module you want to have the adminbash
user defined.
_____________________
_____________________
57
Check Point Security Engineering
36. Click OK, and the system adds the new user to the Users page:
Figure 36 — Users
_____________________
_____________________
58
Check Point Security Engineering
Installing SmartConsole
In this section, you will install SmartConsole on the A-GUI virtual machine.
In the navigation pane of Gaia Portal, click Overview.
2. On the Overview page, click the Download Now button to download the SmartConsole installer file:
1.
Figure 37 — Web Portal - Overview
NOTE
You may need to reacquire the configuration lock before downloading the
application. The system will prompt you, if this is necessary.
_____________________
_____________________
59
Check Point Security Engineering
Save the installer file to the Downloads folder of A-GUI.
4. Log out of the Gaia Portal.
5. Browse the Downloads folder and locate the SmartConsole.exe file:
3.
Figure 38 — Downloads Folder
_____________________
_____________________
60
Check Point Security Engineering
6.
Double-click the SmartConsole.exe file. The Welcome screen displays.
Figure 39 — Welcome
Select the option confirming you agree to the Check Point End User License Agreement.
8. Click Install, to begin the installation process. The system displays installation progress information:
7.
Figure 40 — Installation
_____________________
_____________________
61
Check Point Security Engineering
9.
Verify that the system displays the Thank You window, once the installation completes:
10. Click the Finish button, to complete the SmartConsole installation.
11. Log into A-SMS with the following credentials:
Login: newadmin
Password: Chkp!234
IP Address: 10.1.1.101
_____________________
_____________________
62
Check Point Security Engineering
12. Click Login, and the system displays the Fingerprint for verification:
Figure 41 — Fingerprint
13. Click Proceed, and the system displays the Welcome to SmartConsole R80.10 page:
Figure 42 — Welcome to SmartConsole
_____________________
_____________________
63
Check Point Security Engineering
14. Close the What’s New window.
15. In the Gateways & Servers tab of SmartConsole, identify that there are no Security Gateways managed
by this Security Management Server:
Figure 43 — Gateways & Servers
_____________________
_____________________
64
Check Point Security Engineering
16. In the navigation pane, click Security Policies:
Figure 44 — Security Policies
17. Verify that no rules are present in the Rule Base and that only the A-SMS object is present, as is typical
in a default installation before the Security Policy is configured.
18. Close SmartConsole.
_____________________
_____________________
65
Check Point Security Engineering
Importing the Check Point Database
Use the migrate import command to load the objects, rules, and settings from the previous server into
the newly configured R80.10 one.
1.
From A-GUI, use the following information to connect to the newly configured Security Management
Server via WinSCP:
Host Name: 10.1.1.101
User Name: adminbash
Password: Chkp!234
Figure 45 — WinSCP Login
NOTE
In Gaia, the User Name and Password are both case sensitive.
2.
Click Login, and WinSCP logs into A-SMS.
_____________________
_____________________
66
Check Point Security Engineering
3.
In the right-pane, navigate to the following location:
/var/log
4.
In the toolbar, click New > Directory.
Figure 46 — Create Folder
NOTE
An alternative method to performing the import from the /var/log location would be
to move the migrate file into the upgrade_tools folder and perform the import from
that location.
Name the new folder Migrate.
6. Click OK.
7. In the left pane of WinSCP, verify that the following file is visible:
5.
A-SMS-from-r7730-to-r8010.tgz
_____________________
_____________________
67
Check Point Security Engineering
8.
In the right pane of WinSCP, verify that the Migrate folder is visible:
Figure 47 — WinSCP
_____________________
_____________________
68
Check Point Security Engineering
9.
Copy the A-SMS-from-r7730-to-r8010.tgz file using Binary mode from its location on A-GUI
to the Migrate folder on A-SMS:
Figure 48 — Copy
NOTE
When transferring files, make sure you configure the transfer settings to work in
Binary mode.
10. Exit WinSCP, after the file transfer is complete.
_____________________
_____________________
69
Check Point Security Engineering
11. Once the file is copied to the server, log into A-SMS (10.1.1.101).
12. To enter Expert Mode, type the following and press Enter:
expert
NOTE
The system asks you to set the Expert Mode password because, as a new installation
this value is not currently configured.
13. Execute the following command to set the Expert Mode password:
set expert-password
14. Enter and confirm the following as the Expert Mode password:
Chkp!234
Figure 49 — set expert-password
15. Execute the following command:
save config
16. Next, type the following command and press Enter.
expert
17. Enter and confirm the following as the Expert password:
Chkp!234
18. Type the following command, and press Enter, to change the directory to the location of the imported
file:
cd /var/log/Migrate
_____________________
_____________________
70
Check Point Security Engineering
19. Execute an ls command to verify that the file is present:
Figure 50 — ls
20. Type the following command, and press Enter, to change the directory to the migration tool
application:
cd $FWDIR/bin/upgrade_tools
Figure 51 — Change Directories
21. Execute an ls command to verify that the file migrate function is present:
Figure 52 — ls
22. To import the file into the new Security Management Server, type the following command:
./migrate import /var/log/Migrate/A-SMS-from-r7730-to-r8010.tgz
23. Press Enter, and the system warns you that services must be stopped.
_____________________
_____________________
71
Check Point Security Engineering
24. Type y, and press Enter. The system unzips the file and imports the configuration. Once complete, it
displays the following question:
Figure 53 — Question
25. Press Enter, to restart Check Point services.
26. Wait for the services to start before proceeding to the next section.
_____________________
_____________________
72
Check Point Security Engineering
Launching SmartConsole and Reconfiguring
Existing Security Policies
Launch SmartConsole and connect to the Security Management Server.
From the Start menu on A-GUI, click All Programs > Check Point SmartConsole R80.10 and the 
system displays the login window.
2. Use the following information to configure the Login window:
1.
User Name: newadmin
Password: Chkp!234
IP Address: 10.1.1.101
Figure 54 — Login Window
_____________________
_____________________
73
Check Point Security Engineering
3.
Click the Login button, and the login attempt should fail:
Figure 55 — Check Point SmartConsole
NOTE
The login failure confirms that the database import completed successfully, because
newadmin was not configured in the imported policy.
4.
Use the following information to Login:
User Name: admin
Password: Chkp!234
IP Address: 10.1.1.101
Click the Login button.
6. Select the Gateways & Servers tab.
5.
_____________________
_____________________
74
Check Point Security Engineering
7.
In the navigation pane, click Security Policies:
Figure 56 — Security Policies - Manage Policies - Recent Policies
_____________________
_____________________
75
Check Point Security Engineering
8.
From the recent Policies list, click Alpha_Standard to view:
Figure 57 — Security Policies - Alpha Standard
Verify that the rules and objects previously configured on the old server are present.
10. Edit the Alpha-Net group object and add an “s” to it’s name.
9.
_____________________
_____________________
76
Check Point Security Engineering
11. Edit the A-GW-Cluster object.
12. Verify that the Version setting on the General Properties page displays R80.10:
Figure 58 — General Properties Configured
NOTE
If the version displayed is not R80.10, click the Get button to retrieve this
information from the Security Gateways.
13. Click OK.
_____________________
_____________________
77
Check Point Security Engineering
14. Click Publish, to commit the changes to the database:
Figure 59 — SmartConsole
_____________________
_____________________
78
Check Point Security Engineering
15. Click the Install Policy button in the Alpha_Standard Policy Package and the system displays the
Install Policy window:
Figure 60 — Install Policy
NOTE
If the Threat Prevention option is selected, clear it before installing the 
Security Policy.
_____________________
_____________________
79
Check Point Security Engineering
16. As the policy installation is proceeding, identify the Recent Tasks pop-up window displayed by the
system in the bottom left of SmartConsole.
17. For the Policy Installation task, click the Details link. The system displays the following window:
Figure 61 — Install Policy Details
18. Confirm that the Alpha_Standard policy was successfully installed on both A-GW-Cluster members.
19. Close the Install Policy Details window.
20. Next, edit the B-GW object.
21. Test communication and only reset SIC if communication fails.
_____________________
_____________________
80
Check Point Security Engineering
22. In the General Properties page, verify that the B-GW displays a Version of R77.30:
Figure 62 — General Properties Configured
23. Click OK.
24. In the toolbar, click the Application Menu button in the upper left corner of SmartConsole.
25. Select Global Properties.
_____________________
_____________________
81
Check Point Security Engineering
26. Verify that the following settings are defined:
◦ Accept ICMP First
◦ Log Implied Rules
Figure 63 — Global Properties
27. Click OK.
28. In the Alpha Security Policy, remove the B-GW object from the Stealth Rule, if it is present.
29. Next, publish and install the Alpha Security Policy.
_____________________
_____________________
82
Check Point Security Engineering
30. Click the + tab, to view the recent policies available to view:
Figure 64 — Recent Policies
_____________________
_____________________
83
Check Point Security Engineering
31. Select Bravo_Standard, and the system displays the following:
Figure 65 — Bravo_Standard Tab
_____________________
_____________________
84
Check Point Security Engineering
32. In the Bravo_Standard Security Policy page, click the Install Policy button:
Figure 66 — Install Policy
33. Click Install, to install the Bravo_Standard Security Policy.
_____________________
_____________________
85
Check Point Security Engineering
34. Confirm that the Security Policy for Bravo installed successfully:
Figure 67 — Install Policy Details
_____________________
_____________________
86
Check Point Security Engineering
35. In the navigation pane, select the Gateways & Servers tab.
36. Confirm that all Check Point modules show a status of OK:
Figure 68 — Gateway & Servers
_____________________
_____________________
87
Check Point Security Engineering
END OF LAB 1.1
_____________________
_____________________
88
Check Point Security Engineering
Hotfixes
Hotfixes are updates that are released to correct an issue discovered within the operating
system or software. They can be released to address security vulnerabilities and
inconsistencies or to provide enhancements and improvements. A Hotfix Accumulator (HFA)
is a collection of stability and quality fixes that resolve multiple issues in different products.
When installed, HFAs will overwrite the current hotfixes installed on the system. The name of
a hotfix identifies the version it is compatible with. For example, R80_JUMBO_HF_1_Bundle
_190 is a very large bundle of hotfixes for R80. In addition to hotfixes, some versions may
have new features which require the installation of an Add-on. Check Point recommends
installing the add-on only if the features enabled are required.
When providing a fix to customers, Check Point supplies the updated file and installation
package which will interactively install the fix. Gaia automatically provides a list of update
packages available for download that are relevant to the operating system version installed.
The Status and Actions page of CPUSE displays hotfixes that are available for download and
hotfixes that have previously been downloaded, imported, and installed.
Figure 69 — CPUSE
T h e C P U S E A ge n t
CPUSE is an advanced and intuitive tool used to update the Gaia operating system and Check
Point software products. It supports the deployment of major and minor software releases,
single hotfixes, and HFAs. A major release introduces new functionalities and technologies.
Examples of a major release would be R77 and R80. Minor releases include the latest fixes
released to customers. R77.30 is an example of a minor release.
_____________________
_____________________
89
Check Point Security Engineering
The CPUSE tool automatically locates and displays software update packages and full images
relevant to the Gaia operating system version installed on the computer. It also considers the
role of the computer (management server, gateway, or Gaia standalone) and other properties.
The CPUSE agent is installed on every Gaia-based machine and is responsible for all software
deployment on that machine. The machine must be connected to the Internet to obtain software
updates from the Check Point Cloud.
Prior to every installation, CPUSE runs several verification tests to ensure that the package is
compatible and can be installed on the machine without conflicts. To view available packages,
in the Gaia Portal navigate to the Upgrades (CPUSE) section and select Status and Actions. All
hotfix and minor version packages are displayed in categories and are filtered to show
recommended packages only by default.
Check Point recommends downloading the latest build of the CPUSE agent prior to applying a
hotfix. In most cases, the latest build is downloaded automatically. To check the current build
of the agent, click the Hotfixes link next to the CPUSE version number, near the top of the
Status and Actions page. A pop-up window will appear displaying hotfix information. The
installed build of the deployment agent is displayed at the bottom of the window. The current
build can also be checked by using Clish and running the following command:
HostName:0>show installer status build
Figure 70 — CPUSE > Status and Actions > Hotfixes Link
NOTE
The latest build of CPUSE is gradually released to all customers; therefore,
all machines may not receive the latest build at the same time.
Hotfixes can be scheduled to download automatically, manually, or periodically; however, full
installation and upgrade packages must be installed manually.
_____________________
_____________________
90
Check Point Security Engineering
Download and Install Hotfixes
Hotfixes are applied by first downloading or importing the CPUSE package and then installing
the package on the machine. In the Gaia Portal, click the lock icon to obtain the lock over the
configuration database before applying a hotfix and then navigate to the Status and Actions
page.
Every hotfix displayed as available for download may or may not be allowed or needed for
installation onto your machine. Check Point recommends verifying the package to determine if
it can be installed without conflicts. To verify a package, perform one of the following actions:
• Select the package and click the More button on the toolbar. From the list of options,
click Verifier. Or,
• Right-click the package and click Verifier.
The Verifier Results window will display, indicating whether or not installation is allowed. If
installation is allowed, proceed to download the package.
The download progress is displayed in the Status column of the hotfix. The download may be
paused at any time. When paused, the status of the package will change to Pausing Download
and then to Partially Downloaded and may be resumed at any time.
Install the package after it has been successfully downloaded. To install a downloaded
package, select the package and click the Install Update button, or right-click the package and
select Install Update. Hotfixes can also be downloaded and installed all at once, by simply
clicking the Install Update button.
Most Jumbo Hotfix packages and private hotfix packages are posted to the Check Point Cloud.
Click the Add Hotfixes from the cloud button to search, or enter a package identifier posted to
the cloud. Contact Check Point Support to get the package’s CPUSE Identifier, or copy and
paste the file name from the Check Point Download Center. Use the CPUSE Identifier search
string to add the relevant CPUSE package from the Check Point Cloud. Once the package is
added, its status will display as Available for Download.
To import a package, click the More button located on the toolbar of the Status and Actions
page, and select Import Package. In the Import Package window, browse to the package file,
and click Upload.
_____________________
_____________________
91
Check Point Security Engineering
CPUSE Software Updates Policy
The WebUI offers different methods for downloading hotfixes via CPUSE:
• Manually — This is the default method. Downloads can also be manually deployed in
Clish.
• Scheduled — The CPUSE agent can check for and download hotfixes at a specified
time, such as daily, weekly, monthly, or on a selected date.
• Automatic — The CPUSE agent will check for updates every three hours and
automatically download hotfixes as they become available.
The CPUSE agent can also send email notifications to administrators, which can inform them
of update events, such as when new packages are available for download and the success or
failure of a package installation. To define the CPUSE update policy and configure email
notifications, under the Upgrades (CPUSE) section, select Software Updates Policy.
Figure 71 — Software Updates Policy
Software update packages can be imported and installed offline if:
• the Gaia machine has no access to the Check Point Cloud.
• the desired CPUSE package is not available in the Check Point Cloud.
• the administrator prefers to manually import the CPUSE package.
_____________________
_____________________
92
Check Point Security Engineering
T h e C e n t r a l D e p l oym e n t To o l
System Administrators can automatically install CPUSE offline packages on multiple Security
Gateways and cluster members at the same time using the Central Deployment Tool (CDT).
The CDT is a utility that runs on Gaia operating system Security Management Servers and
Multi-Domain Servers using software versions R77.30 and higher. The tool communicates
with gateways and cluster members over SIC via TCP port 18209. Automatic installation on
multiple managed gateways and cluster members is supported for the following package types:
•
•
•
•
Upgrades to R77.30
Minor version upgrades
Hotfixes
Jumbo Hotfixes (bundles) or HFAs
Prior to using the CDT, all Security Gateways and cluster members must be already installed
and configured with SIC established and Security Policies installed. There are also several file
requirements that must be met before the utility can be run. This includes the CDT executable
and configuration files as well as several optional shell script files. The latest build of the
CPUSE agent is also required. CDT uses CPUSE agents to perform package installation on
remotely managed gateways and cluster members. The entire process is monitored and
managed by the CDT. To begin using the CDT, connect to the command line on the
management server, log into Expert mode, and then access the directory that contains the CDT
files.
Do not use CDT for clean installs of a major version. Also, CDT does not support upgrades or
installs of ClusterXL in Load Sharing mode. For more detailed information regarding the CDT
utility, refer to the Check Point Central Deployment Tool Administration Guide.
Lab 1.2
Applying Check Point Hotfixes
Lab 1.3
Configuring a New Security Gateway Cluster
_____________________
_____________________
93
L
A
B
Applying Check Point Hotfixes
1.2
In this lab, you will use the CPUSE utility to patch existing R80.10 gateways.
Ta sks :
• Install the hotfix on the Security Gateway.
Pe r for ma n c e Ob j ec t ive s:
• Perform an on-line jumbo hotfix application to the Security Gateway Cluster.
_____________________
_____________________
94
Check Point Security Engineering
Installing the Hotfix on the Security Gateways
Locate the hotfixes available for an R80.10 Security Gateway and perform an upgrade on both Alpha
Cluster members.
1.
In SmartConsole, define a new Host object with the following information:
Name: A-GUI-NAT
Comment: NATed Alpha SmartConsole
Color: Orange
IP Address: 203.0.113.1
Figure 72 — New Host Configured
2.
Click OK, and the system displays the following warning:
Figure 73 — SmartConsole
3.
Click Yes.
_____________________
_____________________
95
Check Point Security Engineering
In the Bravo Security Policy, add the new Host to the Source field of the Management rule:
5. Publish the changes.
6. Install the Bravo Security Policy.
7. From A-GUI, use HTTPS to log into the Gaia Portal on B-GW (203.0.113.100) and confirm
connectivity:
4.
Figure 74 — Gaia Portal
_____________________
_____________________
96
Check Point Security Engineering
8.
Next, use HTTPS to connect to the Gaia Portal of A-GW-01:
9.
In the navigation pane, locate the Upgrades (CPUSE) section.
_____________________
_____________________
97
Check Point Security Engineering
10. In the navigation pane, select Status and Actions. The system displays the following page:
Figure 75 — Status and Actions
11. Identify the hotfix to apply.
NOTE
In this lab, apply the latest Jumbo Hotfix available for your Security Gateway,.
_____________________
_____________________
98
Check Point Security Engineering
12. Right-click the hotfix to apply:
Figure 76 — CPUSE Options
13. Select Install Update, and the system displays the following message:
Figure 77 — Package Install
_____________________
_____________________
99
Check Point Security Engineering
14. Click OK, and the system begins downloading and then installing the selected hotfix:
Figure 78 — CPUSE Download Progress
NOTE
When the system finishes the installation of the hotfix, it reboots automatically.
_____________________
_____________________
100
Check Point Security Engineering
15. After reboot, the system displays the Gaia Portal login page:
Figure 79 — Gaia Portal Login
16. Use the following information to log into the Gaia Portal:
Username: admin
Password: Chkp!234
_____________________
_____________________
101
Check Point Security Engineering
17. In the Upgrades (CPUSE) > Status and Actions page, confirm that the hotfix installed displays the
following status:
Installed, self-test passed...
Figure 80 — Upgrades (CPUSE) - Status and Actions
18. Next, repeat this section to upgrade A-GW-02 with the same hotfix you applied to A-GW-01.
END OF LAB 1.2
_____________________
_____________________
102
L
A
B
Configuring a New Security
Gateway Cluster
1.3
Install and configure a second cluster member for Bravo. Convert the existing Bravo gateway to be a
cluster member and upgrade it to R80.10. Complete the configuration by defining a Bravo Cluster object in
SmartConsole.
Ta sks :
• Install a second Security Gateway at the Bravo site.
• Reconfigure the Primary Gateway for integration into the cluster.
• Define the Bravo Security Gateway Cluster.
• Upgrade the old Bravo Security Gateway from R77.30 to R80.10.
• Verify Bravo Gateway Cluster status of Active/Standby.
Pe r for ma n c e Ob j ec t ive s:
• Install the remote Security Gateway in a distributed environment and establish SIC.
• Configure a new Security Gateway cluster object and verify its status.
_____________________
_____________________
103
Check Point Security Engineering
Installing a Second Security Gateway
In this section you will install and configure the second Bravo Security Gateway, which will be managed
by the Alpha Security Management Server.
1.
In VMware, verify that the following Virtual Machine (VM) has been created by your instructor:
• Name: B-GW-02
• OS: Other
• Version: Other
• Disk Space: 60GB
• Memory: 2GB
• Four interfaces
◦ eth0
• Do not power on
◦ eth1
• Connect at power on
• LAN 21
◦ eth2
• Connect at power on
• LAN 2
◦ eth3
• Connect at power on
• vmnet8
NOTE
Your classroom configuration may be different. Check with your instructor before
continuing to the next step.
2.
Before powering on your VM, verify that it is configured as defined above.
_____________________
_____________________
104
Check Point Security Engineering
3.
Power on the B-GW-02 virtual machine, and the Welcome to Check Point Gaia R80.10 screen appears:
Figure 81 — Welcome to Check Point Gaia R80.10
4.
Highlight the following option:
Install Gaia on this system
5.
Press the Enter key, to launch the installation.
_____________________
_____________________
105
Check Point Security Engineering
6.
When the system is prepared for you to begin the operating system installation, it displays the
Welcome screen:
Figure 82 — Welcome
7.
Tab to OK, and press Enter. The system displays the Keyboard Selection screen:
Figure 83 — Keyboard Selection
8.
Select the keyboard type to suit your region.
_____________________
_____________________
106
Check Point Security Engineering
9.
Tab to OK, and press Enter. The system displays the Partitions Configuration screen:
Figure 84 — Partitions Configuration
_____________________
_____________________
107
Check Point Security Engineering
10. Tab to OK, and press Enter. The system displays the Account Configuration screen:
Figure 85 — Account Configuration
NOTE
Again, at this step, you are configuring the password for the admin user, the default
OS level administrator.
11. Enter and confirm Chkp!234 as the admin account password.
NOTE
Verify that NumLock is on. It is not on by default after installation. If you haven’t
already turned it on, do so now and re-enter and confirm your password. If you enter
this password without turning NumLock on, you will not be able to log into the
system.
12. Tab to OK, and press Enter. The system displays the Management Port screen.
_____________________
_____________________
108
Check Point Security Engineering
13. Use the arrow keys to highlight eth3:
Figure 86 — Management Port
NOTE
In this classroom environment, all external interfaces are eth3. This Security
Gateway is remotely managed by the A-SMS, so the management interface must be
the external interface.
14. Tab to OK, and press Enter. The system displays the Management Interface screen.
_____________________
_____________________
109
Check Point Security Engineering
15. Use the following information to configure the Management Interface screen:
IP address: 203.0.113.103
Netmask: 255.255.255.0
Default gateway: 203.0.113.254
Figure 87 — Management Interface
_____________________
_____________________
110
Check Point Security Engineering
16. Tab to OK, and press Enter. The system displays the Confirmation screen:
Figure 88 — Confirmation
17. In the Confirmation screen, tab to OK, and press Enter.
18. After the drive is formatted and the installation is complete, the system displays the following screen:
Figure 89 — Installation Complete
_____________________
_____________________
111
Check Point Security Engineering
19. Press Enter, to reboot your system.
20. After reboot, the system displays the following prompt:
Figure 90 — Login Prompt
_____________________
_____________________
112
Check Point Security Engineering
Configuring the Bravo Security Gateway 
with the First Time Configuration Wizard
Follow these steps to configure the branch office Security Gateway and activate its default trial license.
NOTE
Your instructor will provide alternate directions if you use other licenses.
From the A-GUI Virtual Machine, launch an Internet browser, such as Firefox or Internet Explorer.
2. In the address field, type the following:
1.
https://203.0.113.103
NOTE
Be sure that you are using HTTPS.
Press Enter, and your browser should warn you that the site’s Security Certificate is from an untrusted
source.
4. Ignore this warning and continue to the Login screen:
5. Log into B-GW-02 with the following credentials:
3.
Username: admin
Password: Chkp!234
_____________________
_____________________
113
Check Point Security Engineering
6.
Press Enter, and the system displays the following window:
Figure 91 — Gaia First Time Configuration Wizard
_____________________
_____________________
114
Check Point Security Engineering
7.
Click Next, and the system displays the Deployment Options page:
Figure 92 — Deployment Options
8.
Verify that the following option is selected:
Continue with Gaia R80.10 configuration
_____________________
_____________________
115
Check Point Security Engineering
9.
Click Next, and the system displays the Management Connection page:
Figure 93 — Management Connection
10. Use the information below to verify that the Security Gateway’s network connection is configured
properly:
Interface: eth3
Configure IPv4: Manually
Configure IPv4: 203.0.113.103
Subnet Mask: 255.255.255.0
Default Gateway: 203.0.113.254
Configure IPv6: Off
_____________________
_____________________
116
Check Point Security Engineering
11. Click Next, and the system displays the Connection to UserCenter page:
Figure 94 — Connection to UserCenter
12. Click Next, and the system displays the Device Information page.
13. Use the following information to configure the Device Information page:
Host Name: B-GW-02
Domain Name: Leave Blank
_____________________
_____________________
117
Check Point Security Engineering
14. Click Next, and the system displays the Date and Time Settings page:
Figure 95 — Date and Time Settings
15. Verify that the time and date is correct for your area.
_____________________
_____________________
118
Check Point Security Engineering
16. Click Next, and the system displays the Installation Type page:
Figure 96 — Installation Type
_____________________
_____________________
119
Check Point Security Engineering
17. Select Security Gateway or Security Management, and click Next. The system displays the 
Products page.
18. On the Products page, uncheck the Security Management option.
19. Use the information below to configure the Products page:
Security Gateway: Selected
Security Management: Deselected
Unit is a part of cluster type: ClusterXL
Automatically download Blade Contracts and 
other important data (highly recommended): Selected
Figure 97 — Products
_____________________
_____________________
120
Check Point Security Engineering
20. Click Next, and the system displays the Secure Internal Communications (SIC) page:
Figure 98 — Secure Internal Communications (SIC)
21. Enter and confirm sic123 as the Activation Key.
_____________________
_____________________
121
Check Point Security Engineering
22. Click Next, and the system displays the Summary page:
Figure 99 — Summary
23. Click Finish, and the system asks you if you want to start the configuration:
Figure 100 — First Time Configuration Wizard
24. Click Yes.
25. Once the configuration process is complete, the system prompts you with a restart message:
Figure 101 — First Time Configuration Wizard
_____________________
_____________________
122
Check Point Security Engineering
26. Click OK, and the system displays the Login window after reboot:
Figure 102 — Login Window
1.
Log into B-GW-02 with the following credentials:
Username: admin
Password: Chkp!234
2.
Click the Log In button, and the Gaia Portal displays the configuration settings of the newly configured
Security Gateway.
_____________________
_____________________
123
Check Point Security Engineering
Using the Gaia Portal to Configure 
the Security Gateway
Define the interfaces and login message for the second Bravo gateway.
1.
Review Gaia Portal’s Overview page:
Figure 103 — Overview
2.
In the Navigation pane, identify the Network Management section.
_____________________
_____________________
124
Check Point Security Engineering
3.
Click Network Interfaces, and the system displays the Network Interfaces page:
Figure 104 — Network Interfaces
NOTE
Notice how only eth3 is configured. This is your management interface. In this lab,
this also represents your external network.
_____________________
_____________________
125
Check Point Security Engineering
4.
Select eth1, and click Edit. The system displays the Edit window:
Figure 105 — Edit eth1
5.
Use the information below to configure eth1:
Enable: Checked
Comment: Internal
IPv4 Address: 192.168.21.3
Subnet Mask: 255.255.255.0
_____________________
_____________________
126
Check Point Security Engineering
6.
Click OK, and the system saves the new eth1 configuration.
Figure 106 — Network Interfaces
Double-click eth3, and the system displays a warning.
8. Click OK, and the system displays the Edit window.
9. Use the information below to configure eth3:
7.
Enable: Checked
Comment: External
IPv4 Address: 203.0.113.103
Subnet Mask: 255.255.255.0
_____________________
_____________________
127
Check Point Security Engineering
10. Verify that the newly configured eth3 appears as follows:
Figure 107 — Edit eth3
11. Click OK, to return to the Network Interfaces page.
12. Select eth2, and click Edit.
13. Use the information below to configure eth2:
Enable: Checked
Comment: Sync
IPv4 Address: 192.168.20.3
Subnet Mask: 255.255.255.0
14. Click OK.
_____________________
_____________________
128
Check Point Security Engineering
15. Verify that your interfaces appear as follows:
Figure 108 — Network Interfaces
16. In the Management Interface section of the page, notice that the current Management Interface is set 
to eth3.
_____________________
_____________________
129
Check Point Security Engineering
17. In the Navigation pane, under Network Management, click IPv4 Static Routes:
Figure 109 — Network Management - IPv4 Static Routes
18. Verify that the default gateway is 203.0.113.254.
_____________________
_____________________
130
Check Point Security Engineering
19. Click the Add Multiple Static Routes button.
20. Add the following Static routes:
10.1.1.0/24 203.0.113.1
192.168.11.0/24 203.0.113.1
192.168.12.0/24 203.0.113.1
Figure 110 — Add Multiple Routes
_____________________
_____________________
131
Check Point Security Engineering
21. Click Save, and the system adds the static routes:
Figure 111 — Network Management - IPv4 Static Routes Configured
_____________________
_____________________
132
Check Point Security Engineering
22. In the Navigation pane, under System Management, click Messages:
Figure 112 — System Management - Messages
_____________________
_____________________
133
Check Point Security Engineering
23. In the Banner Message field add the following text:
B-GW-02

Unauthorized access of this server is prohibited and punishable by law.
Figure 113 — System Management - Messages
24. Click the Apply button.
25. From the toolbar, click Sign Out.
_____________________
_____________________
134
Check Point Security Engineering
Re-configuring the Primary Gateway
Reconfigure the primary Security Gateway at Bravo to function as part of a cluster.
1.
From A-GUI, use HTTPS to connect to the Gaia Portal on B-GW (203.0.113.100):
Figure 114 — Gaia Portal - Overview
In the navigation pane, select Network Management > Hosts and DNS.
3. In the Hosts and DNS page, change the Host Name to the following:
2.
B-GW-01
_____________________
_____________________
135
Check Point Security Engineering
4.
Click Apply.
Figure 115 — Hosts and DNS Configured
5.
In the navigation pane, select System Management > Messages.
_____________________
_____________________
136
Check Point Security Engineering
6.
Modify the Banner Message to reflect the new name of this Security Gateway (B-GW-01):
Figure 116 — Messages Configured
7.
Log out of the portal on B-GW-01.
_____________________
_____________________
137
Check Point Security Engineering
8.
From the virtual system of the first Security Gateway (B-GW-01), run the cpconfig script:
Figure 117 — cpconfig
From the Configuration Options, review the available options.
10. If option six reads as follows, type 6 and press Enter:
9.
6 Enable Cluster membership for this gateway
If option six displays the following, exit cpconfig and skip to step 13:
Disable Cluster membership for this gateway
11. Press Y to confirm that you want to enable the cluster membership:
Figure 118 — Cluster Membership Enabled
12. Reboot B-GW-01 to enable the changes.
_____________________
_____________________
138
Check Point Security Engineering
13. At A-GUI, open SmartConsole, and remove B-GW from all rules in all Rule Bases.
14. If configured, remove all references of B-GW from the IPSec VPN > MyIntranet > Participating
Gateways fields.
15. Disable the Stealth Rule.
16. In the toolbar, click the application Menu button.
17. Select Manage Policies and Layers, and the system displays the following:
Figure 119 — Manage Policies and Layers
18. Identify the policies that indicate B-GW as an Installation Target.
_____________________
_____________________
139
Check Point Security Engineering
19. Select the Bravo_Standard policy and click the Edit icon. The system displays the following:
Figure 120 — Policy - General
20. In the navigation pane, select installation Targets.
_____________________
_____________________
140
Check Point Security Engineering
21. Remove the B-GW object from the Specific Gateways list.
22. Select the following option:
All Gateways
Figure 121 — Policy - Installation Targets Configured
23. Click OK.
_____________________
_____________________
141
Check Point Security Engineering
24. Perform the above edits on all other policies that have B-GW as a Installation Target:
Figure 122 — Manage Policies and Layers
25. Click Close.
26. Edit the B-INT-NET object.
_____________________
_____________________
142
Check Point Security Engineering
27. In the NAT page, change the Install On Gateway setting to All:
Figure 123 — Network Configured
28. Edit all remaining objects that reference B-GW.
29. Publish the changes to the database.
30. Next, locate the B-GW object in the objects list.
31. Right-click B-GW and select Delete. The system displays the following window:
Figure 124 — SmartConsole
32. Click Yes.
33. Publish the changes to the database.
_____________________
_____________________
143
Check Point Security Engineering
34. From the Clish prompt on B-GW-01, type the following, and press Enter:
set interface eth3 ipv4-address 203.0.113.102 mask-length 24
Figure 125 — set interface
35. Now, run the following command to reconfigure the internal interface:
set interface eth1 ipv4-address 192.168.21.2 mask-length 24
36. Run the following command to reconfigure the sync interface:
set interface eth2 ipv4-address 192.168.20.2 mask-length 24
37. At the prompt, type the following and press Enter:
save config
Figure 126 — Save Config
38. Run cpconfig to reset SIC, using sic123 for the activation key.
39. Exit cpconfig.
40. At the prompt, type the following, and press Enter.
exit
_____________________
_____________________
144
Check Point Security Engineering
41. After the services restart, use HTTPS to log back into the Gaia Portal on B-GW-01 (203.0.113.102):
42. Confirm that the newly configured IP addresses appear as follows:
Figure 127 — Re-configured B-GW-01 Interfaces
43. Enable the Sync interface, if it is not already enabled.
_____________________
_____________________
145
Check Point Security Engineering
Configuring the Alpha Security Policy to Manage
the Remote Security Gateway Cluster
Define the remote Security Gateway objects and incorporate it into the Alpha and Bravo Security Policies.
From SmartConsole on A-GUI, expand the Objects pane from the right sidebar.
2. In the Home page of the Objects pane, click New > More > Network Object > 
Gateways & Servers.
3. Select Gateway.
4. Use the information below to configure the new Security Gateway object:
1.
Name: B-GW-01
Color: Firebrick
IPv4: 203.0.113.102
Comment: Bravo Security Gateway Cluster Member - One
Version: R77.30
_____________________
_____________________
146
Check Point Security Engineering
5.
Verify that the new object appears as follows:
Figure 128 — Check Point Gateway - General Properties Configured
NOTE
Use the IP address of the management interface to define the cluster member
gateways. In the case of the Bravo cluster, that’s the external interface.
_____________________
_____________________
147
Check Point Security Engineering
6.
Click OK, and the system displays a message indicating that no interfaces are defined.
NOTE
You will define the interfaces later, after establishing SIC. You are defining this
object here to make the Alpha cluster aware of the Bravo members. This will ensure
that A-GW-Cluster allows control connections to and from the Bravo gateways.
Click Yes, to clear the message.
8. Use the information below to configure the new Security Gateway object:
7.
Name: B-GW-02
Color: Firebrick
IPv4: 203.0.113.103
Comment: Bravo Security Gateway Cluster Member - Two
Version: R80.10
_____________________
_____________________
148
Check Point Security Engineering
9.
Verify that the new object appears as follows:
Figure 129 — Check Point Gateway - General Properties Configured
10. Click OK.
11. Click Yes, to clear the message.
_____________________
_____________________
149
Check Point Security Engineering
12. Publish the changes to the database:
Figure 130 — SmartConsole
13. Install the Alpha Security Policy:
Figure 131 — Install Policy
14. Next, edit the B-GW-01 object.
15. Click the Communication button.
_____________________
_____________________
150
Check Point Security Engineering
16. Enter and confirm the following One Time Password to establish SIC:
sic123
Figure 132 — Trusted Communication
_____________________
_____________________
151
Check Point Security Engineering
17. Click OK, and the system displays imported interface information:
Figure 133 — Get Topology Results
18. Click Close.
19. Click OK.
20. In the Bravo Rule Base, add B-GW-01 to the following rules:
◦ Management
◦ Stealth
_____________________
_____________________
152
Check Point Security Engineering
21. Install the Bravo Security Policy on B-GW-01:
Figure 134 — Install Policy
22. From A-GUI, use HTTPS to connect to B-GW-01 (203.0.113.102):
Figure 135 — Gaia Portal Login
23. Log into B-GW-01 as admin.
_____________________
_____________________
153
Check Point Security Engineering
24. In the Gaia Portal, navigate to Upgrades (CPUSE) > Status and Actions:
Figure 136 — Upgrade (CPUSE) - Status and Actions
NOTE
If the CPUSE page fails to populate with available packages after some time, it may
be updating the Deployment Agent. If this occurs, log out of the Gaia Portal and wait
about 60 seconds. Then, log back into the Gaia Portal as admin and attempt this step
again.
_____________________
_____________________
154
Check Point Security Engineering
25. In the Check Point Upgrade Service Engine (CPUSE) page, locate the Major Versions list of available
upgrade packages.
26. Select the following package:
R80.10 Fresh Install and Upgrade from R7X
27. Right click the package to install:
Figure 137 — Package Menu Options
_____________________
_____________________
155
Check Point Security Engineering
28. Select Download, and the system downloads the upgrade package to install:
Figure 138 — Upgrade Package Downloaded
_____________________
_____________________
156
Check Point Security Engineering
29. Right-click the downloaded package:
Figure 139 — Downloaded Package Menu Options
30. Select the Upgrade option, and the system displays the following message:
Figure 140 — Image Upgrade
31. Click OK, to begin the upgrade process.
_____________________
_____________________
157
Check Point Security Engineering
32. After the system reboots, log into B-GW-01 as admin:
Figure 141 — Gaia Portal Login
33. Navigate to the Upgrades (CPUSE) - Status and Actions page and confirm that the upgrade completed
successfully:
Figure 142 — Upgrades (CPUSE) - Status and Actions
_____________________
_____________________
158
Check Point Security Engineering
34. From SmartConsole, select the Gateways & Servers tab.
35. Confirm that the B-GW-01 object has a status of OK.
Figure 143 — Gateways & Servers
NOTE
It is normal for the B-GW-01 object to still appears as a version R77.30 Security
Gateway in this view, at this time. This information will be updated with the correct
information after the server responds to a specific call for information.
36. Select the B-GW-01 object.
_____________________
_____________________
159
Check Point Security Engineering
37. In the Summary tab, click the Device & License Information link. The system displays the following
window:
Figure 144 — Device & License Information
38. Notice that the version now shows the correct information.
39. Close the Device & License Information window.
_____________________
_____________________
160
Check Point Security Engineering
40. Edit the B-GW-01 object, and the system displays the following message:
Figure 145 — Check Point SmartConsole
NOTE
If the B-GW-01 object does not show a version of R80.10, change it manually here.
41. Click OK, to clear the message.
_____________________
_____________________
161
Check Point Security Engineering
42. Confirm that the Platform Version now shows R80.10:
Figure 146 — Check Point Gateway - General Properties Configured
43. Click OK.
44. Next, establish SIC with B-GW-02, using sic123 as the one-time password.
45. Publish the changes to the database.
46. Install the Alpha_Standard Security Policy.
_____________________
_____________________
162
Check Point Security Engineering
47. From the Home page of the Objects pane, click New > More > Network Object > 
Gateways & Servers:
Figure 147 — Objects Menu
48. Select Cluster, and the system displays the following window:
Figure 148 — Check Point Security Gateway Cluster Creation
_____________________
_____________________
163
Check Point Security Engineering
49. Select the following option and click Classic Mode:
Don’t show this again.
50. Use the information below to configure the new Security Gateway object:
Name: B-GW-Cluster
IPv4 Address: 203.0.113.100
Comment: Bravo Security Gateway Cluster
Version: R80.10
Network Security: Firewall
Figure 149 — Check Point Gateway - General Properties
_____________________
_____________________
164
Check Point Security Engineering
51. Verify that the version selected for the Bravo Cluster object is defined as R80.10.
52. In the navigation pane, select Cluster Members:
Figure 150 — Gateway Cluster Properties - Cluster Members
53. In the Cluster Members page, click the Add button.
_____________________
_____________________
165
Check Point Security Engineering
54. Select Add Existing Gateway, and the system displays the following window:
Figure 151 — Add Gateway to Cluster
55. Select B-GW-01.
56. Click OK, and the system displays the following message:
Figure 152 — Check Point SmartConsole
_____________________
_____________________
166
Check Point Security Engineering
57. Click Yes, and the system adds the gateway to the Member Gateways list:
Figure 153 — Member Gateways - Gateway Added
_____________________
_____________________
167
Check Point Security Engineering
58. Next, add B-GW-02 to the Member Gateways list:
Figure 154 — Member Gateways - Gateways Added
59. Click OK.
_____________________
_____________________
168
Check Point Security Engineering
60. In the navigation pane, select Network Management:
Figure 155 — Network Management
_____________________
_____________________
169
Check Point Security Engineering
61. Click the Get Interfaces button, and the system retrieves and displays the interface information from
the cluster members:
Figure 156 — Network Management - Get Interfaces
_____________________
_____________________
170
Check Point Security Engineering
62. Double-click eth1, to edit the interface.
63. Use the information below to configure eth1:
Name: eth1
Comment: Internal
Network Type: Cluster
Virtual IPv4: 192.168.21.1/24
Figure 157 — Network eth1
64. Confirm that the interface Topology settings are as follows:
Leads To: This Network (Internal)
Security Zone: None
Anti-Spoofing: Prevent and Log
_____________________
_____________________
171
Check Point Security Engineering
65. Double-click eth2, to edit the interface.
66. Use the information below to configure eth2:
Name: eth2
Comment: Sync
Network Type: Sync
Virtual IPv4 Address: N/A
Figure 158 — Network eth2
67. Confirm that the interface Topology settings are as follows:
Leads To: This Network (Internal)
Security Zone: None
Anti-Spoofing: Prevent and Log
_____________________
_____________________
172
Check Point Security Engineering
68. Double-click eth3, to edit the interface.
69. Use the information below to configure eth3:
Name: eth3
Comment: External
Network Type: Cluster
Virtual IPv4: 203.0.113.100/24
Figure 159 — Network eth3
70. Confirm that the interface Topology settings are as follows:
Leads To: Internet (External)
Security Zone: None
Anti-Spoofing: Prevent and Log
_____________________
_____________________
173
Check Point Security Engineering
71. Confirm that the interfaces are configured as follows:
Figure 160 — Network Management Configured
_____________________
_____________________
174
Check Point Security Engineering
72. Click OK, and verify that the new B-GW-Cluster object appears in the Gateways and Servers section
of the Objects pane:
Figure 161 — Security Policies - Access Control
73. Select the Bravo Security Policy.
_____________________
_____________________
175
Check Point Security Engineering
74. Remove all Security Gateway objects from the Stealth and Management rules in the Bravo Security
Policy:
Figure 162 — Security Gateway Removed from Stealth and Management Rules
75. Add the B-GW-Cluster to the Destination column of the Stealth and Management rules:
Figure 163 — Stealth Rule Modified
NOTE
If the Stealth Rule is disabled here, enable it before continuing to the next step.
_____________________
_____________________
176
Check Point Security Engineering
76. From the Application Menu, select Manage Policies and Layers. The system displays the following
window:
Figure 164 — Manage Policies and Layers
_____________________
_____________________
177
Check Point Security Engineering
77. Select the Bravo_Standard policy.
78. Click the Edit button, and the system displays the Policy window:
Figure 165 — Policy
_____________________
_____________________
178
Check Point Security Engineering
79. In the navigation pane, select Installation Targets.
80. Select the following option:
Specific Gateways
81. Add B-GW-Cluster to the Specific Gateways list:
Figure 166 — Policy Configured
82. Click OK.
83. Click Close.
_____________________
_____________________
179
Check Point Security Engineering
84. Publish the changes to the database.
85. Install the Bravo Security Policy.
86. Verify that only the B-GW-Cluster (203.0.113.100) is listed as a policy target.
87. Click the Install button.
88. From the B-Host virtual machine, launch a web browser.
89. Use HTTP to connect to A-DMZ (192.168.12.101).
90. In SmartConsole, select Logs & Monitor from the Navigation bar:
Figure 167 — Logs & Monitor - Logs
_____________________
_____________________
180
Check Point Security Engineering
91. View the log showing the accepted HTTP traffic from B-Host to A-DMZ:
Figure 168 — Log Details
92. Close the log file.
_____________________
_____________________
181
Check Point Security Engineering
END OF LAB 1.3
_____________________
_____________________
182
Check Point Security Engineering
CLI Commands
Check Point Gaia’s powerful CLI commands and Clish shell are designed for users who prefer
to interact with the system by executing commands or scripts.The most common operations
are:
•
•
•
•
•
add
set
show
save
delete
CLI commands can be entered in two modes; Standard mode and Expert mode.
Standard mode is the default Check Point shell (Clish) and provide commands for easy
configuration and routine administration such as cpstart and cpstop. However, most
system commands are not supported. The prompt for standard mode commands is:
[hostname]>
Expert mode allows advanced Check Point system and underlying Linux functions access to
the Gaia operating system. To enter Expert mode, use the <expert> command in Clish. This
command opens the Bash shell. The prompt for Expert mode is: [Expert@hostname]#
An Expert mode user can run Linux commands such as ls, cd and pwd as they would on any
Linux system to directly manipulate the Gaia operating system file system. Basic Check Point
commands such as fw ver and cpconfig can also be run from the Expert mode CLI,
similar to Gaia Clish.
CLI-inclined users can also use CLI commands and tools in Export mode to create automation
scripts. These tools include:
• dbedit — creates and configures objects and rules in the database for the Security
Policy.
• fwm load — installs the specified Security Policy on Security Gateways.
• send_command — runs functions which are not included with standard Check Point
CLI commands and tools.
CLI commands and multiple shells are available for all Check Point Gaia-based operating
systems, software blades and features. Several useful commands are noted in this section,
however many other commands are discussed in greater detail throughout this course.
_____________________
_____________________
183
Check Point Security Engineering
Environment Commands
Use these commands to set the CLI environment for a user. The syntax to set the client
environment is: set clienv <parameter>
To save the client environment permanently:
save client
To acquire the configuration lock from another administrator:
lock database override
To set inactivity timeout when working with CLI:
set inactivity-timeout <value>
With this command, <value> is the timeout in minutes.
Parameter
Description
config-lock [on|off]
Default value of the Clish configuration lock parameter.
If set to on, Clish will lock the configuration and no
configuration changes can be made in the WebUI.
debug [0 - 6]
Debug level. Zero is the default level; do not debug,
display error messages only. Level 6 will show handler
invocation parameters and results.
echo-cmd [on|off]
When set to on, echoes all commands before executing
them. The default is off.
on-failure [continue|
stop]
When the system encounters an error, commands from a
file or script will either continue to run or stop running.
The default is stop.
output [pretty
|structured|xml]
Determines the command line output format. The
default is pretty.
prompt <value>
Command prompt string. Defines the appearance of the
command prompt. Can consist of any printable
characters and a combination of variables.
rows <integer>
Number of rows to display in the terminal window.
syntax-check [on|off]
When set to on, puts the shell into syntax-check mode.
Commands are checked syntactically and are not
executed, but values are validated. The default is off.
Table 3: Environment Command Parameters
_____________________
_____________________
184
Check Point Security Engineering
System Configuration Commands
Gaia system configuration settings can be saved as a ready-to-run CLI script.
To save the system configuration to a CLI script:
save configuration <scriptname>
To restore configuration settings:
load configuration <scriptname>
To see the latest configuration settings:
show configuration
This example shows part of the configuration settings as last saved to a CLI script:
mem103> show configuration
#
# Configuration of mem103
# Language version: 10.0v1
#
Exported by admin on Mon Mar 19 15:06:22 2016
#
set hostname mem103
set timezone London / Europe
set password-controls min-password-length 6
set password-controls complexity 2
set password-controls palindrome-check true
set password-controls history-checking true
set password-controls history-length 10
set password-controls password-expiration never
set ntp active off
set router-id 6.6.6.103
set IPv6-state off
set snmp agent off
set snmp agent-version any
set snmp community public read-only
set snmp traps trap authorizationError disable
set snmp traps trap coldStart disable
set snmp traps trap configurationChange disable
_____________________
_____________________
185
Check Point Security Engineering
System Management Commands
There are a multitude of system management tasks that can be performed and configured using
CLI, such as managing users, synchronizing system clocks, configuring SNMP, banner
messages, core dumps, and more. Examples of several of these tasks are noted below.
To add a user account:
add user <username> uid 200 homedir /home/<username>
To modify user accounts:
set user <username>
To set a user password:
set user <username> password
To show the current system date and time:
show clock
To display the current system day, date, and time:
Thu Aug 25 15:25:00 2016 CST
A Banner message can be configured to show users when they log in. To set a banner message:
set message banner <on | off> msgvalue <banner>
Example of a banner message:
set message banner on msgvalue “This system is private and
confidential”
To enable SNMP:
set snmp agent on
To enable or disable core dumps:
set core-dump [enable|disable]
To enable or disable IPv6 support:
set IPv6-state [on|off]
show IPv6-state
_____________________
_____________________
186
Check Point Security Engineering
Network Administration Commands
The syntax to configure physical interfaces is:
set interface <IF>
IPv4-address <IP>
mask-length <Mask>
subnet-mask <Mask>
IPv6-address <IF> mask-length <Mask>
IPv6-autoconfig [on |off]
comments <Text>
mac-addr <MAC>
mtu <MTU setting>
state [on | off]
link-speed <Speed_Duplex>
auto-negotiation [on | off]
Parameter
Description
interface <IF>
Configures a physical or virtual interface with an Interface
name.
IPv4-address <IP>
Assigns the IPv4 or IPv6 address.
IPv6-address <IP>
IPv6-autoconfig 
[on|off]
If on, automatically gets the IPv6 address from the DHCP.
mask-length <Mask> Configures IPv4 or IPv6 subnet mask length using CIDR (/xx)
notation.
subnet-mask <Mask> Configures IPv4 subnet mask using dotted decimal notation.
comments <Text>
Adds free text comments to an interface definition.
mac-addr <MAC>
Configures the interface hardware MAC address.
mtu <MTU setting>
Configures the Maximum Transmission Unit (MTU) size for
an interface with an integer greater than or equal to 68. The
default is 1500.
state [on|off]
Sets interfaces status to enabled or disabled.
link-speed
<Speed_Duplex>
Configures the interface link speed in Mbps and duplex status
values, such as 10M/half or 10M/full.
auto-negotiation
[on|off]
Configures automatic negotiation of interface link speed and
duplex settings to enabled or disabled.
Table 4: Network Administration Command Parameters
_____________________
_____________________
187
Check Point Security Engineering
Examples:
set interface
255.255.255.0
set interface
set interface
set interface
eth2 IPv4-address 40.40.40.1 subnet-mask
eth2 mtu 1500
eth2 state on
eth2 link-speed 1000M/full
To delete an interface setting:
delete interface eth2 IPv4-address
Gaia automatically identifies physical interfaces, such as NICs, installed on a computer.
Therefore, they cannot be added or deleted using the WebUI or the CLI.
Gaia devices can also be configured to be a Dynamic Host Configuration Protocol (DHCP)
server. DHCP servers allocate IP addresses and other network parameters to network hosts,
thus eliminating the necessity of configuring each host manually. DHCP server subnets can be
configured on the Gaia device interfaces to allocate network parameters, such as IPv4
addresses and DNS parameters, to hosts behind the Gaia interface. Use DHCP commands to
configure the Gaia device as a DHCP server for network hosts.
To create DHCP server subnets:
add dhcp server <parameter> <value>
netmask <value>
include-ip-pool start <value> end <value>
exclude-ip-pool start <value> end <value>
_____________________
_____________________
188
Check Point Security Engineering
To change DHCP server subnet configurations:
set dhcp server subnet <value>
Parameter
Description
subnet <value>
The IPv4 address of the DHCP subnet on an
Ethernet interface of the Gaia device. Hosts behind
the Gaia interface get IPv4 addresses from address
pools in the subnet. For example, 192.168.1.0/24
netmask <value>
The IPv4 subnet mask in CIDR notation. For
example, /24
start <value>
The IPv4 address that starts or ends the allocated IP
pool range.
end <value>
include-ip-pool <value>
The range of IPv4 addresses to include in the IP
pool. For example 192.0.2.20-192.0.2.90
exclude-ip-pool <value>
The range of IPv4 addresses to exclude from the IP
pool.
enable
Enable or disable the DHCP server subnet, or the
DHCP server process (depending on the context).
disable
default-gateway <value>
The IPv4 address of the default gateway for the
network hosts.
domain <value>
The domain name of the network hosts. For
example, testdomain.com.
dns <value>
The Domain Name Service (DNS) servers that the
network hosts will use to resolve host names.
Optionally, specify a primary, secondary and
tertiary server in the order of precedence.
all
All DHCP server configuration settings.
subnet
DHCP server subnet configuration settings.
subnet <value> ip-pools
The IP pools in the DHCP server subnet, and their
status: enabled or disabled.
status [enabled|disabled]
The status of the DHCP server process: enabled or
disabled.
Table 5: DHCP Command Parameters
_____________________
_____________________
189
Check Point Security Engineering
Gaia uses the Domain Name Service (DNS) to translate host names in to IP addresses. To
enable DNS lookups, the primary DNS server must be entered for your system. The system
will consult the primary DNS server to resolve host names. A DNS suffix, which is a search for
host-name lookup, can also be defined.
To configure the DNS server:
set dns primary <value>
To configure the DNS suffix:
set dns suffix <value>
The value parameter for both examples is an IPv4 or IPv6 address.
Additional CLI Commands
There are many more CLI commands available, such as commands which allow you to define
static routes and configure system logging. To view a list of all possible CLI commands, log
into Clish and press the Esc tab on your keyboard twice. For operation specific commands,
press the tab key twice.
_____________________
_____________________
190
Check Point Security Engineering
CPInfo
CPInfo is a Check Point utility that collects diagnostic data on a machine at the time of
execution. The CPInfo output file allows Check Point’s support engineers to analyze customer
setups remotely. The support engineer opens the CPInfo file in demo mode, while viewing
actual customer Security Policies and objects. This process allows for a more in-depth analysis
of all of the customer’s configuration options and environment settings. CPInfo collects the
entire gateway installation directory, including $FWDIR/log/* files. Some of the other
viewable information includes routing tables, system message logs, and the output of various
command, such as ifconfig and fw ctl pstat commands. CPInfo files are sent to
Check Point Technical Support via email or FTP.
To use CPInfo, make sure that the platform’s current version of cpinfo is installed to extract
the CPInfo file. Run the cpinfo command with the relevant flags in Clish or in Expert mode:
• -l — This flag is to include log records in the output file. Including log records will
yield a very large output.
• -z — This flag instructs the utility to gzip (compress) the output.
• -v — This flag prints version information.
• -n — This flag tells the utility to not collect and create a CPInfo file. It should be used
with -f.
• -f <file> — This flag uploads additional files to the Check Point server. It should
be used in combination with -n and -i. If the file to be uploaded is not compressed,
CPInfo will first compress it and then upload it.
• -o <filename> — This flag directs the output to a file and to the screen. It also
specifies a file name.
• -y — This flag instructs the utility to display all installed hotfixes.
• -k — This flag includes Firewall tables in the output.
• -i — This flag is for non-interactive mode.
• -d — This flag instructs the utility not to check for updates.
• -a — This flag forces the update check. By default, the update check of CPInfo utility
is once a week.
• -u — This flag connects to the User Center with username and password.
• -e <e-mail> — Specifies a single email or multiple emails of people that should be
notified about upload status. Multiple emails must be enclosed in double-quotations
and separated by semi-colons. For example: “<email #1>;<email #2>”
• -s <SR_Number> — Specifies the Service Request number opened with Check
Point Support. For example, -s 28-123456789
• -T <timeout> — Specifies the timeout in seconds for the commands executed by
the utility. This does not apply to collection of the CPInfo output file itself. The default
timeout is 600 seconds (5 minutes).
• -h — The flags displays the built-in help.
_____________________
_____________________
191
Check Point Security Engineering
Lab 1.4
Core CLI Elements of Firewall Administration
_____________________
_____________________
192
L
A
B
Core CLI Elements 
of Firewall Administration
1.4
Use a selection of common commands and tools to manage the firewall and monitor and capture traffic
logs for troubleshooting purposes.
Ta sks :
• Install the Security Policy and verify status with fw stat.
• Uninstall the Policy and verify status with fw stat.
• Run cpinfo on a Security Gateway.
• Find information from cpinfo output.
• Open cpinfo from InfoView.
• Run the fw ctl pstat command.
• Run basic fw monitor and tcpdump commands on a Security Gateway.
Pe r for ma n c e Ob j ec t ive s:
• Perform basic tasks related to Security Policy management from the Command Line Interface.
• Use common commands to evaluate the condition of a Security Gateway.
_____________________
_____________________
193
Check Point Security Engineering
Managing Policy and Verifying Status 
from the CLI
Policy status for a Gateway is regularly verified in SmartConsole. The fw stat command is also useful to
verify Policy status. In circumstances where you cannot log in to SmartConsole, fw unloadlocal can be
used to uninstall the Policy.
1.
From the A-GW-01 virtual machine, run the following command:
fw stat
Figure 169 — fwstat
2.
Run fw unloadlocal from the command line:
Figure 170 — fw unloadlocal
NOTE
Only run the fw unloadlocal command when absolutely necessary. Now that the
Security Policy is no longer installed, all interfaces are currently open and passing
traffic without inspection.
_____________________
_____________________
194
Check Point Security Engineering
3.
Verify that the policy was removed by executing the fw stat command again:
Figure 171 — fw stat
4.
Run fw fetch 10.1.1.101 from the command line:
Figure 172 — fw fetch localhost
NOTE
Ignore any error messages for services that have not started.
5.
Run the fw stat command to verify that the Security Gateway was able to fetch the policy from the
Security Management Server:
Figure 173 — fw stat
6.
Type the following command and press Enter:
exit
_____________________
_____________________
195
Check Point Security Engineering
Using cpinfo
In this section, you will view a list of hotfixes applied to the Security Gateway and collect server
configuration files.
From A-GUI, use Putty to log into A-GW-01 (10.1.1.2). Once logged in, enter Expert mode.
2. At the Expert mode prompt for A-GW-01, run the following command:
1.
cpinfo -y all
Figure 174 — cpinfo -y all
3.
‘
Review all hotfixes applied to the Security Gateway.
_____________________
_____________________
196
Check Point Security Engineering
4.
Next, run the following command:
cpinfo -l -o A-GW-01-cpinfo.txt
NOTE
In the command above (cpinfo -l), that is a lower case L, not a number 1.
5.
Press Enter, and the system asks if you for an SR number.
Figure 175 — cpinfo -l -o
NOTE
You may not be prompted for an SR number. If not prompted, continue with the next
step by typing n and pressing Enter.
_____________________
_____________________
197
Check Point Security Engineering
6.
Type s, and press Enter. The file collection runs for about a minute. As cpinfo runs, status messages
will display:
Figure 176 — cpinfo -l -z
7.
Once cpinfo has finished, the output file A-GW-01-cpinfo.txt will be created in the following
default directory for the administrator:
/home/admin
_____________________
_____________________
198
Check Point Security Engineering
8.
From A-GUI, use HTTPS to connect to A-GW-01 (10.1.1.2).
Figure 177 — Login Window
9.
Use the following credentials to log into the Gaia Portal:
Username: admin
Password: Chkp!234
_____________________
_____________________
199
Check Point Security Engineering
10. In the navigation pane, select User Management > Users:
Figure 178 — Users
_____________________
_____________________
200
Check Point Security Engineering
11. In the Users page, click the Add button.
NOTE
If necessary, gain control of the configuration by clicking the Lock in the 
Gaia Portal toolbar.
12. Using the information below, configure a new user:
Login Name: gaiaAdmin
Password: Chkp!234
Real Name: Gaiaadmin
Home Directory: /home/gaiaAdmin
Shell: /bin/bash
Assigned Roles: adminRole
Access Mechanisms: Web
Clish Access
Figure 179 — Add User Configured
_____________________
_____________________
201
Check Point Security Engineering
13. Click OK, and the system adds the new user to the Users list:
Figure 180 — Users
14. Log out of the Gaia Portal.
_____________________
_____________________
202
Check Point Security Engineering
15. From A-GUI, use the following credentials to start a WinSCP session to A-GW-01:
Host Name: 10.1.1.2
User name: gaiaAdmin
Password: Chkp!234
Figure 181 — Login - WinSCP
_____________________
_____________________
203
Check Point Security Engineering
16. Navigate to and locate the compressed A-GW-01-cpinfo.txt.info.gz file (/home/admin):
Figure 182 — WinSCP Session
17. Transfer the file to A-GUI.
NOTE
If using FTP from the Security Gateway to a FTP server, make sure to use 
Binary mode.
_____________________
_____________________
204
Check Point Security Engineering
18. Navigate to the directory to which you transferred the text file, and open it in WordPad:
Figure 183 — CPINFO File
_____________________
_____________________
205
Check Point Security Engineering
19. Scroll down to view the CP Status section of the file.
20. Using the Edit menu’s Find option, identify the following:
◦ FireWall-1 Version Information
◦ Version
◦ CP License
Figure 184 — Find
21. Exit WordPad.
_____________________
_____________________
206
Check Point Security Engineering
Reconfiguring the Security Policies
Modify both Security Policies to allow FTP traffic between the sites.
In the Bravo_Standard policy, add a new rule above the Cleanup rule.
2. Use the information below to configure the new rule:
1.
Name: Incoming
Source: Any
Destination: B-INT-NET
Services & 
Applications: FTP
Action: Accept
Track: Log
Figure 185 — Incoming Rule
1.
In the Alpha_Standard policy, add a new rule above the LDAP rule.
_____________________
_____________________
207
Check Point Security Engineering
2.
Use the information below to configure the new rule:
Name: FTP
Source: Any
Destination: Alpha-Nets
Services & 
Applications: FTP
Action: Accept
Track: Log
Figure 186 — FTP Rule
Publish the changes to the database.
4. Install the Bravo Security Policy.
5. Install the Alpha Security Policy.
3.
_____________________
_____________________
208
Check Point Security Engineering
From A-GUI, log into the Gaia Portal on A-GW-01.
7. Define a new user called scpAdmin with the adminRole and scponly shell access:
6.
Figure 187 — Add User
_____________________
_____________________
209
Check Point Security Engineering
8.
Click OK, to add the user to the Users list:
Figure 188 — Users
9.
Log out of Gaia Portal.
_____________________
_____________________
210
Check Point Security Engineering
Using fw monitor
In this section you will test fw monitor. It’s important to remember that in a production environment where
a Security Gateway is already under heavy load, the fw monitor command can dramatically affect
performance because we have to turn off acceleration. It is always best to test packet captures during offpeak times.
1.
Execute the following command to verify that A-GW-01 is the Active gateway:
cphaprob stat
NOTE
In Expert Mode on A-GW-02, if it is the Active gateway, execute the following
commands to force A-GW-01 to become active:
clusterXL_admin down
clusterXL_admin up
2.
In Expert Mode on A-GW-01, navigate to the following directory:
cd /var/log/tmp
NOTE
Check Point recommends that you run the fw monitor command from a directory
with plenty of space, such as /var/log, so that you do not fill up the hard drive.
_____________________
_____________________
211
Check Point Security Engineering
3.
At the prompt, type the following, and press Enter:
fwaccel off
Figure 189 — fwaccel off
NOTE
This command turns off SecureXL acceleration and ensures a complete capture in
the next step.
4.
Type the following at the prompt to start fw monitor:
fw monitor -o monitorfile.pcap
Figure 190 — fw monitor
5.
Generate FTP traffic from B-Host (192.168.21.201) to A-GUI (10.1.1.201).
_____________________
_____________________
212
Check Point Security Engineering
From A-GW-01, type CTRL + C to end monitoring.
7. Use WinSCP to transfer the monitorfile.pcap to A-GUI from A-GW-01.
6.
Figure 191 — monitorfile.pcap Transferred
_____________________
_____________________
213
Check Point Security Engineering
8.
On A-GUI, double-click the transferred pcap file to review the created output in Wireshark:
Figure 192 — monitorfile.pcap in Wireshark
_____________________
_____________________
214
Check Point Security Engineering
9.
Locate the FTP traffic from 192.168.21.201 to 10.1.1.201:
Figure 193 — FTP Traffic Identified
NOTE
To identify the FTP traffic in WireShark, use the following filter:
tcp.port==21
_____________________
_____________________
215
Check Point Security Engineering
10. Log in to A-GW-01, and type the following in Expert mode:
fw monitor -e "accept src=203.0.113.100 or dst=10.1.1.201 and dport=21;" 
-ci 20 -o monitorfile2.pcap
NOTE
This monitors traffic to and from specific addresses and only captures twenty 
inbound events.
11. Generate FTP Traffic from:
◦ A-GUI to B-Host
◦ B-Host to A-GUI
12. From A-GW-01, type CTRL + C to end monitoring.
NOTE
When you return to A-GW-01, the fw monitor may have already ended. This
happens when it reaches the specified number of records collected, which, in this
case, is 20.
13. From A-GUI, use WinSCP to transfer the monitorfile2.pcap off the Security Gateway.
_____________________
_____________________
216
Check Point Security Engineering
14. Review the created output file to see that only the FTP traffic to and from 192.168.21.201 is shown:
Figure 194 — monitorfile2.pcap in WireShark
_____________________
_____________________
217
Check Point Security Engineering
Using tcpdump
Use tcpdump to retrieve Layer 2 information from the Security Gateway.
1.
From A-GW-01, run the following command in expert mode:
tcpdump -i eth0 icmp -w dumpfile.pcap
Generate ICMP traffic from A-GUI to the B-Host virtual machine.
3. On A-GW-01, type CTRL + C to end monitoring:
2.
Figure 195 — Ending tcpdump
_____________________
_____________________
218
Check Point Security Engineering
Use WinSCP to transfer the newly created tcpdump file to A-GUI.
5. Use WireShark to view the contents of the tcpdump file.
6. From A-GW-01, type the following, and press Enter:
4.
fwaccel on
END OF LAB 1.4
_____________________
_____________________
219
Check Point Security Engineering
Advanced Firewall
The Check Point Firewall Software Blade builds on the award-winning technology first
offered in Check Point’s Firewall solution and provides the industry’s best cyber security.
Having demonstrated industry leadership and continued innovation since the introduction of
the Firewall-1 in 1994, Check Point Firewalls are trusted by 100% of the Fortune 100
companies.
C h e c k Poi n t F i r ewal l I n f r a s t r u c t u r e
As a security expert considering the needs of your organization, in-depth knowledge of
Security Gateways must be applied as you implement them beyond a simple distributed
deployment. To establish a framework for assessing gateway performance in a complex
network topology, you must understand the infrastructure.
You should recall from the CCSA that fundamentally, Check Point security components are
divided into the following components:
• GUI Client
• Security Management
• Security Gateway
GUI Client
GUI applications, for object manipulation, log viewing and reporting, such as SmartView
Monitor and SmartEvent, are all unified into one console (SmartConsole). These GUI
applications offer you the ability to configure, manage and monitor security solutions, perform
maintenance tasks, generate reports and enforce corporate policy in real-time.
Check Point periodically releases new executables that include updates for SmartConsole
applications. These updates are not always related to or aligned with Security Gateway
hotfixes and are considered a separate, unrelated release track.
Security Management
The management component is responsible for all management operations in the system. It
contains several elements, such as the management server, reporting suite, log server, etc. All
of the functionality of the Management server is implemented in User-Mode processes, where
each process is responsible for several operations.
_____________________
_____________________
220
Check Point Security Engineering
Check Point Management (cpm) is the main management process. It provides the architecture
for a unified security environment. CPM allows the GUI client and management server to
communicate via web services using TCP port 19009. It empowers the migration from legacy
Client-side logic to Server-side logic. The cpm process performs database tasks, such as
creating, deleting, and modifying objects, and compiling policy. Processes controlled by CPM
include:
• web_services — Transfers requests to the dle_server.
• dle_server — Contains all the logic of the server and validates information before it is
written into the database.
• object_store — Translates and writes data to the database.
CPM saves all data in the Postgres SQL database and stores most of the data in Solr, a
standalone search server powered by the Lucene Java search library. The Postgres SQL
database contains objects, policies, users, administrators, licenses, and management data.The
data is segmented into multiple database domains. Solr generates indexes of the data to be used
for full text searching capabilities.
Figure 196 — CPM Architecture
_____________________
_____________________
221
Check Point Security Engineering
Additional significant management processes include:
• fwm — Firewall Management (fwm) is on all management products, including MultiDomain Security Management, and on products that require direct GUI access, such as
SmartEvent. The fwm process is used mainly for backward compatibility of gateways.
It provides GUI client communication, database manipulation, policy compilation, and
Management High Availability synchronization.
• fwd — Check Point Firewall Daemon (fwd) allows other processes, including the
kernel, to forward logs to external Log servers, as well as the Security Management
Server. It communicates with the kernel using command line tools, such as the fw
commands, kernel variables, and kernel control commands.
• fwssd — A child process of fwd. It is responsible for managing Firewall Security
Servers which provide a higher level of protocol enforcement.
• cpd — Check Point Daemon (cpd) is a core process on every Check Point product. It
allows Secure Internal Communication (SIC) functionality, pulls application
monitoring status, transfers messages between Firewall processes, fetches and installs
policy, and more.
• cpwd — Check Point WatchDog (cpwd) invokes and monitors critical processes, such
as Check Point daemons on the local machine, and attempts to restart them if they fail.
Among the processes monitored by cpwd are cpd, fwd, and fwm. The cpwd_admin
utility shows the status of processes and configures cpwd.
_____________________
_____________________
222
Check Point Security Engineering
Security Gateway
The Security Gateway, sometimes referred to simply as the Firewall, is the component in the
system responsible for security enforcement, encryption/decryption, authentication, and
accounting.
The functionality of the Security Gateway is implemented both in User-Mode and in the
kernel. The Security Gateway is a network device running an operating system which makes it
vulnerable to possible Network layer attacks. To mitigate this vulnerability, some of the
Firewall functionality is implemented in the kernel mode. This allows the traffic to be
inspected before even getting to the operating system IP stack.
Figure 197 — Operating System Kernel
The Firewa ll Kernel
The Firewall kernel is responsible for the majority of the Security Gateway’s operations, such
as security enforcement, encryption/decryption, NAT, etc. In order to detect which part of the
kernel might be responsible for a specific issue, start by considering the inner structure of the
Firewall kernel and its interaction with the operating system kernel (Gaia), the hardware, and
other kernel components, such as acceleration. There are certain processes that operate at the
operating system level in the User Mode space and others that operate in kernel mode space.
_____________________
_____________________
223
Check Point Security Engineering
User and Kernel Mode Processes
The Kernel Mode resides in the Data Link layer of the OSI model. The Firewall kernel inspects
packets between the Data Link layer and the Network layer. Every packet that goes through the
Firewall is inspected. In the Network layers, you would not see all those packets.
User Mode is not mandatory, however, it allows the Firewall to function more efficiently in the
Application layer. The Firewall employs services of the operating system and allows easier
inspection of files on open connections.
It is possible and, in some cases, required for user and kernel processes to communicate. To
allow this, there are two mechanisms: Input/Output Controls (IOctl) and traps. When a Kernel
process wishes to signal to a User Mode process, it sets a trap by changing a value in a registry
key. The User Mode process monitoring that flag stumbles on the trap and performs the
requested operation. When a User Mode entity needs to write information to a kernel process,
it uses IOctl, which is an infrastructure allowing the entity to call a function in the kernel and
supply the required parameters.
Figure 198 — Processes
As administrators trying to debug the Firewall, the first observation to make is to decide which
Firewall functionality is implemented in the user space and which is implemented in the
kernel. Once that distinction is made, decide the best approach to use in addressing the
problem, including which tool is the most appropriate to use.
_____________________
_____________________
224
Check Point Security Engineering
Pa c ket F l ow
To understand how packets are inspected, consider the Firewall kernel more closely.
Inbound and Outbound Packet Flow
Traffic first arrives into the Firewall through one of the Firewall Network Interface Cards
(NICs). The Check Point Firewall kernel is installed on each Firewall NIC that is enabled in
the operating system. The Firewall kernel consists of two completely separate, logical parts
called the Inbound and Outbound, which represents the process of packets coming in and out
of the Firewall. These processes work on each packet through another process called
inspection. Each part acts independently and does not assume that a packet was inspected or
processed by the other. Therefore, some functionality is implemented both on the Inbound and
on the Outbound. Some key points include:
• Each direction has its own ordered chain of modules, or packet processing handlers.
• Handlers decide whether to continue, terminate or hold the processing of a packet.
• Inspection is performed on virtually defragmented packets.
The inspection process does expect that a packet in the Outbound that has not entered the
Inbound first originated from the Security Gateway itself. It also assumed that a packet not
originating from the gateway was Inbound.
Figure 199 — Check Point Firewall Kernel Inspection Points
_____________________
_____________________
225
Check Point Security Engineering
Packet Inspection Flow
The following diagram describes a packet flow through the Firewall kernel and how the User
Mode processes work to control the traffic.
Figure 200 — Packet Inspection Flow
1.
2.
3.
4.
5.
6.
The packet arrives at the Security Gateway and is intercepted by the NIC on the Inbound.
The Firewall kernel Inbound chain begins inspecting the packet.
The packet is matched against the Rule Base. A log is generated and sent from the kernel
to the User Mode process, fwd, located in the Security Gateway.
The fwd process on the Security Gateway sends the log to the fwd process on the Management server, where it is forwarded to cpm via cpd.
cpm sends the log to the relevant SmartConsole GUI application, such as SmartView
Monitor.
At the same time, depending on routing decisions made by the operating system and
excluding specific scenarios such as VPN routing, the packet is routed to a selected NIC.
The packet must go through the Firewall kernel again, only this time through the Outbound chain to the appropriate NIC and to the network.
_____________________
_____________________
226
Check Point Security Engineering
Chain Modules
Chain Modules are packet processing handlers. Handlers decide which modules will inspect
the packet and, based on the inspection, may then modify, pass, or drop the packets. Each
module in the chain has an unique job. The number of chains on a Security Gateway is based
on the number of blades and features enabled for that gateway. Inbound and outbound packets
are inspected in both directions by chain modules. Familiarity with the elements of a chain
module is an important step in understanding how traffic moves through the firewall, and will
ultimately be of great assistance when debugging is required.
Consider the following chain module example. The location of the module in the chain is a
relative, serial number to the location of this chain module for this particular gateway
configuration. For example, above the fw VM outbound is the 6th chain module. It may be in a
different location in other gateway scenarios. The chain position is an absolute number that
never changes. In the Firewall kernel, each kernel is associated with a key, which specifies the
type of traffic applicable to the chain module. For Wire Mode configuration, chain modules
marked with 1 will not apply and for Stateful Mode, the chain modules marked with 2 will not
apply. Chain Modules marked ffff, such as IP Options Strip/Restore, and 3 will apply to all
traffic.
Figure 201 — Chain Module Example
To take a look at an actual chain, use the fw ctl chain command. This will show you the
chain modules actually loaded on your machine and their order.
_____________________
_____________________
227
Check Point Security Engineering
Inbound fw ctl Chain Modules
View the chain modules displayed below. In this figure, we see the Inbound chain, though this
is just one example and in different configurations some chain modules will not appear and
others might be added. Between different releases, chain modules are added or removed,
depending on the version specific design decisions.
Figure 202 — Inbound Chain
Outbound Chain Modules
View the chain modules displayed below. Shown in this figure, the Outbound chain shows
roughly the same chain modules as seen on the Inbound. The most significant difference is that
in the Inbound, the vpn decrypt and vpn decrypt verify chain modules are present.
This makes sense because it is expected that a packet would be decrypted on the Inbound. In
addition, the Outbound chain also has the vpn encrypt chain module, if the packet needs to
be encrypted on the Outbound.
Figure 203 — Outbound Chain
_____________________
_____________________
228
Check Point Security Engineering
Wire Mode
Wire Mode enables VPN connections to successfully maintain a private and secure VPN
session without employing Stateful Inspection. Using Wire Mode, the Firewall can be
bypassed for VPN connections by defining internal interfaces and communities as “trusted”.
This improves the performance of the VPN tunnel and reduces downtime. With Stateful
Inspection no longer taking place, dynamic-routing protocols that do not survive state
verification in non-Wire Mode configurations can now be deployed. Wire Mode is based on a
trusted source and destination and uses internal interfaces, such as the Security Gateway and
VPN Communities.
Lab 1.5
Viewing the Chain Modules
_____________________
_____________________
229
L
A
B
Viewing the Chain Modules
1.5
One way to help understand how the Security Gateway handles traffic is to review the inbound and
outbound chain modules. These modules show how the kernel processes traffic as it enters and exits the
gateway. In this lab, you will make changes to the Security Policy and identify how those changes affect
the chain modules.
Ta sks :
• Evaluate the Chain Modules.
• Modify the Security Policy.
• Review Changes to the Chain Modules.
Pe r for ma n c e Ob j ec t ive s:
• Demonstrate an understanding of how different Check Point software blade deployments can affect
traffic inspection on the Security Gateway.
• Evaluate how changes in the environment affect the Chain Modules.
_____________________
_____________________
230
Check Point Security Engineering
Evaluating the Chain Modules
Review the chain module in place for kernel level traffic inspection.
1.
Connect with SSH and use the following credentials to log into the A-GW-01 virtual machine:
Username: admin
Password: Chkp!234
IP Address: 10.1.1.2
2.
Type the following command and press Enter:
fw ctl chain
Figure 204 — fw ctl chain
_____________________
_____________________
231
Check Point Security Engineering
3.
Consider the following questions when evaluating the chain modules:
◦ Can you see how the traffic flows through the kernel?
◦ Besides the Firewall, what other modules are engaged?
◦ Can you tell if IPS is currently deployed?
◦ Could you tell if this is a cluster by looking at the inspection chain?
_____________________
_____________________
232
Check Point Security Engineering
Modifying the Security Policy
Make changes to the Security Policy that will be visible in the chain modules.
1.
From A-GUI, use the following credentials to log into SmartConsole:
Username: admin
Password: Chkp!234
IP Address: 10.1.1.101
In SmartConsole, edit the A-GW-Cluster object.
3. In the Network Security tab, clear the following option:
2.
IPSec VPN
_____________________
_____________________
233
Check Point Security Engineering
4.
Verify that the object is configured as follows:
Figure 205 — General Properties Configured
Click OK.
6. In the Alpha Security Policy, add the A-SMS to the Source field of the Management rule.
5.
_____________________
_____________________
234
Check Point Security Engineering
7.
Add SSH to the Services & Applications field of the Management rule:
Figure 206 — Management Rule Configured
_____________________
_____________________
235
Check Point Security Engineering
8.
Publish the changes and install the Alpha Security Policy.
Figure 207 — Installation Process
_____________________
_____________________
236
Check Point Security Engineering
Reviewing Changes to the Chain Modules
Run the fw ctl chain command to view the chain modules.
In the Gateways & Servers tab, expand the A-GW-Cluster object.
2. Right-click the A-GW-01 and select Actions:
1.
Figure 208 — Actions Menu
_____________________
_____________________
237
Check Point Security Engineering
3.
Select Open Shell, and the system displays the following window:
Figure 209 — Open Shell
4.
Use the following information to log into the shell:
Username: admin
Password: Chkp!234
Remember Password: Selected
5.
Click Login, and the system displays the Fingerprint Confirmation window:
Figure 210 — Fingerprint Confirmation
_____________________
_____________________
238
Check Point Security Engineering
6.
Click Yes, and the system opens an SSH session with A-GW-01:
Figure 211 — SSH Connection
_____________________
_____________________
239
Check Point Security Engineering
7.
Type the following command and press Enter, to view the chain modules:
fw ctl chain
Figure 212 — fw ctl chain
8.
Review the inbound chain and the outbound chain and consider the following questions:
◦ What changes do you see since making modifications to the A-GW object?
◦ Can you tell if VPN is a deployed product?
◦ When comparing the chain after configuration changes were made, what differences can you see?
9.
Close the session.
_____________________
_____________________
240
Check Point Security Engineering
10. From SmartConsole, edit the A-GW-Cluster object.
11. Select the QOS option in the Network Security tab:
Figure 213 — General Properties Configured
12. Click OK.
NOTE
You will see an error because QOS is not properly deployed. Disregard this error in
this instance.
13. Publish the changes.
14. Install the Alpha Security Policy.
_____________________
_____________________
241
Check Point Security Engineering
15. Re-launch the session to A-GW-01.
16. Execute the following command:
fw ctl chain
Figure 214 — fw ctl chain
NOTE
In Expert Mode, you can also send the output of the fw ctl chain command to 
a file.
17. Review the inbound chain and the outbound chain and consider the following questions:
◦ What changes do you see since making modifications to the A-GW object?
◦ Which line in each module indicates that QOS is deployed?
◦ What do you need to do to successfully deploy QOS?
_____________________
_____________________
242
Check Point Security Engineering
18. Execute the following command:
fw monitor
Figure 215 — fw monitor
_____________________
_____________________
243
Check Point Security Engineering
19. From a new Putty session to A-GW-01, execute the following command:
fw ctl chain | more
Figure 216 — fw ctl chain
20. Identify where in the chain fw monitor inserts itself.
21. From the session running fw monitor, press Ctrl + C.
22. Close the Putty session.
_____________________
_____________________
244
Check Point Security Engineering
23. In SmartConsole, edit the A-GW-Cluster object.
24. In the Network Security tab, clear the QOS option:
Figure 217 — General Properties Configured
25. Click OK.
_____________________
_____________________
245
Check Point Security Engineering
26. Remove A-SMS from the Source field of the Management Rule:
Figure 218 — Rule Base Configured
27. Publish the changes to the database.
28. Install the Alpha Security Policy.
END OF LAB 1.5
_____________________
_____________________
246
Check Point Security Engineering
S t a te f u l I n s p e c t i o n
Stateful Inspection was invented by Check Point to provide accurate and highly efficient traffic
inspection. Apart from checking the IP Header of a packet, Stateful Inspection also implements
checks on other characteristics of a packet, such as TCP stream, sequence numbers, UDP
communication and port numbers to monitor the state of a packet operating primarily at the
Transport layer of the operating system. The Inspection Engine examines every packet as they
are intercepted at the Network layer. The connection state and context information are stored
and updated dynamically in the kernel tables. Kernel tables are also known as State tables.
To see the process flow of the Inspection Engine, review the flow chart below.
Figure 219 — Inspection Process Flowchart
1.
2.
3.
4.
5.
6.
Packets pass through the Network Interface Card (NIC) to the Inspection Module, which
inspects the packets and their data.
Packets are matched to the policy Rule Base. Packets that do not match any rule are
dropped.
Logging and/or alerts that have been defined are started.
Packets that pass inspection are moved through the TCP/IP stack to their destination.
For packets that do not pass inspection and are rejected by the rule definition, a negative
acknowledgment (NACK) is sent (i.e. RST packet on TCP and ICMP unreachable on
UDP).
Packets that do not pass inspection and do not apply to any of the rules are dropped without sending a NACK.
_____________________
_____________________
247
Check Point Security Engineering
S e c u r i t y S e r ve r s
Security servers are a necessary and crucial element to Firewall functionality. Some Firewall
features require a higher level of protocol enforcement and RFC compliance, such as in the
Application Layer.
Security servers are the individual processes within the Firewall system that are responsible for
the detailed protocol-specific security inspection such as FTP, HTTP, or SIP and other
inspection services like DLP.
NOTE
When Identity Awareness is deployed, this process operates differently.
How a Security Server Works
Essentially, when a client initiates a connection to a server, the Firewall kernel signals the fwd
process using a trap. fwd spawns the fwssd child service, which runs the Security server.
Then, the Security server binds to a socket and manages the connection.
fwd waits for connections on the ports of other servers (daemons) and starts the corresponding
server when the connection is made. fwd also talks to its children processes on other servers
using a pipe and signals.
The $FWDIR/conf/fwauthd.conf file contains the structure of the security servers
showing the port numbers, corresponding protocol name, and status. If the real port is 0, then a
higher random port is assigned.
Figure 220 — Example of $FWDIR/conf/fwauthd.conf
_____________________
_____________________
248
Check Point Security Engineering
Ker n el Ta b le s
There are dozens of kernel tables, each storing information relevant to a specific Firewall
function. Using the information saved in the kernel tables, very elaborate and precise
protections can be implemented. To view all existing kernel tables, type the command fw
tab -t <tablename> at the command prompt. To view only the table names and get a
perspective on the number of kernel tables available, use the fw tab -s command.
Most traffic related information is saved in the kernel tables. Information is also stored in
htabs, ghtabs, arrays, kbufs, and other devices. Tables may be created, deleted,
modified, and read. In particular, consider the Connections table.
Connections Table
The Connections table is essentially an approved list of connections. The Firewall, as a
network security device, inspects every packet coming in and out of each interface. After the
first packet is matched against the Rule Base, we assume that the returning packet might not be
accepted in the Rule Base.
For example, we allow 74.100.100.1 to connect with 212.150.141.5 using Telnet on port 23 in
the Rule Base and drop everything else. The syn packet will match the Rule Base and pass; but
the Syn-Ack packet comes back with the reversed tuple (source IP 212.150.141.5, Destination
IP 74.100.100.1) and source port 23 with a random destination port. (Reference the
Connections Table figure in the following section).
To mitigate this, for every recorded connection, a matching, reversed-tuple entry is also added
to the list of approved connections. Some scenarios such as NAT, data connections and
elaborate protocols, such as Voice over IP (VoIP), introduce more complexity to the logic
behind maintaining the Connections table.
The Connections table provides enhanced performance. As we saw in the Inspection Process
Flowchart, the action of matching a packet against the Rule Base may be very costly
(especially if there is a very large Rule Base with dynamic objects and logical servers that need
to be resolved). By maintaining the list of approved connections in the Connections table, the
gateway can enforce an intelligent analysis for assumed rule-matching, thus saving valuable
time and computing power.
_____________________
_____________________
249
Check Point Security Engineering
The Connections table also allows server replies. We noted earlier that sometimes Server to
Client (S2C) packets might not match the Rule Base. In these cases, they would be handled by
the Connections table. To view the Connections table, use the following command:
fw tab -t connections -f
NOTE
Using the fw tab -t connections -f command could impact
performance.
The following Stateful features are provided with the Connections table:
• Streaming based applications
• Sequence verification and translation
• Hide NAT (Explicit entries to the Connections table may need to be added when the
S2C packets returning to the Firewall may not match the Rule Base.)
• Logging, accounting, monitoring, etc.
• Client and server identification
• Data connections
_____________________
_____________________
250
Check Point Security Engineering
Connections Table Format
Each new packet is recorded in the table in all available entries. In FireWall-1 version 4.1, only
one entry was made to each new connection. Each packet had to go through the Connections
table several times to verify all available types of connection. Today, each packet goes through
a single lookup as all available entries are already recorded in the table.
Figure 221 — Connections Table
The Symbolic Link format provides the 6-tuple of the connection we want to pass. The arrow
is a pointer to the tuple of the Real Entry in the Connections table. The first six attributes in
every entry in the Connections table state the connection’s 6-tuple. The 6-tuple is a unique
identification of the connection within the system. The direction can be either 0 for Inbound or
1 for Outbound.
In the Connections Table figure, we see a simple connection representation in the Connections
table. The first entry is called the Real Entry and holds all of the relevant information for that
traffic, such as state, sequence numbers and matching rule.
The Real Entry allows the Client to Server (C2S) packet to enter the Firewall on the Inbound.
The second entry is a Symbolic Link, allowing for the same C2S packets to enter the Firewall
on the Outbound. The third entry is another Symbolic Link that allows for the S2C traffic to
enter the Firewall on the Inbound. The last entry is also a Symbolic Link and allows for the
S2C packet to enter the Firewall on the Outbound.
_____________________
_____________________
251
Check Point Security Engineering
Po l i c y I n s t a l l a t i o n
The policy installation process is divided into three main stages: Verification & Compilation,
Transfer (CPTA), and Commit.
Figure 222 — Policy Installation Process
_____________________
_____________________
252
Check Point Security Engineering
Verification & Compilation
The Verification & Compilation stage of policy installation occurs on the management side. It
involves the following steps:
1.
2.
3.
4.
5.
6.
Initiation — Policy installation is initiated either from SmartConsole or from the command line. Information required for the policy installation, such as the list of gateways on
which the policy is to be installed, is provided. User permissions for policy installation
will also occur prior to continuing to the next step in the process.
Database Dump — A database dump from postgres to old file formats for cpmitable only if changes occurred. A dump from non cpmi will occur any time.
Verification — Information in the database is verified to comply with a number of rules
specific to the application and package for which policy installation is requested. If this
verification fails, the process ends here, and an error message is passed to the initiator. The
system can also issue warnings in addition to fail/success messages.
Conversion — The information in the database is converted from its initial format to the
format understandable by later participants in the flow, such as code generation and gateway.
Fwm rexec — Fwm loader takes a lot of memory. To release memory after verification
and conversion, fwm state is saved to a file located in the $FWDIR/tmp/ directory.
fwm is then re-executed as a fwm load command to push the files for code generation
and compilation.
Code Generation and Compilation — Policy is translated to the INSPECT language and
compiled with the INSPECT compiler. Also, some additional data transformations are
completed. After verifying and converting the database, the fwm process compiles the relevant files, such as objects_5_0.C, and AccessCTRRules_0.C, into several compiled files (local.ft, local.set, etc.). The complied policy will be copied to the
$FWDIR/state/<gateway name> directory on the management server.
Transfer (CPTA)
The Transfer stage occurs between both the management server and the gateway. Once the
policy is successfully compiled and moved to $FWDIR/state/<gateway> on the
management server, the Check Point Policy Transfer Agent (CPTA) transfers the compiled
policy to the gateway using SIC. Using SIC will ensure that the management server is eligible
to install policy on the gateway. It also encrypts the connection via SSL so that the policy data
transferred to the gateway is trusted. Once SIC is initialized, SIC authentication will occur for
every policy installation.
_____________________
_____________________
253
Check Point Security Engineering
Commit
During the Commit stage, the Firewall is instructed to load the new policy it has just received
from the management server. The following steps will occur:
• The cpd process on the gateway will execute the following command to load the
policy which was just transferred to the gateway:
fw fetchlocal -d $FWDIR/state/_tmp/FW1
• The policy will then be loaded into the kernel.
• If successful, the new policy will be copied to the $FWDIR/state/FW1 folder on the
gateway.
• If the fetchlocal process fails, cpd will get a notification regarding the failed
process and will inform the fwm process that loading the policy has failed.
_____________________
_____________________
254
Check Point Security Engineering
Policy Installation Flow
The graphic below displays a general process flow for policy installation. Differences are
version specific, so $FWDIR is replaced with the compatibility package when other products
or versions are used.
Figure 223 — Policy Installation Flow
1.
2.
3.
4.
5.
6.
7.
8.
9.
The policy is defined in SmartConsole.
After the policy is published, it is saved in the postgres database. At a push, verification of user permission is performed.
Database dump from postgres to old file formats (object_5_0.C and others) for
cpmitable, only if changes occurred, and a dump for non cpmi will occur. All *.W files
are stored in rulebases_5_0.fws.
After the policy is saved, files are created under $FWDIR/conf/*.W.
fwm_gen compiles the new $FWDIR/conf/*.W into a machine language, creating a
new file called $FWDIR/conf/*.pf. The $FWDIR/conf/*.pf is actually the input
from the $FWDIR/conf/*.W and the $FWDIR/conf/objects.C files. The
$FWDIR/conf/*.W file is the exact same information defined in the GUI, just in a text
format instead of a graphic one.
c_preprocessor compiles the *.pf and lib/*.def files, creating a new file called
*.cpp.
All new generated files are stored under $FWDIR/state/ on the management server.
*.ccp is compiled and translated to a machine language and transferred to the gateway.
$FWDIR/state/ directory is pushed to the enforcement module (gateway).
cpd and the kernel on the enforcement module performs an automatic load.
_____________________
_____________________
255
Check Point Security Engineering
Policy Installation by Management Processes
Now we will examine how policy installation is handled by the Management processes.
Figure 224 — Policy Installation by Management Processes
When policy installation is initiated from SmartConsole:
1.
2.
3.
4.
5.
6.
The Check Point Management Interface (cpmi) policy installation command is sent to
fwm on the Management server.
fwm performs verification and conversion of the database information for the installation
targets for which policy installation is requested.
After conversion, fwm invokes fw loader to perform code generation, compilation,
transfer to all applicable gateways, and commit.
cpd on the Security Gateway listens for install policy connections and receives the files.
cpd invokes fw fetchlocal to load the new policy into the kernel.
cpd waits for fw fetchlocal to complete the process and then informs the Management server of the command’s status (installation succeeded or failed).
NOTE
Additional steps may be included for debugging purposes.
_____________________
_____________________
256
Check Point Security Engineering
Rul e Mat c h in g
The Security Gateway determines the rule to apply to a connection; therefore, it is important to
understand how rules are matched. The columns of a rule contain the expected elements of a
connection and dictate what happens to the connection.
Column Based Matching
Security Gateway versions prior to R80.10, inspect and match connections row by row (left to
right), based on the order of rules within the Rule Base. The Rule Base is examined top-tobottom and the first matching rule is executed.
R80.10 and later Security Gateways match rules by column, such that only the rules within the
Rule Base that may possibly match a connection are considered. Column based matching
eliminates the process of examining rules which do not contain the applicable elements of the
connection.
The Matching Process
Access Control Policy rules use the following columns to filter and match traffic entering and
exiting the network:
Source
Destination
VPN (if enabled)
Services & Applications (if Appl Control & URL Filtering Software Blades are
enabled)
• Content (Content Awareness must be enabled)
• Time
• Installed On (target gateway)
•
•
•
•
Inspection starts in the first ordered layer of the Access Control policy (usually Policy or
Network). If a matched rule contains an inline layer, that inline layer is processed. Matching
continues with each additional ordered policy layer after a successful match. Any drop stops
the matching process and drops the connection.
Currently, the Security Gateway begins examining the fields of the Destination column to
identify rules that may match the connection. When possible matches are filtered, matching
continues with the Source column. Final inspection on the filtered results occurs when all
columns are matched and the first rule (top to bottom) that matches is executed for that layer,
and subsequent inline or ordered layers are processed.
_____________________
_____________________
257
Check Point Security Engineering
The illustration below displays the matching process for traffic connecting to the A-Host from
the B-Host using FTP.
Figure 225 — Column Based Matching Illustration
A Unified Access Control policy may contain application or data criteria that cannot be
matched on the first packet connection. The integration of application and data criteria requires
deep packet inspection.
To optimize the matching process, the Firewall may need to turn on one or more inspection
engines and inspect the header and body of the connection before determining the final match.
Otherwise, the Rule Base may decide to block the connection at an early stage. An early block
may indicate that the connection did not contain enough applicable data criteria for the engine
to make a proper detection, or that all potential rules matching the connection result in a Drop
or Reject action.
Additional levels of inspection include matching by port and matching by protocol signatures.
_____________________
_____________________
258
Check Point Security Engineering
Rule Matching by Port
By default, a service object is matched by port in the first packet of the transport protocol.
When matching by port, the Firewall blade does not consider the actual protocol that runs over
the port, although service names and port numbers typically identify services (like HTTP,
HTTPS, and FTP) that run over transport protocols (such as TCP and UDP). For example, if
the Firewall log indicates that HTTP service was matched on port 80, this means that the first
packet contained port 80 in the transport protocol.
Rule Matching by Protocol Signature
For R80.10 and later gateways, more advanced inspection of the protocol for a service is
possible if Protocol Signature is enabled for that service. Matching a rule by protocol signature
or by service provides an additional level of security when the Rule Base contains rules
including:
• an application, a URL site, or a service with a protocol signature in the Services &
Applications column
• a data type in the Content column
Matching by protocol signature and services is discussed in greater detail in the CCSM.
NOTE
The match by protocol signature feature is disabled by default for R80 and
higher gateways. The Firewall cannot match services by protocol signature
for R77.30 and lower gateways.
_____________________
_____________________
259
Check Point Security Engineering
Rule Matching in the Threat Prevention Policy
R80.10 and higher Threat Prevention policies may contain multiple Ordered layers in which
the Security Gateway installs as one Rule Base. The unified Rule Base determines how all
connections are inspected. When a connection matches rules in more than one layer, the
gateway enforces the strictest action and settings.
Figure 226 — Threat Prevention Policy Rule Matching Example
When Threat Emulation and Threat Extraction run in Mail Transfer Agent (MTA) mode, the
action of the first rule matched is enforced. Threat Emulation runs in tandem with Threat
Extraction for R80.10 and higher gateways. To enable the Threat Extraction Software Blade,
the gateway must be established as an MTA.
Threat Prevention solutions are discussed in greater detail in a later chapter.
_____________________
_____________________
260
Check Point Security Engineering
N et wo rk Ad d r es s Tr a ns l a t i on
Network Address Translation (NAT) and Network Address Port Translation (NAPT) are the
two primary technologies traditionally used as methods to hide networks so actual IP addresses
are not revealed or required to be publicly routable. This reduces the need for more publicly
routable IPs, and allows access to internal (sometimes non-routable) resources from an
external network.
How NAT Works
NAT is regarded as an infrastructure of services used, for example, to create clustering
solutions, security servers, office mode connections, etc.
Infrastructure
• INSPECT rules and tables
• Performed on the first packet
Features
• NAT Rule Base is efficient
• Dual NAT (automatic rules)
• Rule priorities
Table 6: NAT
When NAT is defined on a network object, NAT rules are automatically added to the NAT Rule
Base. Those rules are called Automatic NAT rules. NAT is translated during policy installation
to tables and performed on the first packet of the connection. The NAT Rule Base is very
efficient and can match two NAT rules on the same connection. This is called bi-directional
NAT and only applies for Automatic NAT rules.
NOTE
Even though NAT merges two Automatic NAT rules into one, this feature
may be disabled and NAT rules may be manually defined for additional
options.
NAT rules are prioritized according to the list below:
1.
2.
3.
4.
Manual/Pre-Automatic NAT
Automatic Static NAT
Automatic Hide NAT
Post-Automatic/Manual NAT rules
_____________________
_____________________
261
Check Point Security Engineering
Hide NAT Process
Consider first the original packet. When the packet arrives at the Inbound interface, it is
inspected by the Security Policy. If accepted, the packet is entered into the Connections table.
The first packet of the connection is matched against NAT rules. The packet is translated if a
match is found. Then the packet arrives at the TCP/IP stack of the Firewall Module machine
and is routed to the Outbound interface.
Figure 227 — Hide NAT
During the NAT Rule Base traversal, both NAT source and destination are decided. However,
they are actually performed at the following locations:
• src nat on the server side
• dst nat depending on the relevant GUI property
The Reply packet arrives at the Inbound interface of the Firewall machine. The packet is
passed by the Security Policy since it is found in the Connections table. The packet's
destination, which is the source of the original packet, is translated according to the NAT
information. This takes place when the packet was translated in the first initial connection. The
packet arrives at the TCP/IP stack of the Firewall machine and is routed to the Outbound
interface. The packet goes through the Outbound interface and its source, the destination of the
original packet, is translated according to the information in the NAT tables. The packet then
leaves the Firewall machine.
_____________________
_____________________
262
Check Point Security Engineering
Manual NAT
Many organizations prefer to define their own NAT rules rather than relying on the system
generated rules. There are also certain situations when manual NAT rules must be used, such as
when:
• Rules exist that are restricted to specified destination IP addresses and to specified
source IP addresses.
• Both source and destination IP addresses translate in the same packet.
• Static NAT occurs in only one direction.
• Rules exist that only use specified services (ports).
• IP addresses translate for dynamic objects.
The NAT Rule Base is processed one rule at a time from top to bottom, similarly to the
Firewall Rule Base. Therefore, Manual NAT rules must be placed in the right order to be
applied correctly. Manual NAT rules are added to the NAT Rule Base either above or below
any already existing Automatic NAT rules. For example, in the figure below, the first NAT rule
was manually created and the other NAT rules were automatically generated based on the NAT
settings applied to the respective network objects. The Manual NAT rule is placed at the top of
the NAT Rule Base so that it is the first rule to be matched.
Figure 228 — Manual NAT Example
The NAT Rule Base consists of the source, destination, and services information for the
original packet and the translated source, destination and services information after NAT has
been applied. The processing order for the overall inspection and routing of packets by the
Security Gateway is as follows:
1.
2.
3.
Firewall — Inspection on the Original Packet.
NAT — Translate the IP and/or port number as required.
Routing — Forward on the resulting packet.
_____________________
_____________________
263
Check Point Security Engineering
When configuring Manual NAT in Global Properties, check the Translate destination on client
side checkbox in the Manual NAT rules section.
Figure 229 — Global Properties for NAT Rules
_____________________
_____________________
264
Check Point Security Engineering
Proxy ARP for Manual NAT
For Manual NAT rules, it is necessary to configure proxy ARPs to associate the translated IP
address. A proxy ARP allows the Security Gateway to answer ARP queries for a network
address that is located on that same network. The ARP proxy is aware of the location of the
traffic’s destination, offering its own MAC address as the destination. When the data is
received from the external network, the Security Gateway forwards the data to the relevant
host on the internal network.
The configuration of proxy ARPs is necessary for situations such as when a manual Static NAT
rule has been created and the Security Gateway does not answer the ARP requests for the
Static NAT’d IP address in the Manual NAT rule. Another situation would be when a Security
Gateway replies to ARP requests with an incorrect MAC address, mostly for the NAT traffic.
To configure a proxy ARP:
1.
2.
3.
Match the IP addresses of the relevant hosts on the internal network to the MAC address
of the Security Gateway on the external network. This is saved in the $FWDIR/conf/
local.arp file.
Create the relevant Manual NAT rules.
Install the Security Policy.
_____________________
_____________________
265
Check Point Security Engineering
Firewa ll Admi ni stra ti on
In addition to understanding the Firewall kernel structure, it is important to familiarize yourself
with configuration file structure and commands typically used for troubleshooting problems.
To begin with, lets consider how the Firewall configuration files are broken down. The main
sub-grouping of configuration files are divided into directories located under /opt.
• CPsuite-R80 — Manages Firewall modules (R75.20 - R80). CPsuite is the generic
installation.
• CPshrd-R80 — Stores what used to be called SVN foundation, including cpd database,
licenses, registry and generic low level Check Point infrastructure. (not version related).
• CPEdgecmp-R80 — Manages Edge devices.
The /lib and /conf directories store definition files that are important to take into
consideration. For instance, the $FWDIR/lib/*.def files include Rule Base and protocol
definitions. User definitions are stored in $FWDIR/conf/fwauth.NDB and Security server
configuration settings are stored in $FWDIR/conf/fwauthd.conf.
$FWDIR/conf/classes.C defines fields for each object used in the objects_5_0.C
file, such as color, num/string and default value. Though the $FWDIR/database/ directory
on the Management server has no relevancy, this directory is particularly noteworthy on the
gateway itself, where specific object entries are stored for that particular gateway. There are
different ways to view and edit database files such as these.
• dbedit — A command line utility on the Management server itself.
• GuiDBedit.exe — An executable tool on the Windows-based GUI client machine
under: 
C:\Program Files (x86)\CheckPoint\SmartConsole\R80\Program.
NOTE
The objects_5_0.C file is still used for legacy gateways on R77.30 and
older. The database for R80.10 is located in PostgreSQL. x86 was added to
the path because most computers now run in 64-bit mode.
_____________________
_____________________
266
Check Point Security Engineering
Common Commands
• cpconfig — This command is used to run a command line version of the Check
Point Configuration tool and configure or reconfigure a Security Gateway/Management
installation.
• cplic print — Located in $CPDIR/bin, this command prints details of Check
Point licenses on the local machine. cplic print -x prints the licenses with
signatures and cplic del <signature> deletes a license.
• cpstart — This command is used to start all Check Point processes and applications
running on a machine.
• cpstop — This command is used to terminate all Check Point processes and
applications running on a machine.
The commands cpstop and cpstart are actually calling fwstop and fwstart scripts
for all Check Point products, including the Firewall stop/start scripts located in $FWDIR/bin.
These are scripts that run when you perform cpstop, cpstart and cprestart with
different flags. cprestart is an internal command used for Dynamically Assigned IP
(DAIP) devices, such as Edge devices. Not all Check Point processes are brought down when
cprestart is used; therefore, cpstop and cpstart should always be used.
_____________________
_____________________
267
Check Point Security Engineering
FW Monitor
The Check Point tool, fw monitor, is a packet analyzer tool which is on every Check Point
Security Gateway and is essential for packet capture and Firewall traffic analysis. It provides
kernel level inspection; but will not run in indiscriminate mode. fw monitor works for
layers 3 and above in the OSI Network layer stack. The syntax is the same regardless of the
platform and supports the.pcap output format used in Ethereal and Wireshark packet
analyzer tools.
Figure 230 — fw monitor
The easiest way to use fw monitor is to invoke it without any parameters. However, in a
busy system, running fw monitor without any filters can create a great detail of output and
makes the analysis difficult. Filter expressions are used to specify packets to be captured and
limit the amount of output. The general syntax is:
fw monitor -e “accept <expression>;” -o <filename>
Filter expressions include:
• host [<IP_Address>]
• net [<Network_IP_Address>, <Mask_Length>]
• port [<IANA_Port_Number>]
NOTE
Check Point recommends turning SecureXL (fwaccel off) when using
fw monitor to avoid misleading traffic captures. If SecureXL is on, the
tool will only show non-accelerated packets. SecureXL is discussed in a
later chapter.
_____________________
_____________________
268
Check Point Security Engineering
For example, to capture everything between host X and host Y:
[Expert@HostName]# fw monitor -e “host(x.x.x.x)and
host(y.y.y.y),accept;” -o/var/log/fw_mon.cap
For more fw monitor capture examples, refer to sk30583.
C2S Connections and S2C Packets
fw monitor captures packets as they enter and leave the Firewall kernel and when the
packet enters and leaves the Inbound and Outbound chains. In the case of Client-to-Server
(C2S) communication, a client designated as Host1, according to the policy, sends traffic
destined for a web server located behind the Firewall. Since the traffic is permitted passage
through the Firewall based on the policy Rule Base, the packet must traverse and be inspected
by both chains of the Firewall.
The command fw monitor works by loading a special filter that is applied to suspicious
packets. This filter is different from the INSPECT filter used to implement a Rule Base. Where
the Rule Base determines which packet is accepted, rejected or dropped, the INSPECT filter
generated by fw monitor simply captures kernel packet flows. You can capture everything
through the kernel using fw monitor, even a particular type of traffic or source.
Once fw monitor is executed, the specified INSPECT filter is compiled and loaded to the
kernel. Any parameters following accept in the fw monitor command will be displayed by
fw monitor. The same filter is executed on all interfaces in all directions. The fw
monitor output uses specific expressions to explain the location of the packet as it moves
through the Firewall.
Figure 231 — C2S and S2C Connections
_____________________
_____________________
269
Check Point Security Engineering
There are four inspection points as a packet passes through the kernel:
•
•
•
•
i — Before the virtual machine, in the Inbound direction (pre-Inbound)
I — After the virtual machine, in the Inbound direction (post-Inbound)
o — Before the virtual machine, in the Outbound direction (pre-Outbound)
O — After the virtual machine, in the Outbound direction (post-Outbound)
In our C2S scenario, i represents the packet as it left the client. The I represents the packet
already checked against the tables and Rule Base. In case of Static NAT, the destination IP
address will be changed. The o means the packet is before the Outbound kernel (same as I) and
O means the packet is in the Outbound kernel chain, as it will appear at the web server. In the
case of Hide NAT, the source IP address will be different here.
For packets traveling from Server-to-Client (S2C), the inspection points are the reverse. I
could be the NAT’d packet on its way out of the Inbound chain in the Firewall in the case of
Static NAT. At this point, the packet has already been checked by the tables and Rule Base.
The O is the packet as it will appear to the client.
Lab 1.6
Configuring Manual NAT
_____________________
_____________________
270
Configuring Manual 
Network Address Translation
L
A
B
1.6
In some circumstances, you may want to define your own NAT rules rather than rely on the automatic
system generated NAT rules. In this lab, you will configure manual NAT for HTTP traffic incoming to the
DMZ server.
Ta sks :
• Configure Manual NAT in the Security Policy.
• Configure the ARP file to facilitate NAT functionality.
• Test Manual NAT for HTTP traffic to the A-DMZ server.
Pe r for ma n c e Ob j ec t ive s:
• Complete the tasks necessary to perform Manual Network Address Translation.
• Create the ARP entries necessary for Manual NAT.
_____________________
_____________________
271
Check Point Security Engineering
Configuring the Security Policy
Follow these steps to define manual NAT in the Security Policy.
1.
In the Alpha_Standard Security Policy, disable the DMZ rule:
Figure 232 — DMZ Rule Disabled
2.
Edit the A-DMZ object:
Figure 233 — A-DMZ
_____________________
_____________________
272
Check Point Security Engineering
In the navigation pane, select NAT.
4. In the NAT page, clear the following option:
3.
Add automatic address translation rules
Figure 234 — A-DMZ - Automatic NAT Disabled
5.
Click OK.
_____________________
_____________________
273
Check Point Security Engineering
In the Alpha_Standard Security Policy, select Access Control > NAT.
7. Confirm that A-DMZ is not included in the Static NAT rules:
6.
Figure 235 — Network Address Translation Rules
Publish the changes to the database.
9. In the objects pane of SmartConsole, create a new Host object.
8.
_____________________
_____________________
274
Check Point Security Engineering
10. Use the information below to define the General page of the new Host:
Name: A-DMZ-NAT
Comment: Static NAT address of A-DMZ
Color: Dark Blue
IP Address: 203.0.113.171
Figure 236 — A-DMZ-NAT
11. Click OK.
_____________________
_____________________
275
Check Point Security Engineering
12. In the Rule Base, add a new rule above the disabled DMZ rule:
Figure 237 — Default Rule Added
_____________________
_____________________
276
Check Point Security Engineering
13. Use the following information to configure the new rule:
Name: Incoming
Source: Any
Destination: A-DMZ-NAT
Services & 
Applications: http
Action: Accept
Track: Log
Install On: A-GW-Cluster
Figure 238 — Incoming Rule
_____________________
_____________________
277
Check Point Security Engineering
14. View the NAT Rule Base:
Figure 239 — NAT Rule Base
_____________________
_____________________
278
Check Point Security Engineering
15. Add a new rule to the top of the NAT Rule Base:
Figure 240 — Default Rule Added to NAT Rule Base
NOTE
To add the first manual NAT rule to the NAT Rule Base, select the Add Rule to Top
button from the toolbar directly above the NAT Rule Base.
16. In the Original Destination field, add the A-DMZ-NAT object.
17. In the Original Services field, add HTTP.
18. In the Translated Destination field, add A-DMZ.
19. In the Install On field, add A-GW-Cluster.
_____________________
_____________________
279
Check Point Security Engineering
20. Verify that the new rule appears as follows:
Figure 241 — Manual NAT Rule Configured
_____________________
_____________________
280
Check Point Security Engineering
21. Add a new rule below the first manual NAT rule.
22. In the Original Source column, add A-DMZ.
23. In the Original Services column, add HTTP.
24. In the Translated Source column, add A-DMZ-NAT.
25. In the Install On column, add A-GW-Cluster.
26. Verify that the new reciprocal manual NAT rule appears as follows:
Figure 242 — Reciprocal Manual NAT Rule Configured
_____________________
_____________________
281
Check Point Security Engineering
27. Publish the changes to the database:
Figure 243 — SmartConsole
28. Install the Alpha Security Policy.
_____________________
_____________________
282
Check Point Security Engineering
Configuring the ARP Table
Configure the ARP table for manual NAT to work successfully.
1.
From A-GUI, connect to the Gaia Portal on A-GW-01:
Figure 244 — Gaia Portal
_____________________
_____________________
283
Check Point Security Engineering
2.
In the navigation pane, select ARP:
Figure 245 — Gaia Portal - ARP
_____________________
_____________________
284
Check Point Security Engineering
In the Proxy ARP section of the page, click the Add button.
4. Use the information below to configure the Add New Proxy ARP Entry window:
3.
IPv4 Address: 203.0.113.171
Advertise IP via: Interface Name eth3
Real IP Address: 203.0.113.2
Figure 246 — Add New Proxy ARP Entry Configured
_____________________
_____________________
285
Check Point Security Engineering
5.
Click Save, to add the entry to the ARP table:
Figure 247 — Proxy ARP Entry Added
6.
Log out of the Gaia Portal on A-GW-01.
_____________________
_____________________
286
Check Point Security Engineering
Log into the Gaia Portal on A-GW-02.
8. In the navigation pane, select ARP.
9. In the Proxy ARP section of the page, click Add.
10. Use the information below to configure the Add New Proxy ARP Entry:
7.
IPv4 Address: 203.0.113.171
Advertise IP via: Interface Name eth3
Real IP Address: 203.0.113.3
Figure 248 — Add New Proxy ARP Entry Configured
_____________________
_____________________
287
Check Point Security Engineering
11. Click Save, to add the entry to the ARP table:
Figure 249 — Proxy ARP Entry Added
12. Log out of the Gaia Portal on A-GW-02.
_____________________
_____________________
288
Check Point Security Engineering
13. In SmartConsole, select Global Properties from the Application Menu.
14. In the navigation pane, select NAT - Network Address Translation.
15. On the NAT page, select the following option:
Merge manual proxy ARP configuration
Figure 250 — Global Properties - NAT Configured
16. Publish the changes and install the Alpha_Standard Security Policy.
_____________________
_____________________
289
Check Point Security Engineering
17. From B-Host, open a Web browser.
18. Use HTTP to connect to the static NAT address of A-DMZ (203.0.113.171).
19. From A-GUI, identify the accepted HTTP traffic from B-Host to A-DMZ.
20. View the log details to see the NAT taking place.
_____________________
_____________________
290
Check Point Security Engineering
Reconfigure the Alpha Rule Base
Remove the manual NAT configuration and configure automatic Static NAT for the DMZ object.
In the Alpha Security Policy, delete the Incoming rule.
2. Enable the DMZ rule.
3. Add the following to the Services & Applications field of the DMZ rule:
1.
ftp
4.
Configure the Destination column of the DMZ rule to include only the A-DMZ object:
Figure 251 — DMZ Rule Configured
_____________________
_____________________
291
Check Point Security Engineering
Edit the A-DMZ object.
6. Use the information below to configure the NAT settings for A-DMZ:
5.
Add automatic address translation rules: Selected
Translation Method: Static
Translation IP Address: 203.0.113.171
Install on Gateway: A-GW-Cluster
Figure 252 — Host - NAT Configured
Click OK.
8. In SmartConsole, view the NAT Rule Base.
9. Delete the two manual NAT rules.
10. Delete the A-DMZ-NAT object.
7.
_____________________
_____________________
292
Check Point Security Engineering
11. Confirm that the Alpha NAT Rule Base appears as follows:
Figure 253 — NAT Rule Base Configured
12. Publish the changes to the database.
END OF LAB 1.6
_____________________
_____________________
293
Check Point Security Engineering
Review Questions
1.
What is CPUSE and what is it used for?
2.
Name at least three Stateful features provided with the Connection table.
_____________________
_____________________
294
Check Point Security Engineering
Automation & Orchestration
C
H
A
P
T
E
R
2
Trusted Application Programming Interfaces (APIs) enable enterprises using network or
orchestration systems to securely integrate a security management solution that has
automation capabilities into their workflow processes. The Check Point API makes it easy
to integrate securely with orchestration, change management and ticketing systems. With
the ability to control exactly what that integration can and cannot do, organizations have
the confidence to embed security into their IT ecosystem.
Learning Objectives
• Recognize how Check Point’s flexible API architecture supports automation and orchestration of
daily operations.
• Understand how to use the management API command line tools and web services to read
information, create objects, work on Security Policies, and send commands to the Check Point
Security Management Server.
_____________________
_____________________
295
Check Point Security Engineering
Automation & Orchestration
Automation is the process of automating tasks normally performed by human intervention to
be performed by a machine as a means to providing efficiency and minimizing human error.
Orchestration is the choreography of automating the arrangement, coordination and
management of processes performed within complex computer systems and services into a
logical workflow. It reduces the time and effort for deploying multiple instances of a single
task by automatically performing a series of tasks which previously could only be performed
by multiple administrators.
How Automation and Orchestration Differ
Automation and Orchestration differ in that automation relates to codifying tasks whereas
orchestration relates to codifying processes. Automation is concerned with executing a single
task, such as launching a web server or stopping a service, in a repeatable, consistent manner.
Orchestration takes a series of automated tasks developed through automation and puts them
all together into a process workflow which can simplify the complex management of today’s
network security infrastructures. For example, an organization may use a cloud orchestrator
programming to manage the interconnections and interactions among their cloud-based and
on-site business units. Orchestration also involves the process of coordinating an exchange of
information through web service interactions, such as XML and JSON.
C h e c k Poi n t A P I s
Check Point’s R80.10 Security Management platform provides the framework to support both
Automation and Orchestration through its flexible API architecture. An API is a set of
routines, protocols, and tools for building software applications. Check Point provides a
complete CLI and API interface for security management which will enable the automation of
daily operations and full integration with 3rd party and other systems, such as network
management systems, ticketing systems, virtualization servers, and cloud orchestrators.
Automation and SmartConsole management operations are allowed based on the same
privilege profile.
Check Point APIs allow system engineers and developers to make changes to their
organization’s Security Policy with CLI tools and Web Services. An API can be used to:
• Execute an automated script to perform common tasks.
• Integrate Check Point products with 3rd party solutions.
• Create products that use and enhance the Check Point solution.
_____________________
_____________________
296
Check Point Security Engineering
There are different APIs for various Check Point products:
• Management API — Used to read information, create objects, work on Security
Policies and send commands to the Check Point Security Management Server. The
Management API has a JSON/XML web services option, a Gaia CLI from the R80.10
SmartConsole, the new mgmt_cli tool, and the Gaia Clish.
• Threat Prevention API — A cloud-based service used to control Threat Emulation,
Antivirus, and Threat Extraction products.
• Identity Awareness Web Services API — A web services API used to add, remove,
and show the status of identity parameters. For example, using the API, a new user can
be added to an Access Role or a user can be allowed to connect to the internal network
from a different IP address.
• OPSEC SDK — These APIs are used to open and monitor connections between the
Security Management Server and gateways, and other hosts and objects.
During this course, we will focus solely on the Management API.
NOTE
OPSEC SDK contains APIs for commands that were originally used with
SecurePlatform. These commands can also be used on the Gaia operating
system.
_____________________
_____________________
297
Check Point Security Engineering
C h e c k Poi n t A P I A rc hi te c t u r e
The Check Point API Architecture consists of the API server and API interaction mechanisms.
The API server communicates with CPM in the same way as SmartConsole. An API
automated session will generate audit logs and will display the validation errors and warnings.
The API architecture also supports Concurrent Administration. The same permission profiles
that control the GUI are enforced when using an automation session.
The API server uses JavaScript Object Notation (JSON) for data interchanges. JSON is a
lightweight data-interchanging format which is easy for individuals to read and write, and for
machines to parse and generate. Interaction mechanisms are command sources, such as Web
Services and Management CLIs. All API clients use the same port as the Gaia Portal.
Figure 254 — API Architecture
Command Sources
Command sources allow you to communicate with the API server and perform many tasks
using management APIs.
• The SmartConsole GUI console — From SmartConsole, click the Command Line
button to open a CLI window and enter API commands. For example, you can use the
add host command to create a new host and then publish the changes.
• The mgmt_cli Tool — Runs in Expert mode and lets you enter commands from a
Windows or Linux computer. mgmt_cli uses the same authentication (username and
password) as the GUI client; however, it does not require a GUI installation.
• Gaia CLI — Log in to Gaia with an administrator account on the Security
Management Server and enter API commands using Clish.
• Web Services — Send HTTPS Post requests to the Security Management Server.
_____________________
_____________________
298
Check Point Security Engineering
RESTful API
RESTful APIs allow systems to use web services to access, manipulate, delete, change, and
add resources. They use standard HTTP methods sent by script to GET, PUT, POST, and
DELETE data. The management API uses RESTful API to send calls using the POST method.
An example of using a RESTful API to call the login would be:
HTTP POST https://<mgmt>/web_api/login
Content-Type: application/json
The content type Header tells the client how to compose requests in the body to the server.
_____________________
_____________________
299
Check Point Security Engineering
Operational Flow
The chart below diagrams the operational flow of an API session.
Figure 255 — API Operational Flow
_____________________
_____________________
300
Check Point Security Engineering
API Server Configuration
The management API server is part of the R80.10 management server installation. To manage
security through API and CLI, you must first configure the API server.
The API server runs scripts that automate daily tasks on the Security Management Server. It
also integrates Check Point products with third party systems. To configure the API server, in
SmartConsole, go to Manage & Settings > Blade. In the Management API section, click
Advanced Settings and the Management API Settings window will open. Configure the Startup
Settings and the Access Settings.
Startup Settings start the API server when the Security Management Server starts. The
Automatic start setting is selected by default in the following environments:
• Security Management Servers (without gateway functionality) with at least 4GB of
RAM
• Standalone Security Management Servers (with gateway functionality) with at least
8GB of RAM
NOTE
Verify your installation requirements prior to configuring the API
server.
_____________________
_____________________
301
Check Point Security Engineering
Access Settings configure IP addresses from which the API server accepts requests. The
Management server only option is selected by default. This option instructs the API server to
accept scripts and web requests only from the Security Management Server. To send an API
request, open a command line interface on the server and use the mgmt_cli utility.
Figure 256 — Configure API Server
To verify that the API server is running, run the following command in Expert mode:
api status
To start the API server, run the following command in Expert mode:
api start
To stop the API server, run the following command in Expert mode:
api stop
_____________________
_____________________
302
Check Point Security Engineering
Management API Commands
To type API commands from the SmartConsole GUI, click the command line interface button
located in the bottom left corner to open the Command Line interface window.
Figure 257 — Command Line Interface
Basic API Commands include:
•
•
•
•
•
•
•
•
login
add
set
show
delete
publish
discard
logout
_____________________
_____________________
303
Check Point Security Engineering
In the GUI, scripting begins with a login dialog to receive a session token. A login command
creates a session. User name and password parameters are always required. Here is the syntax
for a login script:
login user <username> password <password> --format json
The output for this example is as follows:
{
“sid” : “97BVpRfN4j8logN-V2XqGYMW3DDwIhoSN0Og8PiKDiM”,
“url” : “https://192.0.2.1:443/web_api”,
“uid” : “7a13a360-9b24-40d7-acd3-5b50247be33e”,
“session-timeout” : 600,
“last-login-was-at” : {
“posix” : 1430032266851,
“iso-8601” : “2015-04-26T10:11+0300”
}
}
NOTE
“--format json” is optional.
The sid string represents the session unique identifier. This identifier is entered in the ‘Xchkp-sid’ header of each request. The url parameter identifies the URL which was used
to reach the API server. The uid string is the session object identifier. It may be used in
discard API to discard changes that were made in the session, when the administrator is
working from another session.
API commands can be used to create scripts for key security management components,
including:
•
•
•
•
•
Network Objects — Hosts, Networks, Groups, Access Roles
Services and Applications — Service TCP, Service UDP, Application
Policy — Install policy, policy package management
Access Control and NAT — Access rules, NAT rules
VPN — VPN Community Meshed, VPN Community Star
For example, to create a new host, use the following command:
add host name <New Host Name> ip-address <ip address>
_____________________
_____________________
304
Check Point Security Engineering
The mgmt_cli Tool
The mgmt_cli tool uses the same syntax that is used inside the SmartConsole GUI. The only
difference is that when using the tool, for a command to run, you must to provide login
credentials or use a session-id token that was obtained previously using the login command.
The mgmt_cli tool transforms the arguments it receives to RESTful API calls.
The mgmt_cli tool can be run on any Linux or Windows machine. A Linux version of the
command line tool is included in all R80.10 Gaia installations. The executable mgmt_cli is
included in the R80.10 SmartConsole installation. The mgmt_cli.exe does not require a
GUI installation. It can be copied to run on most Windows-based computers.
The following API script example uses the mgmt_cli tool to log in and create a new host:
mgmt_cli
mgmt_cli
id.txt
mgmt_cli
mgmt_cli
login user “AdminUser1” password “teabag” > id.txt
add host name “New_Host_1” ip-address “1.1.1.1 -s
publish -s id.txt
logout -s id.txt
In the example above, the output from the login command is redirected to a file called
id.txt. By using the -s parameter, the rest of the commands read id.txt and
automatically extract the session-id from this file.
Users logged in to a management server as Root, can run mgmt_cli commands without
providing their credentials. These are users with Super Administrator permissions. To use this
option, add --root true to the end of the mgmt_cli command.
All mgmt_cli commands can use CSV files for automation purposes as well. For example,
the following command can be used to create multiple host objects from a Microsoft Excel
spreadsheet:
# mgmt_cli add host --batch hosts1.csv
Gaia CLI (Clish)
To run management API commands in Gaia’s shell, you must first log in as a administration
user. The syntax is identical to the commands that you run in the SmartConsole GUI; however,
all management commands begin with the mgmt command. For example: mgmt add host.
_____________________
_____________________
305
Check Point Security Engineering
Web Services
Using Web Services to build an application that communicates with the Check Point
management server requires the following components for the web request:
• HTTP Post to — Identifies the management server and port. The default port is 443.
• HTTP Headers — Consists of the content-type, such as application/json, and
the x-chkp-sid header. The x-chkp-sid is the session ID token and is mandatory
in all API calls, except login.
• Request payload — Text containing the different parameters in the specified format
(json or xml).
Management API Support
Check Point Management API utilizes the full potential of the R80.XX Security Management
Server and can be used within any programming environment. To assist you in building
automation tools for your organization, Check Point recommends the following reference
tools.
The Management API Reference Guide
This online guide provides an introduction to Check Point Management API. The guide may
be accessed via the Check Point User Center and the management server (/api_docs).
Figure 258 — Management API Reference Guide
_____________________
_____________________
306
Check Point Security Engineering
The Check Point CheckMates Community
Join the Check Point CheckMates community to browse the latest scripts built by experts in the
field, get code samples, network with developers, and access additional API documentation. A
direct link to Check Point CheckMates is located on the Check Point website, or enter this
URL into your browser: https://community.checkpoint.com/
Figure 259 — Check Point CheckMates
L a b 2 .1
Managing Objects Using the Check Point API
_____________________
_____________________
307
L
A
B
Managing Objects Using 
the Check Point API
2.1
Check Point’s Application Programming Interface (API) allows administrators to quickly and easily
perform common tasks through a command line interface.
Ta sks :
• Configure the Check Point API.
• Create and edit objects using the Check Point API.
Pe r for ma n c e Ob j ec t ive s:
• Demonstrate how to define new network and group objects using the Check Point API.
• Demonstrate how to modify existing objects using the Check Point API.
_____________________
_____________________
308
Check Point Security Engineering
Configuring the Check Point API
Activate the API software blade.
Select the Manage & Settings tab.
2. Select the Blades icon.
3. In the Blades page, identify the Management API section:
1.
Figure 260 — Management API Settings
_____________________
_____________________
309
Check Point Security Engineering
4.
Click the Advanced Settings button, and the system displays the following window:
Figure 261 — Management API Advanced Settings
5.
Use the information below to confirm the Management API settings:
Startup Settings: Automatic Start
Accept API calls from: Management Server Only
Launch a Putty session from A-GUI to A-SMS.
7. Log into the server as admin:
6.
Figure 262 — Putty Session
_____________________
_____________________
310
Check Point Security Engineering
8.
At the prompt, type the following command and press Enter:
api status
Figure 263 — api status
NOTE
The API should be running by default. If it is not, you can stop and start it using the
following commands:
• api start
• api stop
Check Point recommends restarting the API with the api restart command after
making major changes.
9.
Close the Putty session.
_____________________
_____________________
311
Check Point Security Engineering
Defining and Editing Objects in the API
Create and edit basic objects through the API.
1.
In SmartConsole, click the Command Line icon in the lower left of the screen. The system displays the
following window:
Figure 264 — Command Line
_____________________
_____________________
312
Check Point Security Engineering
2.
To define a new host from the API, execute the following command:
add host name “myHost1” ip-address 192.168.0.201
Figure 265 — add new host
NOTE
All object names in this lab are case sensitive
_____________________
_____________________
313
Check Point Security Engineering
3.
To define a new network object, execute the following command:
add network name “myNetwork” subnet 192.168.0.0 subnet-mask 255.255.255.0
Figure 266 — add network name
_____________________
_____________________
314
Check Point Security Engineering
4.
In the objects panel, verify that the following new objects are now listed:
◦ myHost1
◦ myNetwork
Figure 267 — Objects Panel
_____________________
_____________________
315
Check Point Security Engineering
5.
From the API, execute the following command:
add group name “myGroup” members myHost1
Figure 268 — add group name
NOTE
This will create a new group object and will include myHost1 a member of
this group.
_____________________
_____________________
316
Check Point Security Engineering
6.
Execute the following command:
add host name "My Test Host" ip-address 192.168.0.111 groups myGroup
Figure 269 — add host name
NOTE
By defining the new object name with surrounding quotation marks, the
system allows the name to include spaces.
_____________________
_____________________
317
Check Point Security Engineering
7.
To edit an existing object, use the set command:
set host name “myHost1” color "blue"
Figure 270 — set host
_____________________
_____________________
318
Check Point Security Engineering
8.
To define a group with multiple member objects, execute the following command:
add group name "myGroup1" members.1 "My Test Host" members.2 "A-GUI"
Figure 271 — add group name
Close the Command Line window.
10. In SmartConsole, view the myGroup object to view the added member objects:
9.
Figure 272 — myGroup
_____________________
_____________________
319
Check Point Security Engineering
11. Click OK.
12. View the myGroup1 object to confirm its member objects:
Figure 273 — myGroup1
13. Click OK.
14. Next, discard all the changes without publishing:
Figure 274 — SmartConsole
15. Click Discard.
_____________________
_____________________
320
Check Point Security Engineering
16. Verify that the objects created in the API are no longer listed in the objects pane:
Figure 275 — Objects Discarded
END OF LAB 2.1
_____________________
_____________________
321
Check Point Security Engineering
Review Questions
1.
What are the four command sources which allow you to communicate with the management server using management API?
2.
What does the sid command string identify?
_____________________
_____________________
322
C
H
A
P
T
E
R
Check Point Security Engineering
Redundancy
3
Security Gateways can be configured to provide redundancy to prevent network downtime. The failure of a Security Gateway or VPN connection can result in the loss of active
connections, many of which can be mission critical and result in the loss of critical data.
Whether your preferred network redundancy protocol is Check Point ClusterXL
technology or standard Virtual Routing Redundancy Protocol (VRRP), it is no longer a
platform choice you will have to make with Gaia. Both ClusterXL and VRRP are fully
supported by Gaia. The concept of clustering was introduced in the CCSA course. During
this chapter we will explore clustering in greater detail.
Learning Objectives
• Discuss advanced ClusterXL functions and redundancy.
• Describe VRRP network redundancy and its advantages.
_____________________
_____________________
323
Check Point Security Engineering
Advanced ClusterXL
ClusterXL supplies an infrastructure that ensures no data is lost in event of a system failure.
This Check Point cluster solution uses unique physical IP and MAC addresses for its cluster
members and virtual IP addresses to represent the cluster itself. The virtual IP addresses do not
belong to an actual machine interface, and it is recommended that each cluster member have at
least three interfaces: one external interface, one internal interface, and one for
synchronization.
ClusterXL is part of the standard Security Gateway installation and can be configured for Load
Sharing or High Availability mode.
Advantages of Using ClusterXL
Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point
appliances, open servers and virtualized environments. While both platforms provide the
ability to monitor the state of their clusters, ClusterXL provides more in-depth operational and
monitoring capabilities. For example, when using ClusterXL, System Administrators know
when their cluster has failed over and can also see why it failed over by using the cphaprob
list command. In addition, if an interface goes down, System Administrators can determine
if it is fully down or partially down by using the cphaprob -a if command. They can see
which firewall is currently active, or in the case of Load Sharing, which gateway is carrying
the load and the percentage of the load carried using the cphaprob stat command.
Advantages of using ClusterXL include:
•
•
•
•
•
Tight integration with Check Point management and enforcement points
Transparent failover
Higher performance
Easy deployment
Cost-effective
Load Sharing
ClusterXL Load Sharing distributes traffic within a cluster so that the total throughput of
multiple members is increased. In Load Sharing clusters, all functioning members are active
and handle network traffic. This is referred to as an Active/Active configuration. Load Sharing
clusters increase linear performance for CPU-intensive applications such as VPNs, security
servers, policy servers, and User Directory (LDAP).
With Load Sharing, if any member of a cluster becomes unreachable, transparent failover
occurs to the remaining operational members in the cluster, thus providing High Availability.
All connections are shared between the remaining Security Gateway, without interruption.
_____________________
_____________________
324
Check Point Security Engineering
ClusterXL Load Sharing configurations require all machines to be synchronized, which differs
from High Availability. Machines in a ClusterXL High Availability configuration do not have
to be synchronized, however connections will be lost upon failover if they are not.
ClusterXL offers two different Load Sharing solutions: Multicast and Unicast. These modes
differ in the way members receive the packets sent to the cluster.
Multicast Load Sharing
In ClusterXL Multicast Load Sharing mode, every member of the cluster receives all of the
packets sent to the cluster IP address. The Multicast mechanism allows several interfaces to be
associated with a single Multicast MAC address. Therefore, when a router or Layer 3 switch
forwards packets to all of the cluster members using Multicast mode, a ClusterXL decision
algorithm on the cluster members decides which cluster member should perform enforcement
processing on the packet. Only that machine processes the packet and sends the packet to its
destination. The other machines drop the packet. This decision-making process is the core of
the Multicast Load Sharing mechanism. It has to ensure that at least one member will process
each packet so that the traffic is not blocked, and no two members will handle the same
packets, so that traffic is not duplicated. Only routers or Layer 3 switches that accept a
Multicast MAC address as a response to an ARP request with a Unicast IP address are
supported for Multicast Load Sharing.
Unicast Load Sharing
In ClusterXL Load Sharing Unicast mode, one machine, called the Pivot machine, receives all
traffic from a router with a Unicast configuration and redistributes the packets to the other
machines in the cluster. The Pivot machine is chosen automatically by ClusterXL.
The Pivot is the only machine that communicates with the router. In this scheme, the router
uses the Pivot’s Unicast MAC address to communicate to the cluster. The Pivot functions as a
cluster router, both from the internal network outwards and vice versa. This functionality also
applies to DMZ networks.
After the Pivot first receives the packet from the router or switch, the Pivot’s Load Sharing
decision function decides which cluster member should handle the packet. This decision
function is made in a similar fashion to the Multicast Load Sharing decision. The Pivot may
also decide to handle the packet itself. In such a case, Pivot Load Sharing will give the packet
to the Pivot’s Firewall component for processing. If the Pivot encounters a problem, a regular
failover event occurs and another cluster member assumes the role of the new Pivot. The Pivot
member is always the active member with the highest priority. Therefore, when the original
pivot recovers, it will resume its previous role. The non-pivot members are also active, but do
not make decisions.
_____________________
_____________________
325
Check Point Security Engineering
Because the Pivot is busy distributing traffic, the Pivot participates to a lesser extent in the
actual Load Sharing function. The other cluster members take on more traffic load. Since the
Check Point Pivot feature is based on Unicast addresses only, it can work with all routers and
Layer 3 switches. The following diagram and steps outline how a packet travels through a
Unicast Load Sharing cluster.
Figure 276 — Unicast Load Sharing Mode Packet Path
_____________________
_____________________
326
Check Point Security Engineering
When the router sends a packet through the cluster, the following occurs:
1.
2.
3.
4.
5.
6.
7.
8.
The router sends an ARP request for the cluster IP address.
The Pivot returns an ARP reply with its own Unicast MAC address, to the router.
The router sends the packet to the Pivot. The Pivot decides which cluster member should
handle the packet.
The Pivot forwards the packet to the designated cluster member without changing the
packet. The destination IP address of the packet remains unchanged and neither decryption nor NAT functionality is performed on the forwarded packet. When sending the
packet, the Pivot uses the virtual MAC address of the designated cluster member. The
packet is forwarded through the original interface.
The receiving cluster member performs inspection and sends the packet to its destination.
The return packet first reaches the Pivot. The return packet then goes through the same
process although it may not necessarily be forwarded by the Pivot to the same cluster
member.
The Pivot assigns the cluster member to handle the packet.
The receiving cluster member performs inspection and sends the packet to its destination.
P roxy A R P
Address Resolution Protocol (ARP) is a communications protocol used to map an IP address to
a physical machine address (MAC address) that is recognized by the local network. When a
packet arrives at a gateway, the gateway will ask ARP to find a physical host or MAC address.
ARP will try to locate the address and provide it so that the packet can be converted and sent to
the host machine. An ARP cache table is used to maintain a correlation between each MAC
address and its corresponding IP address. If ARP does not find an entry for the IP address, it
will broadcast a request packet for the MAC address.
By design, in ClusterXL High Availability mode or Load Sharing Unicast/Multicast mode,
Gratuitous ARP request packets for specified hosts, will be sent with the Source IP addresses
of the specified hosts. These requests update the ARP cache tables and do not expect a reply.
Cluster synchronization does not rely on ARP.
Proxy ARP enables a host or router to reply to any ARP requests with its own MAC address. In
many cases the network will configure a gateway to act in proxy as the host. The gateway will
accept the ARP requests and reply with its own MAC address. The Proxy ARP recognizes the
destination of the network traffic and provides its MAC address as the final destination. The
traffic is then routed to the intended destination using another interface or via tunnel. Proxy
ARP is also useful for environments that have NAT’d Firewalls.
_____________________
_____________________
327
Check Point Security Engineering
When using static NAT, a cluster can be configured to automatically recognize the hosts hidden
behind it and issue ARP replies with the cluster MAC address, on their behalf. This process is
referred to as Automatic Proxy ARP. If using ClusterXL VMAC mode or different subnets for
the cluster IP, the Proxy ARP must be configured manually.
Configuration for Proxy ARP entails:
1.
2.
Configuring Data Link layer to Network layer matching on each cluster member, thus
matching the IP addresses of the relevant hosts on the network where they are located to
the MAC address of the Security Gateway on the network where the IP addresses of these
hosts should be published.
Creating relevant Manual NAT rules. The policy must be installed.
Proxy ARP can create denial-of-service (DoS) attacks on a network if mis-configured.
V M AC
Cluster Virtual MAC (VMAC) is a variation of the High Availability (HA) and Load Sharing
Unicast mode for ClusterXL. Upon failover in High Availability/Load Sharing Unicast mode,
a new Active/Pivot member will send Gratuitous-ARP requests (G-ARPs) for the virtual IP
with the physical MAC address of the new Active/Pivot. When this occurs, a member with a
large number of Static NAT entries can transmit too many G-ARPs and network components
may start to ignore them or refrain from updating them fast enough in their ARP cache table.
As a result, traffic outages may occur. Configuring the cluster to use VMAC mode allows all
cluster members to use the same Virtual MAC address and minimizes possible traffic outages
during a failover. In addition, G-ARPs for NAT’d IP addresses are no longer needed.
VMAC that is advertised by the cluster members through G-ARP requests, keeps the real
MAC address of each member and adds another VMAC address on top of it. Keeping the real
MAC address of each member is necessary in that connectivity to the IP address of the member
itself is required. VMAC failover time is shorter than a failover that involves a physical MAC
address.
_____________________
_____________________
328
Check Point Security Engineering
Configuring VMAC
VMAC can be configured via SmartConsole or CLI. To configure VMAC via SmartConsole,
select the cluster object and navigate to the Gateway Cluster Properties window. Select the
ClusterXL and VRRP menu option, and then enable the Use Virtual MAC option located under
the Advanced Settings section.
Figure 277 — Gateway Cluster Properties - Use Virtual MAC
To configure VMAC using the command line, you must first set the value of the global kernel
parameter, fwha_vmac_global_param_enabled to 1. (The default value is 0. The
default value means that VMAC is disabled).
To ensure that VMAC mode is enabled, run the following command on all members:
fw ctl get int fwha_vmac_global_param_enabled
If the value returned is 1, the feature is enabled. If not enabled, use the following command:
fw ctl set int fwha_vmac_global_param_enabled
_____________________
_____________________
329
Check Point Security Engineering
To view the VMAC address of each virtual cluster interface, run the following command:
cphaprob -a if
C l u s ter S y n c h ro n i z a t i o n
To make sure each Gateway cluster member is aware of the connections going through the
other members, a mechanism called State Synchronization exists, which allows status
information about connections on the Security Gateways to be shared between the members.
State Synchronization enables all machines in the cluster to be aware of the connections
passing through each of the other machines. It ensures that if there is a failure in a cluster
member, connections that were handled by the failed machine will be maintained by the other
machines. Since the synchronization network carries the most sensitive Security Policy
information in the organization, it is critical that system engineers protect it against malicious
and unintentional threats. Check Point recommends using one of the following strategies to
secure the synchronization interfaces:
• Use a dedicated synchronization network.
• Connect the physical network interfaces of the cluster members directly using a crosscable. In a cluster with three or more members, use a dedicated hub or switch.
Every IP-based service, including TCP and UDP, recognized by the Security Gateway is
synchronized. State Synchronization is used both by ClusterXL and by third-party OPSEC
Certified clustering products. State Synchronization works in the following two modes:
• Full Synchronization — Transfers all Firewall kernel table information from one
cluster member to another. Full synchronization is used for initial transfers of state
information for thousands of connections. If a cluster member is brought up after
failing, it will perform full sync. Once all members are synchronized, only updates are
transferred via delta sync. Full synchronization between cluster members is handled by
the Firewall kernel using TCP port 256.
• Delta Synchronization — Transfers changes in the kernel tables between cluster
members. Delta sync is much quicker than full sync. It is handled by the Firewall
kernel, using UDP Multicast or Broadcast on port 8116.
Running cphastart on a cluster member activates ClusterXL on the member is the
recommended way to start a cluster member. It does not initiate full synchronization.
cphamcset turns off the cluster process. State Synchronization also stops. It is still possible
to open connections directly to the cluster member. These commands should only be run by the
Security Gateway, not directly by the user.
To monitor the synchronization mechanism on ClusterXL or third-party OPSEC Certified
clustering products, run the following command:
fw ctl pstat
_____________________
_____________________
330
Check Point Security Engineering
Synchronized Cluster Restrictions
The following restrictions apply to synchronizing cluster members:
Only cluster members running on the same platform can be synchronized.
The cluster members must be of the same software version.
With CoreXL enabled, the number of cores must be the same.
A user-authenticated connection through a cluster member will be lost if the cluster
member fails. This is because the user-authentication state is maintained by a process
on the Security Gateway and it cannot be synchronized on members the same way that
kernel data is synchronized. All other synchronized cluster members will be unable to
resume the connection. However, a client-authenticated or session-authenticated
connection will be maintained, because the states of these authentications are saved in
kernel tables and can be synchronized.
• The state of connections using system resources cannot be synchronized for the same
reason that user-authenticated connections cannot be synchronized.
• Accounting information is accumulated on each cluster member and sent to the
Security Management Server, where the information is aggregated. In case of a failover,
accounting information that was accumulated on the failed member but not yet reported
to the Security Management Server is lost. To minimize the risk, reduce the period in
which accounting information is sent. Navigate to the cluster object’s Logs >
Additional Logging window, and edit the number of seconds to update the Account
Log.
•
•
•
•
To Synchronize or Not to Synchronize
In general, all connections on a cluster are synchronized between members. There are a few
exceptions. System engineers may choose not to synchronize certain types of connections for a
variety of reasons, such as:
• A significant load on the network is caused by the use of a particular service.
• A service may open many short connections, whose loss may not be very important, or
even noticed. For example, DNS over UDP or HTTP.
• Bi-directional stickiness is employed for all connections. For example, any cluster in
High Availability mode or ClusterXL in a Load Sharing mode with no VPN or static
NAT. Sticky connections are discussed later in this chapter.
For all TCP services whose protocol type is HTTP or None, you can configure the Security
Gateway to delay a connection so that it will only be synchronized if it still exists after the
connection is initiated for x seconds. This capability is only available if a SecureXL-enabled
device is installed on the gateway. SecureXL is discussed in greater detail in a later chapter.
_____________________
_____________________
331
Check Point Security Engineering
C l u s ter C o n n e c t i v i t y U p g ra d e
There are several methods available for upgrading ClusterXL deployments. The simplest
method is to upgrade each cluster member as an independent gateway, but this will cause
system downtime. Other methods involve at least one Active member or two cluster members
handling traffic during the upgrade. With these methods, connections that are initiated during
or after the upgrade process could possibly be dropped.
The Connectivity Upgrade (CU) method synchronizes existing connections to maintain
connectivity and eliminate downtime during cluster upgrades. In a Cluster Connectivity
Upgrade, there is always at least one Active cluster member that handles the traffic, and
connection failover is guaranteed. Connections are even synchronized between cluster
members running different Check Point software versions. Using CU, cluster members can be
upgraded to Check Point software versions R77.20 and above. For more detailed information
regarding software versions that support CU, refer to the Check Point Connectivity Upgrade
Administration Guide.
NOTE
Cluster CU supports Dynamic Routing synchronization when upgrading to
R80.10.
Before upgrading with CU, it is important to make sure that the cluster has 2 or more members,
with one member Active and all other members in Standby mode. The state of a cluster
member can be checked by running the cphaprob state command. When the upgrade is
complete, a message will display the upgrade status as ready for failover. At this point, the
CCP will work in broadcast mode. To return it to multicast mode, on all cluster members, run
the cphaconf set_ccp multicast command.
If error messages are displayed in the connectivity upgrade script, discontinue the upgrade and
contact Check Point Support.
There are several features that do not survive after failover to an upgraded cluster member
when using CU. These features include, but are not limited to the following:
• General failover limitations such as Security servers, and connections handled by
services marked as non-synced
• Connections initiated by individual cluster members
• TCP connections that are TCP streamed
• VPN connections for Mobile Access, Remote Access, and Traditional VPN mode
• FTP control connections with NAT
• Sessions authenticated with Identity Awareness
• DLP connections
_____________________
_____________________
332
Check Point Security Engineering
In addition, Software Blade information is not synchronized during failover to an upgraded
cluster member. If the blade is configured to maintain connectivity over security, the
connection will be accepted without inspection and forwarded to the destination member.
However if the destination member is not available, the connection will be dropped. For
additional limitations related to a general failover, refer to the Check Point ClusterXL
Administration Guide.
A d d a M e m b e r to a n E x i s t i n g C l u s te r
ClusterXL can support up to eight cluster members. To add a member to an existing cluster:
1.
2.
3.
4.
5.
6.
Run cpconfig to enable ClusterXL on the cluster member.
Change the IP address of the new cluster member to reflect the correct topology.
Ensure that all Check Point products are installed on the new cluster member. All Check
Point software components must be identical on each member of the cluster.
In the Cluster Members page of the cluster object, create a new cluster member with the
appropriate properties if the Security Gateway is new, or convert an existing gateway to a
cluster member. If the member is a new Security Gateway, ensure that SIC is initialized
and the topology is correctly defined.
Ensure that the proper interfaces on the new cluster member are configured as cluster
interfaces if the cluster mode is Load Sharing or New High Availability.
Install the Security Policy on the cluster. The new member is now part of the cluster.
Sticky Connections
A connection is sticky when all of its packets are handled, in either direction, by a single
cluster member. This is the case in High Availability mode, where all connections are routed
through the same cluster member.
In Load Sharing mode, there are cases where it is necessary to ensure that a connection that
starts on a specific cluster member will continue to be processed by the same cluster member
in both directions. To that end, certain connections can be made sticky by enabling the Sticky
Decision Function (SDF).
In a non-sticky connection, the reply packet returns via a different Security Gateway than the
original packet. The synchronization mechanism knows how to properly handle these
connections. In a non-sticky connection, a cluster member can receive an out-of-state packet,
which the Security Gateway normally drops because it poses a security risk. In Load Sharing
cluster configurations, Static NAT and encrypted connections may be non-sticky when the
source and destination IP addresses change. Non-sticky connections will also occur if the
System Administrator has configured asymmetric routing, where a reply packet returns
through a different Security Gateway than the original packet. Asymmetric routing occurs
when a packet is NAT’d or encrypted.
_____________________
_____________________
333
Check Point Security Engineering
The Sticky Decision Function
The SDF is required in cases of Asymmetric Routing. In these cases, the packet is modified by
the cluster member, and since the packet entering the Firewall is not the same as the one
leaving, the regular decision function will not be able to make sure that the packet will go back
through the original member. The SDF will try to match each packet to numerous kernel tables
in an attempt to decide which member should handle the packet.
The SDF enables certain services to operate in a Load Sharing deployment. For example, it is
required for Layer 2 Tunneling Protocol (L2TP) traffic, or when the cluster is a participant in a
Site-to-Site VPN tunnel with a third-party peer.
The following services and connection types are supported by enabling the SDF:
• VPN deployments with third-party VPN peers
• Endpoint Connect/SSL Network Extender encrypted connections
The SDF is not supported when employing either acceleration technologies, such as SecureXL
and CoreXL, or a hardware-based accelerator card. Enabling the SDF disables these
acceleration products.
M a n a g e m e n t H i g h Ava i l a b i l i t y
The Security Management Server consists of several databases with information on different
aspects of the system, such as objects, users, and policy information. This data changes each
time the System Administrator makes modifications to the system. It is important to maintain a
copy of this data so that crucial information is not permanently lost in the event of an Security
Management Server failure.
Moreover, if the management server fails or is down for administrative purposes, a secondary
server must be in place to take over its activities. In the absence of the Security Management
Server, essential operations performed by the gateways, such as the fetching of the Security
Policy and the retrieval of the Certificate Retrieval List (CRL), cannot take place. Installing a
secondary Security Management Server and deploying Management High Availability (HA)
provides Security Management Server redundancy.
In a Management High Availability environment, the Active Security Management Server,
which is specified as the Primary, always has one or more standby management servers ready
to take over in the event of a failure. The Standby Security Management Servers must all be of
the same operating system and version. The existence of the Standby Security Management
Server allows for crucial backups to be in place. When a Standby Security Management Server
is installed, configure and specify it as Secondary. Initially, the Primary and Secondary
Security Management Servers must be manually synchronized. If additional Standby servers
are installed, configure automatic synchronization in the Global Properties.
_____________________
_____________________
334
Check Point Security Engineering
Once the Secondary Security Management Server has been installed and manually
synchronized, the Primary and Secondary are both prepared to function as the Active Security
Management Server.
Secondary and Standby Security Management Servers
The Secondary Security Management Server is created with empty databases that are filled
with information that it receives from the Active Security Management Server. The Secondary
Security Management Server is ready when:
• It is represented on the Primary Security Management Server as a network object.
• SIC has been initialized between it and the Primary Security Management Server.
• Synchronization has been completed with the Primary Security Management Server for
the first time.
In a situation where the Primary Security Management Server becomes permanently
unavailable, it is not sufficient to do the failover procedure and change the Standby server to
Active. The Secondary server must be promoted to Primary, or a new Primary must be
established. The database can only be exported from a Primary server.
All management operations, such as editing and installing the Security Policy and modifying
users and objects, are done by the Active Security Management Server. If the Active server is
down and any of these operations need to be performed, the Secondary or one of the Standby
Security Management Servers should be made active by the System Administrator. This
transition from Standby to Active must be initiated manually.
The Standby servers are synchronized to the Active server so they are kept up-to-date with all
changes in the databases and Security Policy. Security Gateways can fetch the Security Policy
and retrieve a CRL from both the Active and the Standby servers.
Security Management Server Failover
Security Management Server failover is a manual procedure. If the Active Security
Management Server fails or it is necessary to change the Active to Standby, the following steps
must be taken to prevent data loss.
If the Active Security Management Server is responsive:
1.
2.
3.
Manually synchronize the Active and Standby Security Management Servers.
Change the Active Security Management Server to Standby.
Change the Standby Security Management Server to Active.
_____________________
_____________________
335
Check Point Security Engineering
If the Active Security Management Server has failed and is unresponsive to changes, manually
change the Standby Security Management Server to Active. Make sure that no peer server is
Active before making the change.
NOTE
If two Security Management Servers are set to Active at the same time,
unexpected behavior can occur.
Before making changes to the High Availability environment, make sure that the status of each
Security Management Server is known.
Synchronizing Management HA Active and Standby Servers
Synchronization can be performed manually or automatically. Manual synchronization is a
process initialized by the System Administrator. It can be set to synchronize databases and the
installed Security Policy. After Standby servers are installed, the first synchronization must be
performed manually even if the system is configured for automatic synchronization.
Automatic synchronization is configured by the System Administrator to allow the Standby
Security Management Server to be synchronized with the Active Security Management Server
at set intervals. This is the standard mode of synchronization because it keeps the Standby
Security Management Server updated. The synchronization schedule is based on when the
Security Policy is installed, which can be set to every time the policy is saved or on a set
scheduled time, such as daily at 2:00 AM. It is always possible to synchronize manually, even
when automatic synchronization has been selected.
When synchronization is in progress, all databases are locked, and a snapshot of the databases
are saved to a local disk. The system then compresses the snapshot data and copies the
snapshot from the Active Security Management Server to all Standby management servers.
The Standby servers will overwrite their databases with the snapshot and send a Restore status
notification to the Active Security Management Server.
For Management HA to function properly, the following data is backed up and synchronized:
• Network Security Management Databases (such as the Network Objects, policy settings,
and the Security Policy itself)
• Configuration and Internal Certificate Authority (ICA) data (such as Objects and Users
databases, certificate information, and the CRL, which is available to be fetched by the
Check Point Security Gateways)
• Endpoint Security databases, if applicable
_____________________
_____________________
336
Check Point Security Engineering
Synchronization Status
The synchronization status indicates the status of the peer Security Management Server in
relation to that of the selected Security Management Server. This status can be viewed in the
Management High Availability window or in SmartView Monitor, depending on whether you
are connected to the Active or Standby Security Management Server. The following statuses
may be displayed:
• Never been synchronized — Immediately after the Secondary Security Management
Server has been installed, it has not yet undergone the first manual synchronization that
brings it up-to-date with the Primary Security Management Server.
• Synchronized — The peer is properly synchronized and has the same database
information and installed Security Policy.
• Lagging — The peer Security Management Server has not been synchronized since the
Active Security Management Server had changes applied to it.
• Advanced — The peer Security Management Server is more up-to-date.
• Collision — The Active Security Management Server and its peer have different
installed policies and/or databases. The System Administrator must perform manual
synchronization and decide which of the servers to overwrite. For example, when
Security Management Server-A fails before a synchronization takes place, the changes
made to databases or to the Security Policy cannot be synchronized with Security
Management Server-B. When Security Management Server-B takes over from Security
Management Server-A, the System Administrator may decide to modify the Security
Policy.
Synchronization Troubleshooting
Synchronization can fail for technical reasons, such as when the Active Security Management
Server does not connect with the Standby Security Management Server. To resolve issues such
as this, perform one of the following actions:
• Manually synchronize the Standby Security Management Server.
• Install the Security Policy on the Active Security Management Server again. Use this
option if automatic synchronization is configured. Once the policy is re-installed, the
synchronization should occur automatically.
_____________________
_____________________
337
Check Point Security Engineering
Synchronization can also fail if a collision occurs. In this case the System Administrator
should manually synchronize the servers and choose which database is the dominant database.
The CA is merged to prevent security issues. If a collision occurs between the servers, and one
of the Security Management Servers is overwritten, use the Audit Logs to better understand the
situation. Review the management operations which were recently performed on the
overwritten server and perform them again, on the dominant server, if necessary.
O P S E C C e r ti f i e d C l u s ter i n g P ro d u c t s
Products that carry the OPSEC Certified seal have been tested to guarantee integration and
interoperability with Check Point software and hardware platforms. There are a number of
OPSEC Certified High Availability and Load Sharing products which are used to configure
HA Security Gateway clusters and to distribute traffic evenly among the clustered gateways.
These clustering applications vary in monitoring, management, and performance capabilities.
Their role however, is the same in that they each:
1.
2.
3.
Decide which cluster member will deal with each connection.
Perform health checks, which involves checking cluster member status (Active, Standby
or Down) and member interface status.
Perform failover.
As with ClusterXL, OPSEC Certified clustering products use Check Point State
Synchronization to exchange and update connection data and other Security Gateway states
between cluster members.
L a b 3 .1
Deploying a Secondary Security Management Server
_____________________
_____________________
338
L
A
B
Deploying a Secondary 
Security Management Server
3.1
You will now configure a secondary Security Management Server and install it at the Alpha site for full
Management High-Availability.
Ta sks :
• Install a secondary Security Management Server at the Alpha site.
• Configure Alpha’s secondary Security Management Server for High Availability.
• Test Management High Availability.
Pe r for ma n c e Ob j ec t ive s:
• Install and Configure Management High Availability.
_____________________
_____________________
339
Check Point Security Engineering
Installing the Secondary Management Server
Configure the secondary Security Management Server for Alpha.
1.
Verify that your instructor has pre-installed the secondary SMS at the Alpha site.
NOTE
If the instructor has not previously installed the secondary SMS, perform the
installation and configure the new machine to match the hardware settings (Hard
Disk size, RAM allotment, etc.) of the primary SMS. The log partition should be at
least 30 GB. It’s IP address should be 10.1.1.102/24 and it’s default gateway should
be 10.1.1.1. Only the default admin user is needed and should be configured with
Chkp!234 as the password.
A-GUI, connect to the newly installed server (10.1.1.102) through HTTPS.
3. Log into the Gaia Portal using the following credentials:
2.
Username: admin
Password: Chkp!234
4.
Begin the First Time Configuration wizard for A-SMS-02.
_____________________
_____________________
340
Check Point Security Engineering
5.
Use the following information to configure the Device Information page:
Host Name: A-SMS-02
Domain Name: alpha.cp
Primary DNS Server: 192.168.11.101
Figure 278 — Device Information
6.
Configure the NTP server to be:
192.168.21.101
On the Products page, clear the Security Gateway option.
8. Select only the Security Management option.
7.
_____________________
_____________________
341
Check Point Security Engineering
9.
In the Clustering section, select Secondary from the Define Security Management as drop-down list:
Figure 279 — Products
NOTE
It is important to define this server as secondary prior to establishing SIC.
10. Click Next.
11. Enter and confirm sic123 as the Activation Key.
12. Click the Finish button, and begin the configuration process.
_____________________
_____________________
342
Check Point Security Engineering
13. In the Messages page, add the following text:
A-SMS-02
Unauthorized access of this server is prohibited and punishable by law.
Figure 280 — Messages Configured
14. Click Apply.
15. Sign out of the Gaia Portal.
_____________________
_____________________
343
Check Point Security Engineering
Configuring Management High Availability
Configure the secondary Security Management Server for Management High Availability functions.
On A-GUI, launch SmartConsole and log into A-SMS (10.1.1.101).
2. In the Objects pane, click New > More > Network Object > Gateways and Servers > Check Point Host.
1.
Figure 281 — Objects Pane Menu
3.
Use the information below to configure the Check Point Host:
Name: A-SMS-02
IPv4 Address: 10.1.1.102
Comment: Alpha Secondary Security Management Server
_____________________
_____________________
344
Check Point Security Engineering
4.
In the Management tab of the Host object, select Network Policy Management.
NOTE
By default, the system selects the Secondary Server and Logging & Status options.
5.
Verify that the A-SMS-02 object is configured as follows:
Figure 282 — Check Point Host
_____________________
_____________________
345
Check Point Security Engineering
6.
Click on the communication button and establish SIC with the server, using the following activation
key:
sic123
Select the option Don’t show this message again.
8. Click OK, to clear the message.
9. Click OK to close the object.
10. Publish the changes, and the system begins initialization of A-SMS-02:
7.
Figure 283 — Peer Initialization
_____________________
_____________________
346
Check Point Security Engineering
11. After the secondary SMS is initialized, the system automatically beings the full synchronization
process:
Figure 284 — Full Sync Task Details
_____________________
_____________________
347
Check Point Security Engineering
12. Click the Menu icon to view the Application Menu:
Figure 285 — Application Menu
13. Select Management High Availability, and the system displays the following window:
Figure 286 — High Availability Status
_____________________
_____________________
348
Check Point Security Engineering
14. Confirm that the synchronization completed successfully.
15. Close the status window.
16. Install the Alpha Security Policy.
17. Install the Bravo Security Policy.
_____________________
_____________________
349
Check Point Security Engineering
Testing Management High Availability
View the Alpha Security Policy on the secondary SMS to verify High Availability functionality.
1.
From SmartConsole, click Application Menu > Management High Availability to view the
synchronization status:
Figure 287 — Management High Availability status
NOTE
If you get a synchronization error, wait a minute, and try again.
2.
Close all other SmartConsole applications that may be open at this time.
NOTE
The only application running should be the one initiating the synchronization. If
other applications are open, the change action will fail.
3.
In the Status window, click the Actions button associated with A-SMS.
_____________________
_____________________
350
Check Point Security Engineering
4.
Click Set Standby, and the system displays the following message:
Figure 288 — SmartConsole
5.
Click OK, and the system displays the following warning:
Figure 289 — SmartConsole
Click OK to close SmartConsole.
7. Re-launch SmartConsole and use the information below to connect to the secondary Security
Management Server:
6.
Username: admin
Password: Chkp!234
IP Address: 10.1.1.102
NOTE
If you are unable to log into A-SMS-02 and receive an “Internal Error,” Reboot 
A-SMS and wait five minutes after the reboot completes before attempting to log
into A-SMS-02.
_____________________
_____________________
351
Check Point Security Engineering
8.
Click Login, and approve the fingerprint message to continue:
Figure 290 — Fingerprint
9.
Click Proceed, and SmartConsole displays the Gateways & Servers tab of A-SMS-02:
Figure 291 — Gateways & Servers
_____________________
_____________________
352
Check Point Security Engineering
10. Click the Application Menu.
11. Select Management High Availability, and the system displays the status screen showing A-SMS-02
set to Standby:
Figure 292 — High Availability Status
12. In the A-SMS-02 section, click Actions > Set Active, and the system displays the following message:
Figure 293 — SmartConsole
_____________________
_____________________
353
Check Point Security Engineering
13. Click Yes, and the system displays the following window:
Figure 294 — High Availability Status
14. After the change over completes, the system displays the following message:
Figure 295 — SmartConsole
15. Click OK.
16. Verify that the High Availability Status window confirms a successful changeover:
Figure 296 — High Availability Status
_____________________
_____________________
354
Check Point Security Engineering
17. Close SmartConsole.
18. Log into SmartConsole, connecting to A-SMS-02 (10.1.1.102):
Figure 297 — Login Window
_____________________
_____________________
355
Check Point Security Engineering
19. Verify policy synchronization:
Figure 298 — Full Sync Task Details
NOTE
Wait for the full sync to complete before proceeding to the next step. Check the
synchronization status by viewing the Recent Tasks list in the lower left corner of
SmartConsole.
_____________________
_____________________
356
Check Point Security Engineering
20. Next, use the information below to configure a new Host object:
Name: Test
Comment: Management HA Test Object
Color: Pink
IP Address: 192.168.0.201
Figure 299 — New Host Configured
_____________________
_____________________
357
Check Point Security Engineering
21. Publish and install the Alpha Security Policy.
Figure 300 — Install Policy
_____________________
_____________________
358
Check Point Security Engineering
22. Verify successful policy installation from A-SMS-02:
Figure 301 — Install Policy Details
23. From the application menu, select Management High Availability:
Figure 302 — High Availability Status
24. In the A-SMS-02 section of the window, click the Actions button.
_____________________
_____________________
359
Check Point Security Engineering
25. Click Set Standby, and the system displays the following message:
Figure 303 — SmartConsole
26. Click OK, and the system switches A-SMS-02 to standby.
Figure 304 — SmartConsole
27. Click OK, to close SmartConsole.
_____________________
_____________________
360
Check Point Security Engineering
28. Next, log into A-SMS:
Figure 305 — SmartConsole Login
NOTE
Verify that you are logging into A-SMS (10.1.1.101) before continuing.
_____________________
_____________________
361
Check Point Security Engineering
29. Once connected to A-SMS, view the list of Host objects to see the new Test object exists:
Figure 306 — Test Object Confirmation
30. Click the Application Menu.
31. Select Management High Availability, and the system displays the status screen showing A-SMS set to
Standby:
Figure 307 — High Availability Status
_____________________
_____________________
362
Check Point Security Engineering
32. In the A-SMS section, click Actions > Set Active, and the system displays the following message:
Figure 308 — SmartConsole
33. Click Yes, and the system displays the following window:
Figure 309 — SmartConsole
34. Click OK.
35. Confirm that A-SMS shows a status of Active:
Figure 310 — High Availability Status
36. Publish any changes to the database and close SmartConsole.
37. Open SmartConsole again, this time connecting to 10.1.1.101. The Management High Availability
Status window shows A-SMS as Active and A-SMS-02 as Standby.
_____________________
_____________________
363
Check Point Security Engineering
38. Publish and install the Alpha_Standard Security Policy.
NOTE
If your environment is not fully functional, contact your instructor for assistance. Do
not proceed if your configuration has problems.
39. Once the primary server is shown as active and synchronized, power off the secondary Security
Management Server.
NOTE
Make sure that all synchronization and policy installation events are completed
before powering off A-SMS-02.
40. Delete the A-SMS-02 object.
41. Publish and install the Alpha Security Policy.
42. Install the Bravo Security Policy.
END OF LAB 3.1
_____________________
_____________________
364
Check Point Security Engineering
VRRP Clusters
Virtual Routing Redundancy Protocol (VRRP) and ClusterXL are mutually exclusive. VRRP
is a network management protocol that is used to increase the availability of default gateway
servicing hosts on the same subnet. It improves the reliability and performance of the host
network by enabling a virtual router to act as the default gateway for that network.
VRRP enables you to set up a group of routers as a default gateway router for backup or
redundancy. As a cluster solution, it makes the group of physical routers appear as a single
virtual router, allowing hosts to configure the virtual router as their default gateway. The
VRRP routing platforms share the IP address corresponding to the default route configured on
the hosts. Similarly to ClusterXL, one of the VRRP routing platforms is the Master (active)
and the others are backups (standby). If the Master fails, one of the backup routers becomes the
new Master router, providing a virtual default gateway and enabling traffic to be routed
without relying on the failed router. A priority algorithm is used to determine if failover to a
backup is necessary, when the Master or its interfaces fails. VRRP increases redundancy,
making it significantly beneficial in situations where the availability of the default path for
network hosts is critical. It can be implemented in Ethernet, multi-protocol label switching,
and token ring networks.
As with ClusterXL, VRRP clusters can be configured for High Availability. Each VRRP
cluster, known as a virtual router, has a unique Virtual Router Identifier (VRID).The VRID is a
number used to group the routers. A virtual router can have one or more virtual IP (VIP)
addresses to which other network nodes connect as a final destination or the next hop in a
route. Only the Master is assigned a VIP. The backup is assigned a VIP upon failover when it
becomes the Master. Check Point’s implementation of VRRP includes additional functionality
called Monitored Circuit VRRP. Monitored Circuit VRRP prevents black holes caused by
asymmetric routes created when only one interface on the Master router fails, as opposed to the
Master itself. Gaia releases priority over all interfaces on a virtual router to let failover occur.
NOTE
You cannot have a standalone deployment in a Gaia VRRP cluster.
_____________________
_____________________
365
Check Point Security Engineering
VRRP Features
VRRP is specifically designed to enable data routing, forwarding, and switching among a pool
of virtual routers. When using VRRP, a higher availability default path is gained without
requiring the configuration of dynamic routing or router discovery protocols on every host.
While there are methods such as Proxy ARP that can help clients find their default router,
many security engineers simply configure a static route to a single router on each client
because it is easier. However, if the single router goes down, the client will be unable to reach
other networks.
VRRP features include:
• Minimized failover time and bandwidth overhead when a primary router becomes
unavailable
• Support of up to 255 virtual routers on a router physical interface, subject to the
platform supporting multiple MAC addresses
• Minimized service disruptions during failover
• Provision for election of multiple virtual routers on a network for Load Sharing
• No need to make configuration changes in the end nodes if a gateway router fails
• Router discovery protocols to support failover operations is no longer required
• Failover problems are addressed at the router level instead of on the network edge
• Functionality over a wide variety of multi-access LAN technologies capable of
supporting IP traffic
V R R P Typ e s
VRRP can be configured using one of these types:
• Simple Monitored Circuit VRRP — This configuration contains all of the basic
parameters and is applicable for most environments. Each virtual router is configured
as one unit.
• Advanced VRRP — This procedure requires users to manually configure a virtual
router for each monitored interface. Use Advanced VRRP if you are working with:
◦ A system on which VRRP has already been configured using this method.
◦ An environment where it is necessary to monitor each interface individually.
◦ The preempt VMAC mode.
Simple Monitored Circuit VRRP and Advanced VRRP cannot be used together on the same
Security Gateway.
_____________________
_____________________
366
Check Point Security Engineering
Monitored Circuit VRRP
Monitored Circuit VRRP is a functionality included in the Check Point VRRP implementation.
It eliminates connection issues caused by asymmetric routes when only one interface on the
Master fails, as opposed to the entire platform. This problem occurs in environments where a
gateway is a member of two or more virtual routers, typically one with internal interfaces and
the other with external interfaces. For example, when an external interface fails or becomes
unreachable, the Master fails over to the backup for the external virtual router while the
internal virtual router stays on the Master. This can cause connectivity issues when the internal
virtual router accepts traffic and is unable to connect to the new external Master.
Simple Monitored Circuit VRRP monitors all VRRP interfaces on the Security Gateways.
When using Advanced VRRP, each interface in a virtual router can be configured separately. If
one interface fails, the Master releases its priority over all of its VRRP interfaces. This allows
the Master to fail over on all virtual routers that include the failed Master.
To release priority, Gaia subtracts the Priority Delta, a Check Point proprietary parameter
which is defined when the virtual router is configured, from the Priority Value to calculate an
Effective Priority. If configured properly, the Effective Priority will be lower than that of the
backup routers in the other virtual routers and the VRRP election protocol is triggered to select
a new Master. If the Effective Priority for the current Master and backup are the same, the
gateway with the highest IP address becomes the Master.
Security Policies
Security policies must be configured to accept VRRP packets on the Gaia platform if it is a
Firewall blade-enabled Security Gateway. The Multicast destination assigned by the Internet
Assigned Numbers Authority (IANA) for VRRP is 224.0.0.18. If the policy does not accept
packets to 224.0.0.18, Firewall platforms in one Virtual Router take on Master state. If your
Security Gateways use dynamic routing protocols such as OSPRF or RIP, create new rules for
each multicast destination IP address.
_____________________
_____________________
367
Check Point Security Engineering
Advanced VRRP
Advanced VRRP allows virtual routers to be configured at the interface level. Every virtual
router must be configured to monitor every VRRP interface. Advanced VRRP can be changed
to Simple Monitored Circuit VRRP by deleting all existing virtual routers and creating new
ones. When changing, it is important to understand that a backup address cannot be moved
from one interface to another while a Security Gateway is a Master. The following steps are
performed to delete and add new interfaces with the necessary IP addresses:
1.
2.
3.
4.
5.
Cause a failover to the backup.
Reduce the priority or disconnect an interface.
Delete the virtual router on the interface.
Create a new virtual router using the new IP address.
Configure the virtual router.
Advanced VRRP can be configured via WebUI or CLI. Use set and show commands to
configure global and advanced VRRP settings via CLI, such as:
set vrrp interface VALUE
show vrrp interface VALUE
_____________________
_____________________
368
Check Point Security Engineering
VRRP Configuration Parameters
Regardless of the type of VRRP method used, VRRP configuration parameters must be
defined and configured on each node. The values for each parameter are described in the table
below.
Parameter
Description
VRID
Range is 1- 255. Choose a numbering scheme for the virtual routers
that will make sense to your organization.
Priority
Range is 1 - 254. The default value is 100. The priority value
determines which router takes over in the event of a failure. The router
with the higher priority becomes the new master. To provide a faster
transition is the event of a failure, set the priority to 254 for at least
one platform in each VRID, and choose values on the higher end of
the scale for the backups. Effective Priority = Priority - the Priority
Delta.
Priority Delta
This parameter applies only to Monitored Circuit VRRP. Check Point
recommends using a standard priority delta, such as 10, to simplify
configuration. Choose a value that will ensure that when an interface
fails, the priority delta subtracted from the priority results in an
effective priority that is lower than that of all of the backup routers.
Hello Interval
Range is 1 - 255 seconds. The default setting is 1 second. The Hello
Interval is the time interval in seconds at which the master sends
VRRP advertisements. Set the same value for all nodes in the VRID.
Authentication
Choose to require no authentication for VRRP advertisements or to
require a simple password before a VRRP advertisement is accepted
by the interface. Select the same authentication method for all nodes
in the VRID.
Backup Address
This parameter applies only to Monitored Circuit VRRP. The backup
(Virtual IP Address) address must be in the same network as the interface used for the
VRID. When entered, the system will use the interface that is in that
subnet for the VRID.
Table 7: VRRP Configuration Parameters
Lab 3.2
Enabling Check Point VRRP
_____________________
_____________________
369
Enabling Check Point VRRP
L
A
B
3.2
In this lab, you will add Check Point VRRP to your ClusterXL deployment to add additional functionality
and reliability.
Ta sks :
• Define a virtual router for the VRRP configuration.
• Configure the Bravo Security Policy to allow VRRP traffic between cluster members.
Pe r for ma n c e Ob j ec t ive s:
• Demonstrate how to configure VRRP as the failover method for a Security Gateway Cluster.
_____________________
_____________________
370
Check Point Security Engineering
Viewing ClusterXL Failover
Before deploying VRRP, review the behavior of a Cluster deploying only ClusterXL.
Log into B-GW-01.
2. Type the following command and press Enter, to identify the status of the Bravo cluster:
1.
cphaprob stat
Figure 311 — cphaprob stat
3.
Identify the Active cluster member.
_____________________
_____________________
371
Check Point Security Engineering
4.
Next, review the synchronization status of each interface configured in the Bravo cluster by executing
the following command:
cphaprob -a if
Figure 312 — cphaprob -a if
_____________________
_____________________
372
Check Point Security Engineering
5.
On the Active cluster member, force failover by clearing the following option on Network Adapter 2
(Internal Interface):
Connected
Figure 313 — Internal Interface Manipulated
6.
Click OK.
_____________________
_____________________
373
Check Point Security Engineering
7.
On the system disconnected in the steps above, review the state of the interfaces by executing the
following command:
cphaprob -a if
Figure 314 — cphaprob -a if
8.
Next, confirm that the member gateways have failed over:
cphaprob stat
Figure 315 — cphaprob stat
9.
Reconnect Network Adapter 2 on the system that was disconnected in the steps above.
_____________________
_____________________
374
Check Point Security Engineering
Defining a Virtual Router for VRRP
Use the Gaia Portal to reconfigure both Security Gateways in preparation for switching to a VRRP failover solution.
From A-GUI, use HTTPS to connect to B-GW-01 (203.0.113.102)
2. Log in using the following credentials and the system displays the Overview page:
1.
Username: admin
Password: Chkp!234
Figure 316 — Overview
_____________________
_____________________
375
Check Point Security Engineering
3.
In the navigation pane, click Network Interfaces:
Figure 317 — Network Interfaces
4.
Make a note of the following IP addresses associated with the interfaces on this machine.
eth1: ____________________
eth2: ____________________
eth3:_____________________
NOTE
Remember, the synchronization network for our configuration is 192.168.20.0. That
makes eth2 our sync interface.
_____________________
_____________________
376
Check Point Security Engineering
In the navigation pane, locate the High Availability section.
6. Click VRRP, to view the following page:
5.
Figure 318 — VRRP
_____________________
_____________________
377
Check Point Security Engineering
7.
In the Virtual Routers section, click Add:
Figure 319 — Add Virtual Router
8.
In the Virtual Router ID field, type 1.
_____________________
_____________________
378
Check Point Security Engineering
9.
Verify that the Virtual Router is configured with the following information:
Virtual Router ID: 1
Priority: 100
Priority Delta: 10
Hello Interval: 1
Preempt Mode: Selected
Auto-deactivation: Unchecked
Authentication: None
Figure 320 — Add Virtual Router Configured
NOTE
The Priority and Delta values determine how the system fails over. In this scenario,
we have two gateways, the first with a priority of 100 and the second with a priority
of 95. If the first gateway fails, it’s priority changes to 90 and the second gateway
with the higher priority (95) takes over.
_____________________
_____________________
379
Check Point Security Engineering
10. In the Backup Address section of the window, click Add.
11. Enter the cluster IP address (203.0.113.100) and select VRRP for the mode:
Figure 321 — Add Backup Address Configured
12. Click OK.
13. Next add the following backup address, with VMAC Mode of VRRP, for the internal interface:
192.168.21.1
14. Verify that the Add Virtual Router window is configured as follows:
Figure 322 — Add Virtual Router Configured
_____________________
_____________________
380
Check Point Security Engineering
15. Click Save, and the system adds the Virtual Router to the configuration:
Figure 323 — VRRP - Virtual Router Configured
NOTE
Since eth2 is the sync interface, it should not have a cluster IP address.
16. Log out of the Gaia Portal for B-GW-01.
_____________________
_____________________
381
Check Point Security Engineering
17. Use HTTPS to log into the Gaia Portal for B-GW-02 (203.0.113.103).
18. From the Overview page, make a note of the interfaces configured for B-GW-02:
Figure 324 — Overview
19. Make a note of the IP addresses associated with the following interfaces on this machine.
eth1: ____________________
eth2: ____________________
eth3: ____________________
NOTE
Remember, the synchronization network for our configuration is 192.168.1.0. That
makes eth3 our sync interface.
20. Navigate to the VRRP page and add a Virtual Router.
_____________________
_____________________
382
Check Point Security Engineering
21. Use the information below to configure the Virtual Router settings:
Virtual Router ID: 1
Priority: 95
Priority Delta: 10
Hello Interval: 1
Preempt Mode: Selected
Auto-deactivation: Unchecked
Authentication: None
Backup Addresses: 203.0.113.100
192.168.21.1
_____________________
_____________________
383
Check Point Security Engineering
22. Verify that the new Virtual Router is configured as follows:
Figure 325 — Add Virtual Router Configured
NOTE
To work, the priority of this gateway must be higher than the diminished priority of
the gateway we just configured (100 - 90 < 95).
_____________________
_____________________
384
Check Point Security Engineering
23. Click Save, and the system displays the Virtual Router in the VRRP page:
Figure 326 — VRRP
NOTE
The Virtual Router ID must be the same, 1 in our configuration, for all gateways in
the cluster.
24. Sign out of this session.
_____________________
_____________________
385
Check Point Security Engineering
25. Log into the B-GW-01 virtual machine, and type the following command:
cpconfig
26. View the configuration options:
Figure 327 — cpconfig
27. Verify that item number six reads as follows:
Disable cluster membership for this gateway
NOTE
If item six reads Enable cluster membership for this gateway, type 6 and press Enter.
If not, this feature is already configured, so continue to the next step.
28. Exit cpconfig.
29. After exiting cpconfig, reboot the virtual machine and save the configuration.
30. Repeat steps 25-29 for B-GW-02.
_____________________
_____________________
386
Check Point Security Engineering
Configuring the Security Policy for VRRP
In a previous lab, you defined a cluster object for use in the Bravo ClusterXL configuration. Confirm the
cluster configuration and modify the object to work with VRRP High Availability.
In SmartConsole, edit the B-GW-Cluster object.
2. Select Network Management, and verify that the interfaces are configured as follows:
1.
Figure 328 — Gateway Cluster Properties - Topology Configured
_____________________
_____________________
387
Check Point Security Engineering
Select General Properties, and verify that the object’s OS is defined as “Gaia”.
4. In the Network Security tab, clear the ClusterXL option:
3.
Figure 329 — Gateway Cluster Properties - General Properties Configured
_____________________
_____________________
388
Check Point Security Engineering
In the navigation pane, click 3rd Party Configuration.
6. Select High Availability for the Cluster Mode.
7. In the 3rd Party Solution drop-down list, select Check Point IPSO VRRP:
5.
Figure 330 — 3rd Party Configuration
8.
Verify that the following options are selected:
◦ Hide Cluster Members’ outgoing traffic behind the Cluster IP Address
◦ Forward Cluster’s incoming traffic to Cluster Members’ IP Addresses
Click OK.
10. View the Bravo Security Policy.
9.
_____________________
_____________________
389
Check Point Security Engineering
11. Create a new rule below the Noise rule.
12. Use the following information to configure the new rule to allow VRRP traffic between cluster
members:
Name: VRRP
Source: B-GW-Cluster
Destination: Any
Service: VRRP
Action: Accept
Track: Log
Figure 331 — VRRP Traffic Rule
13. Publish and install the Bravo Security Policy.
_____________________
_____________________
390
Check Point Security Engineering
14. In the Gateways & Servers tab of SmartConsole, view the B-GW-Cluster object:
Figure 332 — Gateways & Servers
_____________________
_____________________
391
Check Point Security Engineering
15. Click the Device & License Information link for B-GW-01:
Figure 333 — Device & License Information
16. Confirm that the ClusterXL section displays the following Working Mode status:
Sync only (OPSEC)
_____________________
_____________________
392
Check Point Security Engineering
17. Click the ClusterXL arrow to view more specific information.
18. Confirm that both Security Gateways in the cluster show the Working Mode for ClusterXL as Sync
only (OPSEC):
Figure 334 — Device & License Information
NOTE
The Sync only status indicates that the VRRP Virtual Router is controlling failover.
_____________________
_____________________
393
Check Point Security Engineering
19. In Clish on each gateway, perform the cphaprob stat command. Both gateways should show as
Active and the system should display a Cluster Mode of sync only (OPSEC):
Figure 335 — cphaprob stat
NOTE
The status of both gateways show all interfaces as Active. This just means that the
“heartbeat” between the interfaces indicates that both are servers are up and
available.
_____________________
_____________________
394
Check Point Security Engineering
20. To check the status of the VRRP configuration, type the following command and press Enter:
show vrrp
Figure 336 — show vrrp
NOTE
Here, you’ll see the behavior of VRRP. For example, we see two interfaces
configured. On this machine, all two are in the Master state. The other router should
show two in the backup state.
21. Initiate an FTP session from A-GUI to B-Host and transfer an ISO or other large file. During the data
transfer, force down one of the gateways to see the failover take place.
NOTE
You can also failover individual interfaces. Try this by initiating the FTP transfer
again, but this time, change the LAN setting of the External interface to be LAN X.
When you run the show vrrp command on the secondary machine, the status will
show one master and one backup.
END OF LAB 3.2
_____________________
_____________________
395
Check Point Security Engineering
Review Questions
1.
What happens when the Sticky Decision Function (SDF) is enabled?
2.
Describe what a cluster VMAC is and how it works.
_____________________
_____________________
396
C
H
A
P
T
E
R
Check Point Security Engineering
Acceleration
4
Check Point provides two software-based acceleration features to optimize performance:
SecureXL and CoreXL. SecureXL is a software acceleration product installed on Security
Gateways, to create a SecureXL device layer. The Check Point Security Gateway enables
security decisions to be made at this lower application level to remove performance
bottlenecks. CoreXL is a performance-enhancing technology for Security Gateways on
multi-CPU-core processing platforms. When enabled, CoreXL empowers the processing
CPU cores to simultaneously perform multiple tasks, which enhances Security Gateway
performance without requiring changes to management or to network topology. This
chapter also introduces Multi-Queue, which allows each network interface to use more
than one CPU for acceleration.
Learning Objectives
• Understand how SecureXL acceleration technology enhances and optimizes Security Gateway
performance.
• Understand how CoreXL acceleration technology enhances and improves Security Gateway
performance.
_____________________
_____________________
397
Check Point Security Engineering
SecureXL: Security Acceleration
SecureXL is a patented Check Point security acceleration technology that accelerates multiple,
intensive security operations, including operations carried out by Check Point’s Stateful
Inspection Firewall. When enabled on a Security Gateway, some CPU-intensive operations are
processed by virtualized software instead of the Firewall kernel. Using SecureXL, the Firewall
can inspect and process connections more efficiently by offloading operations to performanceoptimized software or hardware devices, dramatically increasing throughput without
compromising security. SecureXL is included in Gaia and does not require an additional
license.
Figure 337 — Traffic Flow With and Without SecureXL
Using SecureXL
SecureXL accelerates packet processing performance by remembering certain attributes of
packets and packet flows that have already been validated by the blades. Validation of related
packets and connections is then delegated to the SecureXL API, which enables offloading of
security processing to optimized processing units. This validation is done at the hardware
interrupt level on x86 hardware, or supervises execution of further optimized code in IP
security appliances that support them. Both of these approaches involve substantially less
computing overhead than is required by the Security Gateway.
_____________________
_____________________
398
Check Point Security Engineering
From SecureXL’s perspective, there are three paths of traffic flow:
• Firewall Path — Packets and connections that are inspected by the Firewall. These
packets and connections are not processed by SecureXL. This path is also referred to as
the Slow Path.
• Accelerated Path — Packets and connections that are offloaded from the Firewall to
SecureXL. These packets and connections are quickly processed.
• Medium Path — Packets that cannot use the accelerated path because they require
deeper inspection. Although it is not necessary for the Firewall to inspect these packets,
they can be offloaded by another feature. For example, packets that are examined by
IPS cannot use the accelerated path and can be offloaded to the IPS Passive Streaming
Library (PSL), which provides stream reassembly for TCP connections. As a result,
SecureXL processes these packets quicker than packets on the slow path.
SecureXL’s purpose is to minimize connections that are processed on a slow path and
accelerate the connection rate. As a connection is being established, if a packet is examined
using traditional security methods and is determined to be safe, the SecureXL device layer
takes over responsibility for examining any remaining packets to reduce latency. SecureXL
can be implemented at both a hardware layer, such Gaia-based appliances or at a virtual
software layer on open servers.
Pa c ket A c c e l e r a t i o n
Packet acceleration, which is also referred to as throughput acceleration, identifies connections
by five attributes:
•
•
•
•
•
Source address
Destination address
Source port
Destination port
Protocol
When the packets in a connection match all five attributes, the traffic flow can be processed on
the accelerated path. However, only packets during the specific TCP/UDP connection can be
accelerated.
Packets attempting to establish a new TCP connection, or a comparable UDP connection table
entry in the Firewall, are handled in the slow path because they require more processing. Once
the first packet is seen by the Firewall and suitable connection information is offloaded to an
appliance operating system, further packets are handled at the operating system's interruptlevel code.
SecureXL improves non-encrypted Firewall traffic throughput and encrypted (VPN) traffic
throughput by a significant amount, particularly for small packets flowing in long duration
connections.
_____________________
_____________________
399
Check Point Security Engineering
There are several factors that preclude a packet from being accelerated, such as:
The ClusterXL Sticky Decision Function (SDF) feature is enabled
The first packet of any new TCP or UDP session, unless a template exists
Connections destined to or originating from the Security Gateway
Connections that require Security servers (Authentication, Antivirus, URL Filtering,
Anti-Spam, DNS protocol enforcement)
• Connections that have a Handler (ICMP, FTP, H.323, etc.)
• Some IPS features (IP, ID, TTL)
• Multicast packets
•
•
•
•
S e s s i o n R a te A c c e l e r a t i o n
SecureXL also reduces the overhead in establishing certain kinds of new connections,
improving new connection rate (connections per second), connection setup/tear-down rate
(sessions per second), and throughput in certain high-connection rate traffic environments.
The principle involved is a simple extension of SecureXL’s approach to one-time validation of
a Firewall flow. The one-time validation is extended from a particular 5-attributes to a range,
or block, of one or more of these attributes. This means that to accelerate the rate of new
connections, connections that do not match a specified 5-attributes are still processed by
SecureXL.
As an example, the source port of a packet flow may be masked off, effectively providing a
global match for source port. Once a flow is validated and established, SecureXL creates and
saves a template of that flow with the source port masked off. Any new connection setup
packet that matches the other 4 attributes is processed on the accelerated path, thus avoiding
Firewall inspection and additional computing overhead. Security is not impacted because the
operating system continues to track the state of the new connection using Stateful Inspection.
_____________________
_____________________
400
Check Point Security Engineering
Masking the Source Port
To examine how ports are used in establishing TCP connections, consider the following
scenario. A client requesting a connection to a server initiates the TCP three-way handshake.
The client addresses the server, typically at a well-known port number depending on the
service provided by the server, such as port 23 for Telnet or port 80 for HTTP. Together the
server’s IP address and the well-known port number form a socket address. The client assigns
and pairs an OS-selected port number with the client’s IP address to create a socket address for
the reverse direction.
Figure 338 — Port Connections
Application Layer Protocol - An HTTP Example
Consider higher-level application protocols that involve numerous TCP connections between
the client and server, either simultaneously (in parallel), sequentially, or both. HTTP, which
accounts for most Internet traffic, is one of these protocols. HTTP generates most of the new
connection requests in enterprise and Internet traffic.
Web pages consist of multiple HTTP components, text, and perhaps dozens of graphic
elements. Using HTTP, each component is downloaded from server to client using a separate
TCP connection. This action involves substantial overhead in connection setup and tear-down
and in protective-Firewall connection tracking (Firewalls at both ends).
_____________________
_____________________
401
Check Point Security Engineering
In all cases between a web client and a web server, TCP connection establishment is initiated
by the web client, which then sends an HTTP request. The web server responds by sending the
HTTP component:
• HTTP Request (->) — Each of the packets from the web client that requests an HTTP
component from the web server has the same source address, destination address,
destination port (80), and protocol (HTTP). Only the source port, assigned (one per
connection) by the web client's operation system, differs to create unique socket
addresses at the client for each HTTP request/component (via separate TCP
connections for each component).
• HTTP Component (<-) — Going the other direction, each of the packets from the
web server that build the web page components on the web client has the same source
address, destination address, source port (80), and protocol (HTTP). Only the
destination port differs (it's been assigned by the client operating system to that
connection).
Once a connection involving a flow to port 80 is approved by the Firewall for the web client
(resulting from the first HTTP request), a template is created and stored. All subsequent
connection setups carrying those additional requests can share that same template approval,
because it’s okay that the source ports differ. Establishing those subsequent connections does
not involve a round trip to the Firewall, resulting in faster processing through the server
Firewall.
Similarly, at the client Firewall, once a connection involving a flow to port 80 is approved by
the Firewall (as above), all subsequent connections carrying these additional requests can share
that same approval. Establishing those subsequent connections does not involve a round-trip to
the Firewall. SecureXL accelerates subsequent connections through both Firewalls when
multiple connections share the same source address, destination address, destination port, and
protocol.
S e c u r e X L C o n n e c t i o n Tem p l a tes
SecureXL connection templates create the opportunity to generate extremely impressive
connection rate performance. Given the benefit of connection templates in heavy HTTP
environments, the significant performance increase can be reflected in real-world traffic
settings, such as in web server farms and enterprises where there is a great deal of web traffic
to a small, concentrated set of servers.
_____________________
_____________________
402
Check Point Security Engineering
To accelerate the rate of connection establishment, SecureXL groups all connections that
match a particular service and whose sole differentiating element is the source port. This type
of grouping enables even the very first packets of a TCP handshake to be accelerated. The first
packets of the first connection on the same service will be forwarded to the Firewall kernel,
which will then create a template of the connection. SecureXL has three different templates:
• Accept Templates — Created when a connection is established by matching a new
connection to a particular set of tuple attributes. Subsequent connections are established
without performing a rule match and are therefore accelerated. Accept templates are
enabled by default and generated from active connections according to policy rules.
Accept template acceleration is only on connections with the same destination port.
• Drop Templates — Generated by policy rules to accelerate the speed at which a
connection is dropped by matching a new connection to a set of tuple attributes.
Subsequent connections are dropped without performing a rule match and are therefore
accelerated. Drop template acceleration is also performed only on connections with the
same destination port. These templates are disabled by default. Drop templates are
discussed in greater detail in the CCSM course.
• NAT Templates — Generated to achieve high session rate for NAT. These templates
are supported in cluster HA/VRRP and Load Sharing modes. NAT templates are
controlled by global kernel parameters and disabled by default. NAT templates are
discussed in greater detail in the CCSM course.
Factors that Preclude Templating
There are factors that can preclude templating if all other parameters are met for packet
acceleration, such as:
•
•
•
•
Source port ranges
IPS features not supported in Acceleration
NAT’d traffic, unless NAT templates are enabled
Encrypted connections
Once templating is disabled in the Rule Base, all connections matching rules lower in the Rule
Base cannot be templated. Use fwaccel stat to determine at which rule templating is
disabled and move the most used rules above that rule to take advantage of session
acceleration.
_____________________
_____________________
403
Check Point Security Engineering
Pa c ket F l ow
The figure below shows the decision logic for packets flowing through SecureXL accelerated
IP security appliances.
Figure 339 — Packet Flow Decision Logic
A new packet arrives at the Inbound interface. The packet is checked against the Connections
table, which mirrors the Firewall’s Connections table. If there is a 5-tuple match, the new
packet is part of an existing flow and is forwarded to the Outbound interface for handling
(forward, drop, or reject). This path involves the least amount of forwarding overhead and
accelerates throughput for packets that are part of an existing flow.
If the new packet does not match an entry in the Connections table, it represents a new flow
and requires a new Connections table entry. However, if the packet matches an existing
connection template, then the new Connections table entry can be created (based on
information in the connection template table entry) without a round trip to the Firewall
application. The packet is then forwarded to the Outbound interface for handling. This path
reduces the overhead involved in creating a new connection table entry and accelerates the
connection rate for new connections that match existing connection templates.
If the new packet does not match an existing connection template, then a round trip to the
Firewall application is required in order to apply the Security Policy. This path involves the
greatest overhead.
_____________________
_____________________
404
Check Point Security Engineering
VPN Capabilities
SecureXL adds VPN routing capabilities and enhances connectivity to support VPN in
dynamic routing environments.
VPN Link Selection
VPN Link Selection allows multiple external interfaces to be configured for tunneling the VPN
packets. It allows the Firewall to create, maintain, and update a table of Link Selection entries.
The Firewall can specify which link needs to be used for a given Security Association. If that
link goes down, the Firewall can update the Link Selection entries to start using a different link
for the same tunnel.
Dynamic VPN Routing
Dynamic VPN routing allows the VPN domain to be determined dynamically instead of
configuring a static VPN domain. With Dynamic VPN routing enabled, connections can
transition from clear text to encrypted or from encrypted to clear text, based on the route taken
by the connection. The connection properties adapt to the route changes between an external
interface (untrusted) and an internal (trusted) interface by communicating in encrypted or clear
text respectively.
Wire Mode Connections
Wire Mode Connections allow trusted traffic to pass through without Stateful Inspection. If an
internal interface and the VPN Community are configured as wired (trusted), then the traffic
passing through the internal interface and getting encrypted using the VPN Community will
skip any Stateful Inspection. This increases the connectivity speed at lower security for traffic
between wired interfaces and a wired VPN Community.
L a b 4 .1
Working with SecureXL
_____________________
_____________________
405
L
A
B
Working with SecureXL
4.1
In this lab you will learn methods of troubleshooting SecureXL, Check Point’s method of accelerating
traffic through a Security Gateway.
Ta sks :
• Use fwaccel to review the current configuration.
• Use fwaccel to identify acceleration.
Pe r for ma n c e Ob j ec t ive s:
• Demonstrate how fwaccel affects traffic flow.
• Review the status of traffic acceleration on a Check Point Security Gateway.
_____________________
_____________________
406
Check Point Security Engineering
Identifying Status of Current Connections
Use the fwaccel command to identify if acceleration is currently deployed for connections in your
environment.
Log into A-GW-01.
2. In Clish, type the following command and press Enter:
1.
cpconfig
3.
Verify that item number 9 shows the following:
Disable Check Point SecureXL
Exit cpconfig.
5. In Clish, type the following and press Enter:
4.
fwaccel stat
Figure 340 — fwaccel stat
NOTE
The fwaccel stat command shows you if acceleration is enabled or disabled.
_____________________
_____________________
407
Check Point Security Engineering
6.
Verify that the Accelerator Status is displayed as On and that Accept Templates is Enabled.
NOTE
If acceleration is not enabled, execute the following command: fwaccel on
7.
At the prompt, type the following and press Enter:
fwaccel stats -s
Figure 341 — fwaccel stats
NOTE
By adding the -s filter, the system displays a summary of connections accelerated
versus those that are not.
8.
From B-Host, use FTP to connect to A-DMZ (203.0.113.171).
_____________________
_____________________
408
Check Point Security Engineering
9.
At the prompt, type the following and press Enter:
fwaccel conns
Figure 342 — fwaccel conns
NOTE
The fwaccel conns command identifies existing connections in SecureXL. By
adding the -s filter, the system would display the number of connections handled by
SecureXL.
10. Consider the following questions:
◦ What are the most frequent source and destination IP addresses?
◦ What flags to you see and what do they indicate?
◦ What does the C2S and S2C columns indicate?
_____________________
_____________________
409
Check Point Security Engineering
11. Press the Shift button and use the Page Up and Page Down buttons to navigate the data.
Figure 343 — fwaccel conns
12. Consider the following questions:
◦ Can you identify the FTP connection from A-GUI to B-Client?
◦ Is the connection accelerated?
_____________________
_____________________
410
Check Point Security Engineering
13. Launch CPView to identify the numbers of current connections:
Figure 344 — CPView
14. Exit CPView.
15. At the prompt, type the following and press Enter:
fw tab -t cphwd_db -s
Figure 345 — fw tab -t cphwd_db -s
NOTE
This command displays the kernel table for SecureXL.
_____________________
_____________________
411
Check Point Security Engineering
16. At the prompt, type the following and press Enter:
fw tab -t connections -u -s
17. Consider the following questions:
◦ What information does the fw tab function provide?
◦ Can you identify the FTP connection from this information?
◦ Can you tell if it is accelerated?
END OF LAB 4.1
_____________________
_____________________
412
Check Point Security Engineering
CoreXL: Multicore Acceleration
As the first security technology to fully leverage general purpose multi-core processors,
CoreXL introduces advanced, core-level load balancing that increases throughput for the deep
inspection required to achieve intrusion prevention and high throughput. With CoreXL, high
performance and high security can be achieved simultaneously. Like SecureXL, CoreXL is
also included with the Gaia operating system and does not require additional licensing.
Figure 346 — CoreXL Configuration for Machine with Eight CPU Cores
Using CoreXL
Multi-core CPU support enables Check Point Security Gateways to share traffic among cores
of a single system, providing superior performance on a single server. The combination of
multi-core CPUs and multi-threaded SecureXL security application technology is the
foundation for the next generation of security acceleration: Application layer security. By
joining a multi-core CPU with SecureXL security acceleration, Security Gateways can deliver
more than 10 Gbps of Intrusion Prevention throughput.
_____________________
_____________________
413
Check Point Security Engineering
Using CoreXL, the Firewall kernel is replicated multiple times. Each replicated copy, or
instance, of the Firewall kernel runs on one processing core. The instances handle traffic
concurrently, and each instance is a complete and independent inspection kernel. Regarding
network topology, management configuration, and Security Policies, a CoreXL gateway
functions as a regular Security Gateway. All of the kernel instances of a gateway handle traffic
going through the same interfaces and apply the same Security Policy. Traffic entering
Network Interface Cards (NIC) is directed to a processing CPU core running the Secure
Network Distributor (SND), which will distribute non-accelerated packets among the Firewall
kernel instances and securely accelerate packets authorized to be processed using SecureXL.
CoreXL acts as a load balancer and improves Security Gateway performance in situations
where much of the traffic cannot be accelerated by SecureXL or when the gateway has many
IPS features enabled, which disables SecureXL functionality. It also improves performance for
gateways with a large Rule Base and NAT rules. CoreXL does not benefit the gateway when
the traffic consists mostly of VPN or VoIP traffic.
CoreXL is not supported when one of the following features is enabled:
• VPN Traditional mode
• Overlapping NAT
Configuring CoreXL
CoreXL is enabled or disabled using cpconfig and requires a reboot to take effect. When
enabled, enter the number of Firewall kernel instances for the gateway. The default number of
kernel instances is derived from the total number of cores in the system, as described in the
following table:
Number of Cores
Number of Kernel Instances
1
CoreXL is disabled
2
2
4
3
6 - 20
(Number of CPU cores) - 2
More than 20
(Number of CPU cores) - 4
No more than 40 total.
Table 8: Kernel Instances Configuration
_____________________
_____________________
414
Check Point Security Engineering
If using CoreXL with ClusterXL, the number of kernel instances must be identical on all
members of the cluster. This is because State Synchronization between cluster members is
performed per CoreXL Firewall kernel instance. For example, Instance #2 on cluster member
A can only synchronize with Instance #2 on cluster member B.
Figure 347 — CoreXL and ClusterXL Example
P ro c e s s i n g C o r e A l l o c a t i o n
The CoreXL software architecture includes the Secure Network Distributor. The SND is
responsible for processing incoming traffic from the network interfaces, securely accelerating
authorized packets (if SecureXL is running), and distributing non-accelerated packets among
kernel instances. In other words, the SND is essentially a CPU core running both SecureXL
and CoreXL.
Traffic entering the NIC is directed to a processing core running the SND. The association of a
particular interface with a processing core is called the interface's affinity with that core.
Affinity is a general term used to describe binding NIC interrupts to processors. Affinity
settings for all interfaces are set automatically by default when the CoreXL architecture
includes processing incoming traffic from NICs. This affinity causes the interface's traffic to be
directed to that core and the SND to run on that core. Setting a kernel instance or a process to
run on a particular core is called the instance's, or process's, affinity with that core. Traffic from
all NICs is directed to the core running the SND.
_____________________
_____________________
415
Check Point Security Engineering
The default affinity setting for all interfaces is automatic. If SecureXL is running, the affinity
for each interface is automatically reset every 60 seconds and balanced between available
cores. If SecureXL is not running, the default affinities of all interfaces are with one available
core. In both cases, any processing core running a kernel instance, or defined as the affinity for
another process, is considered unavailable and will not be set as the affinity for any interface.
In some cases, SND cores can be overloaded due to high traffic on multiple interfaces assigned
to the same SND core. Manual sim affinity can alleviate this symptom. Use the sim
affinity -l command to see affinity distribution. Each busy interface should be assigned
its own Interrupt ReQuest (IRQ) value and distributed among SND cores. The assignment of
interfaces to IRQs can be verified in the /proc/interrupts file.
In some cases, it may be advisable to change the distribution of kernel instances, the SND, and
other processes among the processing cores. This is done by changing the affinities of different
NICs and/or processes. However, to ensure CoreXL’s efficiency, all interface traffic must be
directed to cores not running kernel instances. Therefore, changing affinities of interfaces or
other processes will require resetting the number of kernel instances and ensuring that the
instances run on other processing cores.
Under normal circumstances, it is not recommended for the SND and an instance to share a
core. However, it is necessary for the SND and an instance to share a core when using a
machine with exactly two cores.
Adding Processing Cores to the Hardware
Increasing the number of processing cores on the hardware platform does not automatically
increase the number of kernel instances. If the number of kernel instances is not increased,
CoreXL does not utilize some of the processing cores. After upgrading the hardware, increase
the number of kernel instances using cpconfig.
Reinstalling the Security Gateway will change the number of kernel instances if you have
upgraded the hardware to an increased number of processing cores, or if the number of
processing cores stays the same but the number of kernel instances was manually changed
from the default.
In a clustered deployment, changing the number of kernel instances, such as by reinstalling
CoreXL, should be treated as a version upgrade. Follow the instructions in the Upgrade Guide
and perform either a Minimal Effort Upgrade using network downtime or a Zero Downtime
Upgrade, substituting the instance number change for the version upgrade in the procedure. A
Full Connectivity Upgrade cannot be performed when changing the number of kernel instances
in a clustered environment.
_____________________
_____________________
416
Check Point Security Engineering
Allocating an Additional Core to the SND
In some cases, the default configuration of instances and the SND will not be optimal. If the
SND is slowing the traffic and your platform contains enough cores that you can afford to
reduce the number of kernel instances, you may want to allocate an additional core to the SND.
This is likely to occur, especially if much of the traffic is accelerated by SecureXL, in a
ClusterXL Load Sharing deployment or if IPS features are disabled. In any of these cases, the
task load of the SND may be disproportionate to that of the kernel instances.
NOTE
Check Point recommends that your platform have at least 8 CPU cores to
allocate an additional core to the SND.
Allocating a Core for Heavy Logging
If the Security Gateway is performing heavy logging, it may be advisable to allocate a
processing core to the fwd daemon, which performs the logging. Like adding a core for the
SND, this too will reduce the number of cores available for kernel instances.
Dynamic Dispatcher
Dynamic Dispatcher is a CoreXL feature which helps to improve load distribution and
mitigates connectivity issues during traffic peaks. Without Dynamic Dispatcher, new
connections to a CoreXL Firewall instance are fixed or statically assigned, based on packet IP
addresses and IP protocol type. This static assignment may result in situations where one or
more instances would handle more connections or perform more processing on the packets
forwarded to them than the others, which may cause the load to become unbalanced across the
CPU cores. In addition, during peak times and policy installation, an overloaded core may
cause traffic to be delayed or dropped.
When Dynamic Dispatcher is enabled, connections to CoreXL instances are dynamically
assigned, based on utilization of the CPU cores. Dynamic Dispatcher will distribute the load
equally between the CPU cores. Connections opened at a higher rate that would have been
assigned to the same instance by a static decision are now distributed to several instances.
The Dynamic Dispatcher feature is enabled by default in R80.10. When enabled, the dynamic
assignment decision is made for the first packets of connections by assigning a rank to each of
the instances and selecting the instance with the lowest rank. The ranking of each instance is
calculated according to the CPU utilization of the instance. If the CPU utilization of an
instance is high, the ranking for that instance will be high as well. Higher ranked instances are
less likely to be selected by the SND.
_____________________
_____________________
417
Check Point Security Engineering
When to Enable Dynamic Dispatcher
Dynamic Dispatcher is most beneficial in environments with a large number of CPU cores and
when the CPU load is not properly balanced. Enable Dynamic Dispatcher if the following
thresholds or situations occur:
• A CoreXL instance consumes its CPU core at ≥ 85%, even for one second.
• Other CoreXL instances consume their CPU cores at 75% and below. The difference in
CPU consumption between overloaded and normally loaded instances is 10% or more.
• Traffic is dropped or delayed due to an overloaded core during traffic peaks or during
policy installation.
When Dynamic Dispatcher is enabled, connections are always assigned dynamically, even in
cases where there is no significant differences in CPU load, with the exception of VoIP and
VPN encrypted packets. These two types of traffic will always be handled by the same
Firewall instance. The distribution of connections across all CoreXL Firewall instances can be
checked using the fw ctl multik stat command. Checking the connections will allow
you to monitor the current connections and ultimately decide whether or not to enable the
Dynamic Dispatcher feature. To fully enable Dynamic Dispatcher on a Security Gateway, run
the following command in Expert mode and then reboot:
fw ctl multik dynamic_dispatching on
Firewall Priority Queues
Firewall Priority Queues prioritize traffic when the CPU cores on the Firewall are 100%
utilized and packets need to be dropped. This feature is disabled by default in R80.10. When
enabled, the priority queues are only active when the CPU is overloaded. When the Firewall is
fully utilized, packet loss can occur regardless of the connection’s type (for example, SSH and
DHCP connections).
_____________________
_____________________
418
Check Point Security Engineering
Priority Queues prioritize the packets based on the type of connection, and each connection of
the same priority will get an equal share of the CPU resources. There are 8 priority queues by
default, and up to 8 additional queues can be manually configured. When a new packet arrives,
the connection is classified in order to know which queue it is assigned to. For example,
packets of a SSH connection will go to the Control queue.
Queue
Priority
(0 - highest)
Queue Name
Type of Connections
Can
Connections
Migrate?
0
Routing
DHCP, VRRP, OSPF, BGP,
IGMP, PIM
No
1
Control
GUI/SSH/Ports 18xxx/
Management services
Yes
2
Cluster Sync
Local/Full sync
No
3
High Priority
User Defined
Yes
4
Light Data Queue
Light connections
Yes
5
Default Data Queue
Medium weight connection or
new connection
Yes
6
Log Notification
Log and Drop notifications
No
7
Heavy Data Queue
Heavy connections
Yes
Table 9: Default Priority Queues
Some connection types can be migrated between priority queues to be assigned a lower or
higher priority with respect to other connections. For example, a new connection begins its life
in the Default Data queue (Queue #5). If this connection gets lighter, it will migrate to a higher
priority queue, such as the Light Data queue (Queue #4). If the connection becomes heavier, it
can migrate to a lower priority queue, such as the Heavy Data queue (Queue #7). The Firewall
will decide whether or not the connection should be migrated, based on the load time of an
average connection of that type. It knows to how many possible queues the connection was
assigned to and the CPU load caused by this connection.
To enable Dynamic Dispatcher on a Security Gateway without the Firewall Priority Queues,
run the following command in Expert mode and reboot:
fw ctl multik prioq 2
_____________________
_____________________
419
Check Point Security Engineering
Pa c ket F l ow w i t h C o r e X L a n d S e c u r e X L E n a b l e d
The following image depicts packet flow through the Security Gateway with CoreXL and
SecureXL is enabled:
Figure 348 — Packet Flow through Security Gateway
Acceleration Path
The packet is completely handled by the SecureXL device. It is processed and sent back to the
network.
Medium Path
The packet is handled by the SecureXL device, except for IPS, Application Control, Antivirus,
and Anti-Bot processing. The CoreXL layer passes the packet to one of the Firewall instances
to perform processing. This path is only available when CoreXL is enabled.
Firewall Path
The SecureXL device is unable to process the packet. It is passed to the CoreXL layer and then
to one of the instances for full processing on the slow path.
_____________________
_____________________
420
Check Point Security Engineering
Multiple Traffic Queues
As mentioned before, the SND is a processing core which accelerates traffic from network
interfaces using SecureXL and distributes non-accelerated packets among instances using
CoreXL. The number of CPUs allocated to the SND is limited by the number of network
interfaces handling the traffic. By default, each NIC has one traffic queue that is handled by
one CPU. Therefore, users cannot use more CPU cores for acceleration than the number of
interfaces handling traffic. Multi-Queue is an acceleration feature that will allow you to
configure more than one traffic queue for each NIC, to use more CPU cores for acceleration.
U s i n g M ul t i - Q u e u e
When most network traffic is being accelerated, the CPU load for SND can be very high, while
the CPU load for CoreXL Firewall instances are very low. This results in an inefficient
utilization of CPU capacity. Using Multi-Queue to configure more than one traffic queue for
each supported network interface helps balance the load efficiently between SND CPUs and
CoreXL instance CPUs.
Check Point does not recommend assigning both a SND and a CoreXL instance to the same
CPU core. Multi-Queue does not enhance Firewall performance in situations such as when all
Firewall instances are highly loaded and most of the traffic is being processed in CoreXL’s
slow or medium paths, or in cases where all CPU cores that are used by SecureXL are
congested. In addition, Multi-Queue does not help when IPS, or other deep inspection
Software Blades are heavily used.
Configuring Multi-Queue
Check Point recommends configuring Multi-Queue when the following conditions are
presented:
• The CPU load for SND is high (idle is < 20%).
• The CPU load for CoreXL instances is low (idle is > 50%).
• There are no CPU cores left to be assigned to the SND by changing interface affinity.
NOTE
The Interrupt ReQuest (IRQ) affinity of the queues is set automatically
when the operating system boots. Manually changing the IRQ affinity of
the queues can adversely affect performance.
_____________________
_____________________
421
Check Point Security Engineering
Use the following guidelines to help determine if your network can benefit from configuring
Multi-Queues:
• Make sure that both SecureXL and CoreXL are enabled.
• Make sure that the network interfaces support Multi-Queue.
• Examine the CPU affinity to see how the CPU roles are allocated for interfaces (SND)
and for CoreXL instances. To see the CPU roles allocation, run the following
command:
fw ctl affinity -l
Figure 349 — fw ctl affinity -1
• Examine the CPU utilization for usage and idle percentages. On the Security Gateway
run top and then press 1 to toggle to the SMP view.
Figure 350 — CPU Utilization Example
• Determine if more CPU cores can be allocated to the SND. If there are more network
interfaces handling traffic than CPUs assigned to the SND, more CPUs can be allocated
for SND.
_____________________
_____________________
422
Check Point Security Engineering
Use the following command to configure Multi-Queue on supported interfaces:
cpmq set
The command will display all supported interfaces that are active and allow changes to be
made to the Multi-Queue configuration for each interface. It is important to reboot the gateway
after changing the Multi-Queue configuration. A maximum of five interfaces can be
configured.
The following command shows the Multi-Queue status of supported interfaces:
cpmq get
Lab 4.2
Working with CoreXL
_____________________
_____________________
423
L
A
B
Working with CoreXL
4.2
Check Point CoreXL accelerates traffic through the Firewall by assigning each of the system’s cores to
specific kernels. In this lab, you will learn how to enable and configure CoreXL.
Ta sks :
• Enable CoreXL.
• Configure CoreXL.
Pe r for ma n c e Ob j ec t ive s:
• Demonstrate how multiple system cores can be used by CoreXL to accelerate traffic.
• Identify how to review the status of CoreXL on a Security Gateway.
_____________________
_____________________
424
Check Point Security Engineering
Enabling CoreXL
Configure CoreXL so that the system can accelerate traffic though the firewall by assigning specific
kernels to each of the system’s cores.
1.
From A-GW-01, type the following and press Enter:
cphaprob stat
Figure 351 — cphaprob stat
NOTE
One of the cluster members should show a status of “Active” and the other should
show “Standby.”
_____________________
_____________________
425
Check Point Security Engineering
2.
Check the status of CoreXL. Type the following and press Enter:
fw ctl multik stat
Figure 352 — fw ctl multik stat
3.
From Expert Mode, shutdown the A-GW-01 Virtual Machine:
shutdown -P now
Figure 353 — shutdown -P now
_____________________
_____________________
426
Check Point Security Engineering
4.
Modify the A-GW-01 virtual machine so that it is configured with at least four cores.
Figure 354 — Virtual Machine Settings - Processors
NOTE
The labs environment shown in this document is based on VWware Workstation.
Your classroom environment may be different. If it is, ask your instructor for
assistance.
_____________________
_____________________
427
Check Point Security Engineering
Reboot the modified cluster member.
6. At the prompt, type the following and press Enter:
5.
top
7.
Press 1 to see the CPU distribution.
Figure 355 — top
Identify the number of cores listed at the top of the screen.
9. Press q to exit the file.
8.
_____________________
_____________________
428
Check Point Security Engineering
10. At the prompt, type the following and press Enter:
cpview
Figure 356 — cpview
11. Compare the number of cores listed on the CPView Overview page to the number displayed in top.
12. Click q, to exit CPView.
_____________________
_____________________
429
Check Point Security Engineering
13. On A-GW-01, type the following and press Enter:
cpconfig
Figure 357 — cpconfig
NOTE
If the Check Point CoreXL option does not appear in the list of Configuration
Options, your virtual machine is not configured with multiple cores.
14. Enable Check Point CoreXL, if it is not already enabled.
_____________________
_____________________
430
Check Point Security Engineering
15. At the prompt, type the following and press Enter:
fw ctl affinity -l
Figure 358 — fw ctl affinity -l
NOTE
Though there are four cores configured for this machine, only three are kernel
instances. This chart explains the core to kernel instance ratio:
Number of Cores Number of Kernel Instances
1
1
2
2
4
3
6-20
Number of cores -2
More than 20
Number of cores -4 but no more than 40
_____________________
_____________________
431
Check Point Security Engineering
16. At the prompt, type the following and press Enter:
fw ctl affinity -l -a -v
Figure 359 — fw ctl affinity -l -a -v
_____________________
_____________________
432
Check Point Security Engineering
Reviewing CoreXL Settings
Review the CoreXL settings in your environment.
1.
At the prompt, type the following and press Enter:
top
1
Type q to quit.
3. In Expert mode, type the following and press Enter:
2.
ps -ef | grep fw_worker
Figure 360 — ps -ef | grep fw_worker
_____________________
_____________________
433
Check Point Security Engineering
4.
At the prompt, type the following:
cat /proc/interrupts
Figure 361 — cat /proc/interrupts
END OF LAB 4.2
_____________________
_____________________
434
Check Point Security Engineering
Review Questions
1.
Describe the three paths of traffic flow for SecureXL.
2.
How does CoreXL improve network performance?
3.
When should you consider using Multi-Queue?
_____________________
_____________________
435
C
H
A
P
T
E
R
Check Point Security Engineering
SmartEvent
5
Check Point’s SmartEvent Software Blade turns log entries into meaningful security
information. It correlates log events, aggregates data, and identifies potential attack
patterns from various devices. It prioritizes security events among a multitude of logging
activities in the network, making it easy for Cyber Security Administrators to remediate
and prevent critical events. With its customizable graphical reports and intuitive GUI,
administrators can readily monitor patterns and events as they unfold and provide
reporting to key stakeholders in the organization.
Learning Objectives
• Identify SmartEvent components used to store network activity logs and identify events.
• Discuss the SmartEvent process that determines which network activities may lead to critical
security issues.
• Understand how SmartEvent can assist in detecting, remediating, and preventing security threats
targeting organizations.
_____________________
_____________________
436
Check Point Security Engineering
The SmartEvent Solution
Check Point SmartEvent Software Blade is a unified security event management and analysis
solution that delivers graphical threat management information. It allows Security
Administrators to view real-time network activities in customized views or reports.
Customized views allow you to monitor activities relevant to protecting your organization.
Personalized reports enable you to report on security activities to key stakeholders in your
organization.
SmartEvent provides both a high level view and detailed forensic analysis of incidents to aid in
monitoring, fixing, and remediating security incidents. It also helps you efficiently run data
analysis and identify critical security events from the vast number of logs in the network. With
SmartEvent, you can collect, process, and search from billions of log entries in seconds.
Logs and Events
A log is a record of an action performed by a Software Blade. Log entries show the traffic
patterns that are relevant to the overall security of the organization. An event is a record of a
security or network incident that is based on one or more logs and on a customizable set of
rules that are defined in the Event policy.
The Event policy is a set of rules that define the behavior of SmartEvent. A log entry (or
multiple log entries) becomes an event when it matches any rules defined in the Event policy.
An example of a single log entry becoming an event is a High Severity Anti-Bot event,
because of the rules defined in the Event policy. Multiple log entries can also become an event,
such as in the case of a Certificate Sharing event, wherein two logins were found with the same
certificate but different users.
SmartEvent automatically defines logs that are not Firewall, VPN, or HTTPS Inspection logs,
as events. These events are created by the Correlation Unit when there is a suspicious pattern
of two or more logs. Correlated events are defined in the Policy tab of the SmartEvent GUI.
Since most logs are Firewall, VPN, and HTTPS logs, SmartEvent will not automatically define
them as events. This is to avoid performance issues with the SmartEvent Server. However,
enabling consolidated events for Firewall saves disk space and makes it possible to keep a
longer event history. To create events for Firewall, navigate to the SmartEvent Policy tab and
enable Consolidated Sessions > Firewall Session.
_____________________
_____________________
437
Check Point Security Engineering
S m a r t E ven t C o m p o n e n t s
SmartEvent utilizes several key components to aggregate logs, identify critical security events,
and provide efficient event query. The three main components are the Log Server, the
Correlation Unit, and the SmartEvent Server.
Log Server
The Log Server is responsible for storing logs collected from Check Point Security Gateways
and Third-Party devices. The Correlation Unit connects to the Log Server to read the logs
using the LEA (Log Export API) protocol. The Log Server uses port 18184 for this connection
by default.
NOTE
When configuring the Log Server to use a different LEA port, you must
manually configure the new port on the SmartEvent Server and on the
Correlation Unit.
Correlation Unit
The Correlation Unit evaluates logs from the Log Server to identify events. Each log consists
of data from Check Point products and third-party devices. It looks for threat patterns in this
data that match the installed Event policy. When analyzing a log, the Correlation Unit performs
one of the following actions:
• Marks logs that individually are not events, but may be part of a larger pattern to be
identified later
• Generates an event based on the Event policy
• Takes a new log entry that is part of a group of items that together make up an event,
and adds it to an ongoing event
• Discards logs that do not meet event criteria
Once a threat pattern is detected, the Correlation Unit forwards the event to the SmartEvent
Server.
SmartEvent Correlation Units can analyze logs for more than one Log Server. Check Point
recommends installing a Correlation Unit on each Log Server if your organization produces
high volume log activity. With a small network, it is best practice to store a Correlation Unit on
the SmartEvent Server.
_____________________
_____________________
438
Check Point Security Engineering
SmartEvent Server
The SmartEvent server houses the Events database. It receives all logs identified as events by
the Correlation Unit. The SmartEvent server performs another analysis to determine the
severity of the event and what action to take. The event is then stored in the Events Database.
This database runs on Apache Solr, an open source search platform written in Java. The main
advantage of Solr is that it manages the logs with their indexes, which in turn allows for a more
efficient way to generate search results.
S m a r t E ven t C l i e n t s
SmartEvent clients manage the SmartEvent server and provide an overview of security
information for an organization’s environment. They consolidate billions of logs and display
them as prioritized security events. Administrators can use the information displayed to
monitor network activity, identify and investigate critical events, and immediately respond to
security incidents to prevent further attacks.
SmartEvent clients are:
• SmartConsole — installed as an external application
• SmartEvent GUI — requires client installation
• SmartView Web application — does not require client installation. It has the same realtime event monitoring and analysis views as SmartConsole. To log in to SmartEvent
using SmartView Web application, browse to https://<Security Management Server IP
Address>/smartview/ or https://<Security Management Server host name>/smartview/
NOTE
The SmartView Web application URL is case sensitive. The “/” at the end
is required. SmartEvent must be enabled to view Smartview.
_____________________
_____________________
439
Check Point Security Engineering
S m a r t E ven t Wo rk fl ow
The workflow below provides a high-level view on how the different SmartEvent components
interact:
Figure 362 — SmartEvent Workflow
1.
2.
3.
Check Point products and other supported third-party devices forward logs to the Log
Server for storage. The Correlation Unit reads all logs from the Log Server and makes the
correlation analysis based on the SmartEvent policy. The Events policy resides on the Correlation Unit.
Once the Correlation Unit identifies a threat pattern, it identifies the associated log entries
as an event and sends it to the SmartEvent Server. The SmartEvent server assigns a severity level to the event, invokes any defined automatic reactions, and adds the event to the
Events Database that resides on the server. The severity levels and automatic reactions are
defined in the Events Policy. An automatic reaction is the defined immediate course of
action to a detected event. For example, an automatic email notice is sent to System
Administrators once an event has occurred. This will be discussed further in the Remediating Security Event section of this chapter.
The SmartEvent client displays the received events. It presents all of the information
needed for real-time monitoring of security events, event investigations, and remediation.
Administrators can also utilize the SmartEvent client to generate reports, fine-tune and
install the Events Policy.
_____________________
_____________________
440
Check Point Security Engineering
S m a r t E ven t D e p l oym e n t
SmartEvent components can be installed on a single machine (a standalone deployment), or
spread out over multiple machines and sites (a distributed deployment). Implementing a
distributed deployment is highly recommended if your organization anticipates a high volume
of logging activity.
Enable SmartEvent on the Security Management Server or deploy it on a dedicated server. You
can also install more than one SmartEvent Correlation Unit. Each SmartEvent Correlation Unit
can analyze logs from multiple Log Servers or Domain Log servers. Dedicated SmartEvent
appliances from Check Point are also available as an option when deploying SmartEvent in
your organization. A valid license or contract is required to deploy SmartEvent.
Before installation, make sure to perform the following actions:
• Use a dedicated server for SmartEvent that is connected to a management server.
• Do a clean installation.
• Uninstall the old SmartEvent client installed on computers, before installing the new
client.
• Connect to a management server (Security Management Server or Multi-Domain
Server), version R77.xx or higher.
NOTE
Check Point recommends configuring Disk Space Management parameters
to delete old log entries when available disk space is 45% or less. This
configuration only applies to the raw log files and has no effect on the
events database since it uses an internal disk space management policy.
_____________________
_____________________
441
Check Point Security Engineering
D e fi n i n g t h e I n te r n a l N et wo r k
To help SmartEvent determine whether events originated internally or externally, the internal
network must be defined in the initial settings. There are four options to calculate the traffic
direction:
•
•
•
•
Incoming — All the sources are outside the network and all destinations are inside.
Outgoing — All sources are inside the network and all destinations are outside.
Internal — Sources and destinations are all inside the network.
Other — A mixture of and internal and external values makes the result indeterminate.
NOTE
It is recommended to add all internal network objects, not host objects.
Adding Network and Host Objects
Certain objects from the Management server are added during the initial sync with the
SmartEvent server and updated at a set interval. However, it may be necessary or useful to add
other network or host objects to the internal network, such as:
• If there are devices or networks not represented on the management server that are
important for defining the internal network
• When adding sources or destinations to exclusions or exceptions in event definitions
• When selecting sources or destinations in a filter
_____________________
_____________________
442
Check Point Security Engineering
Identifying an Event
One of SmartEvent’s key features is its ability to identify a potential security incident or event
from the multitude of logs that can be generated in an organization. As previously mentioned,
events are detected by the Correlation Unit. SmartEvent is constantly retrieving logs from Log
servers and searching for patterns. The Correlation Unit scans logs for criteria that match an
event definition. SmartEvent uses the following procedures to identify events:
•
•
•
•
Matching a log against global exclusions
Matching a log against each event definition
Creating an event candidate
Updating an event
Matching a Log Against Global Exclusions
When the Correlation Unit reads a log, it first checks whether the log matches any defined
Global Exclusions. When Global Exclusions are defined, they direct SmartEvent to ignore logs
that are not expected to contribute to an event. If a log matches a Global Exclusion, it is
discarded by the system. If it does not match, the Correlation Unit begins matching the log
against each event definition.
Matching a Log Against Each Event Definition
Each event definition contains a filter which is comprised of multiple criteria that must be
found in any matching log. In turn, the criteria are divided by product. This means an event
definition may include a number of different products, but each product has its own criteria
(set of values).
Figure 363 — Event Definition A
_____________________
_____________________
443
Check Point Security Engineering
For example, for a log from URL Filtering to match Event Definition A, it must match the
Action, Event Type, Port, and Protocol values listed in the URL Filtering category. A log from
a Security Gateway must match the values listed in its respective column. SmartEvent divides
this process into two steps:
1.
2.
The Correlation Unit first checks whether or not the product value in the log matches one
of the acceptable product values of an Event Definition. For example, in the figure below,
if Log 1 did not contain an acceptable product value, the Correlation Unit would then
compare the log against the next Event Definition, and so on. If the log does not match any
Event Definition, it is discarded.
Next, the Correlation Unit checks whether the log matches the product-specific criteria in
an event definition. For instance, URL Filtering generates logs that involve the Firewall,
spyware, malicious code protection, and others, which is populated in the Event Type
field. If an event matches URL Filtering logs involving the Firewall, then the URL Filtering log involving spyware will fail against the Event Definition. Other criteria may be specific to the Product as well, such as action, port, and protocol.
Figure 364 — Event Definition Matching Log
_____________________
_____________________
444
Check Point Security Engineering
Returning to the example, the Correlation Unit now examines whether the log contains the
necessary criteria for a URL Filtering log to match. If the criteria did not match, the
Correlation Unit would continue comparing the log criteria to other Event Definitions.
Figure 365 — Event Definition Matching Other Product Criteria
Creating an Event Candidate
Once a log matches the criteria, it is added to an Event Candidate. Event Candidates allow
SmartEvent to track logs until an event threshold is crossed, at which point an event is
generated. An event threshold allows System Administrators to set the limits for logs to
become an event. The limits typically are the number of connections, logs, or failures, and the
period of time in which they occurred. An example of an event threshold would be: Detect the
event when more than “x” (number value) connections/logs/failures were detected over a
period of “y” (time value) seconds.
_____________________
_____________________
445
Check Point Security Engineering
Note:
• The Event Candidate can track logs from multiple Check Point and non-Check Point
products.
• Logs must originate from the same source IP address.
• The Event Candidate tracks logs before all of the criteria have been matched.
Figure 366 — Sample Event Candidate
Each event definition may have multiple Event Candidates existing simultaneously to keep
track of logs grouped by similar properties, such as by host, service, destination, or any
combination of these or others. In our example, the logs that form Event Candidate 10.1.1.5 all
have a common source value and were dropped, blocked, or rejected by a Firewall. They are
grouped together because the event definition is designed to detect activity originating from
source address 10.1.1.5.
_____________________
_____________________
446
Check Point Security Engineering
Whenever a log matches the event definition but has properties different than those of the
existing event candidates, a new Event Candidate is created and added to an Event Candidate
Pool. SmartEvent creates a new Event Candidate for a log with a different source.
Figure 367 — Sample Event Candidate Pool
The Event Candidate pool is a dynamic environment, with new logs being added and older
logs being discarded when they have exceeded an event definition threshold.
To illustrate further, consider the event defined to detect a high rate of blocked connections.
SmartEvent tracks the number of blocked connections for each Firewall and the logs of the
blocked traffic at each Firewall form an Event Candidate. When the threshold of blocked
connection logs from any Firewall is surpassed, that Event Candidate becomes an event.
_____________________
_____________________
447
Check Point Security Engineering
While this event definition creates one Event Candidate for each Firewall monitored, other
event definitions may create many more.
Figure 368 — Sample Event Candidate Pool with Multiple Candidates
Updating an Event
Discovering an event does not mean SmartEvent stops tracking logs related to the event. When
a candidate becomes an event, the Correlation Unit forwards the event to the Event Database.
The Correlation Unit will keep adding matching logs to the event as long as they continue to
arrive, even if an event threshold has been reached. Keeping the event open condenses what
might otherwise appear as many instances of the same event to one, and provides accurate, upto-date information as to the start and end time of the event.
_____________________
_____________________
448
Check Point Security Engineering
Monitoring the Network
Administrators can use SmartConsole and SmartView Monitor to monitor network activity and
identify, analyze, and manage security events.
Using SmartConsole Logs & Monitor
SmartConsole includes a catalog of views and reports in the Logs & Monitor section of the
GUI. Views and reports are customizable, allowing you to display and report the events and
data that are most important to your network. For example, it may be important to monitor
network traffic based on geography.
With a few clicks, you can easily move from a high-level view to a detailed forensic analysis of
network activity. The free-text search option lets you quickly run data analysis and identify
critical security events.
Figure 369 — SmartConsole > Logs & Monitor
_____________________
_____________________
449
Check Point Security Engineering
Using SmartView Monitor
Use SmartView Monitor to respond quickly to changes in gateways, tunnels, remote users and
traffic flow patterns and security activities. For example, remote employees of an organization
report trouble connecting to the network. Using the SmartView Monitor Counter view, the
administrator can assess that there are more failures to connect than successes. A report can be
created to determine what is preventing the employees from connecting to the network.
SmartView Monitor provides real-time and historical graphical views of:
•
•
•
•
•
•
Gateway status
Remote users
System counters
VPN tunnels
Cooperative enforcement (for Endpoint Security Servers)
Traffic
Figure 370 — Sample System Counter View
_____________________
_____________________
450
Check Point Security Engineering
E ve n t Q u e r i e s
A view is an interactive dashboard made up of widgets. A widget can display information in
different formats such as a chart, or a table. Each widget is the output of a query. To review
more about an event, double-click the widget to drill down to a more specific view or the raw
log files.
Figure 371 — Sample View
Queries are used to define the events to see. These queries filter and organize the event data for
display. SmartConsole provides a predefined set of queries which are organized by
combinations of event properties. For example, a set of Threat Prevention queries will include
Threat Prevention events as well as IPS events.
Event queries can be customized to display specific related events and treads as defined by the
organization. Customized event queries can be created from scratch or based on an existing
query.
Events are easily monitored using custom and predefined queries. To help identify suspicious
patterns, use the following features to search and filter events:
•
•
•
•
Filters
Free-text search using Boolean operators, wildcards, fields, and ranges
Suggested and recent searches
Time Period
_____________________
_____________________
451
Check Point Security Engineering
Investigating Security Events
To further investigate an event, double-click the event to open the Log Details window. The
Log Details window will provide important information regarding the event.
Figure 372 — Log Details Window
Packet Capture
When activated, packet capture files are sent from the Security Gateway to the log server,
along with the log. Packet capture contents provide more insight into the traffic which
generated the log. If any logs have related packet captures, open a packet viewer to see the
contents of the captured packet.
Packet capture is activated by default. To see a packet capture, navigate to the Logs & Monitor
view and open the log. Click the link in the packet capture field and the Packet Capture Viewer
Output window will open. The packet capture may be saved to a file for further investigation.
_____________________
_____________________
452
Check Point Security Engineering
Custom Commands
SmartEvent provides a convenient way to run common command line executables that can
assist in investigating events. Right-clicking the IP address, source or destination, in an event
provides a list of default and customized commands. They appear only on cells that refer to IP
addresses, because the IP address of the active cell is used as the destination of the command
when run. The default commands are ping, whois, nslookup, and Telnet.
Figure 373 — Ping Output
Importing Offline Log Files
System Administrators can import and examine logs from a previously generated log file. This
makes it possible to review security threats and pattern anomalies that occurred before
SmartEvent was installed. It enables the investigation of threats, such as unauthorized scans
targeting vulnerable hosts, unauthorized legions, denial of service attacks, network anomalies,
and other host-based activity.
The administrator can review logs from a specific time period and focus on deploying
resources on threats that have been active for a period of time but may have been missed. For
example, new events may have been dynamically updated and can now be processed over the
previous period.
_____________________
_____________________
453
Check Point Security Engineering
Remediating Security Events
Once a security event is identified, investigated, and found to be a threat, remediate the issue
by:
• Configuring Event policy
• Configuring IPS policy
C o n fi g u r i n g E ve n t Pol i c y
Use the Policy tab of the SmartEvent GUI client to configure and customize the events that
define the Event policy. All events detectable by SmartEvent are organized by category under
the Event Policy branch.
Each event is enabled or disabled using the accompanying checkbox. Clearing the checkbox
next to an event removes this event type from the Event policy the next time the Event policy
is installed.
Figure 374 — SmartEvent > Event Policy
Depending on the thresholds defined in each Event, the number of events detected can be quite
high. Yet, only a portion of those events may be meaningful.
_____________________
_____________________
454
Check Point Security Engineering
Selecting an event displays its configurable properties in the Detail pane and a description of
the event in the Description pane. To remediate a security event, it may be necessary to adjust
or configure:
•
•
•
•
•
Threshold
Severity
Automatic reactions
Exceptions
Working hours
Not all of these elements appear for every event. After installing and running SmartEvent for a
short time, you will discover which of these elements needs to be fine-tuned per event.
Threshold
The Threshold setting sets the limits that, when exceeded, indicate an event has occurred. The
limits typically consist of the number of connections, logs, or failures, and the period of time in
which they occurred.
Severity
An event severity determines in which queries, among those that filter for severity, this type of
event will appear. The levels of severity are:
•
•
•
•
•
Informational
Low
Medium
High
Critical
_____________________
_____________________
455
Check Point Security Engineering
Automatic Reactions
To jump start remediation, an event upon detection can trigger an automatic reaction. Multiple
automatic reactions may be configured, depending on the needs of the system. For example, a
single mail automatic reaction can be defined to inform the administrator of any event, or
multiple mail automatic reactions can be configured to inform a different responsible party for
each type of event. Automatic reactions may be created under General Settings.
There are five types of automatic reactions:
• Mail — Alert a System Administrator by email that the event has occurred.
• Block Source — Instruct the Security Gateway to block the source IP address(es) from
which this event was detected for a configurable period of time.
• Block Event Activity — Instruct the Security Gateway to block a distributed attack
that originates from multiple sources, or attacks multiple destinations for a configurable
period of time.
• External Script — Run a provided script.
• SNMP Trap — Generate an SNMP Trap.
Exceptions
Exceptions allow an event to be independently configured for the sources or destinations that
appear. For example, if the event Port Scan from Internal Network is set to detect an event
when 30 connections have occurred within 60 seconds, define that two port scans detected
from host A within 10 seconds of each other is also an event.
Working Hours
Working hours are used to detect unauthorized attempts to access protected systems and other
forbidden operations after-hours. To set the Regular Working Hours for an event, select a Time
object from the drop-down menu. Time objects are configured under General Settings.
_____________________
_____________________
456
Check Point Security Engineering
C o n fi g u r i n g I P S Pol i c y
IPS protections and profiles should be reviewed to understand why an event was generated.
Administrators may also review the events to investigate how traffic is handled by IPS. Any
event generated by the IPS Software Blade is easily investigated and remediated through the
Event Details window. From the Event Details window, you can:
• Go to the Check Point Advisory article which provides background information about
the IPS protection.
• Review a detailed IPS protection description.
• Fine-tune the IPS protection.
• Add an exception to the IPS protection.
_____________________
_____________________
457
Check Point Security Engineering
Reporting Security Events
Reports make it easy to quickly generate, review, and share security data using graphs and data
tables. They provide more detailed information than a view. Predefined and customized reports
can be generated to provide security information on a schedule (daily, weekly, or monthly), or
as needed. For example, an executive may request a monthly security brief on the most recent
security trends to evaluate company policy and procedure, such as allowing employees to
access particular sites and applications during work hours.
Figure 375 — Sample Report
_____________________
_____________________
458
Check Point Security Engineering
U s i n g P r e d e fi n e d Rep o r ts
Use predefined graphical report templates for the most frequently seen security issues. To open
the catalog of predefined and customized reports, click the [+] tab. Double-click a report to
open it. SmartEvent automatically downloads new predefined reports, and updates existing
reports.
Figure 376 — List of Reports
Importing and Exporting Reports
The Export to PDF and Export to Excel options allow you to save the current report as a PDF
or Excel file, based on the defined filters and time period. Report layout and widget definition
templates can also be exported. Similarly, the Import Template option allows you to import
these template files from another server, or from another administrator.
Adding a Logo to Reports
By default, the Check Point logo shows on the cover pages of the report. System
Administrators can configure reports to show their company logo instead. Save the image file
of the logo as a PNG file with the name cover-company-logo.png then copy the image to the
$RTDIR/smartview/conf directory on the SmartEvent server.
_____________________
_____________________
459
Check Point Security Engineering
D e fi n i n g C u s to m Rep o r t s
Because each company is different, SmartEvent helps System Administrators to create custommade reports that fit their respective organization. To customize a report, select a predefined or
custom report, then click Edit to define the new report.
Defining the Report Outline and Filters
The workspace shows Views on the left when you edit a report. A view is an interactive
dashboard made up of widgets. It is also a section of the report shown in one page or multiple
pages, if it includes a table. The Views pane has management controls that help you add,
remove, change the sequence of views, and even add filters for the data included in the report.
Changes to views is only applied to the custom report that you are working on.
Defining Views
When you click a particular View thumbnail, it shows the widgets included in that view. A
widget is a representation of the collected data. Each widget is contained in a panel with
management options that allow you to add, remove, move, or resize a widget. Note that
moving or resizing the widget out of the page borders is not possible. For table layouts that
expand to multiple pages, select Show all table rows from the Split table across multiple pages
window on the View Settings option.
NOTE
The desired graphical view of your organization’s security posture can be
quickly customized by adding a widget to a view. Before adding a widget,
make sure that the view has enough space; otherwise an error message will
appear.
Filtering Reports by User Groups
System Administrators may need to generate several reports for different key stakeholders. A
report meant for a C-level executive may contain information not relevant to a department
head. Reports, views and widgets can be filtered for one or more Active Directory user groups.
Prior to enabling this feature, an Access Role object that includes the AD groups to use in the
query for the report must be defined. To filter reports for specific user groups, look at the
Identity Awareness login logs, and copy the names of the relevant groups. Add a filter for the
User Group field and enter the name of the group to be included in the filter. For multiple
groups, use a comma-separated list.
_____________________
_____________________
460
Check Point Security Engineering
Preventative Measures
After remediating security events, preventative measures can be put in place to ensure the
event is addressed as soon as possible and prevented from repeat occurrence.
C r e a t i n g a N ew E ve n t D e fin i t i o n
Once a new threat is discovered and remediated, take preventative action by creating a new
event definition. The next time this threat pattern is detected, it will create an event in the
Events database, allowing it to be addressed and remediated more quickly. The Event
Definition Wizard makes it easy to configure a new event definition from scratch or based on
an existing event.
Figure 377 — Event Definition Wizard
When creating a new definition, the Event Definition Wizard allows you to choose if an event
will be generated when an event definition is matched by a single log or multiple logs. It also
gives you options to choose which of the product(s) can trigger an event. All user defined
event definitions are automatically saved in the User Defined Events folder in the Selector
Tree.
_____________________
_____________________
461
Check Point Security Engineering
Rep o r t i n g a n E ve n t to C h e c k Po i n t
Reporting event data to Check Point can help Check Point improve the IPS technology to
detect new threats. Only the event information will be sent to Check Point over a secure SSL
connection. The data is kept confidential and Check Point only uses the information to
improve IPS.
Figure 378 — Report Event to Check Point
E l i m i n a t i n g Fa l s e Po s i t i ve s
To eliminate false positives, it is important to understand how a false positive might be
generated. Certain types of services are characterized by a high amount of traffic that could be
misidentified as events. The following are examples of services and protocols that could
potentially generate events.
• Software that performs a routine scan of the network to make sure that everything is
running properly.
• A high connection rate on a web server. SmartEvent should be set to allow a higher
connection rate per minute on a busy web server, or to exclude this source from a scan
event.
Refer to the Check Point Logging and Monitoring Administration Guide for a list of server
types where high activity is common. Modify the Event policy by adjusting event thresholds
and adding Exclusions for servers and services, to further reduce the amount of false positives
detected.
To eliminate false positives, change the thresholds and other criteria of an event. For example,
increase the number of connections, logs, or failures and/or the period of time for them to
occur.
_____________________
_____________________
462
Check Point Security Engineering
SmartEvent Example
While monitoring the network, you notice the network is flooded with connections. This merits
an investigation. Using the filters, queries, and search bar features, you browse the event
database and determine that the gateway is stable. However, it is the interface that has received
lots of connections.
To start the investigation process, navigate to the Policy tab and activate all port scan events in
the Event policy to generate logs. After installing Event policy and additional traffic flowing
into the interface, many port scan events are created. Upon reviewing the details of multiple
events, it is evident that there is only one source and one destination. This is unusual as
legitimate port scans will have multiple source or destination IP addresses. One source and one
destination IP address indicates that this may be a targeted attack. After investigating the
source IP addresses and narrowing down the type of device they are originating from, the
conclusion is that the traffic is not legitimate.
To begin remediation, in SmartConsole, create a new rule that blocks traffic from the
illegitimate sources. If the traffic was legitimate, navigate to the Policy tab to configure the
settings for the Port scan from external network event. Add the IP address as an exception to
prevent port scans from this IP address from generating an event. Another option is to edit
threshold settings to increase the number of connections, or expand the time period in which
the connections occur.
The next step is prevention. Navigate to the Port scan from external network event. Create an
automatic reaction that will email the entire IT team when at least 20 connections are detected
within sixty seconds (one minute). By doing this, the next time there is a flood of traffic on an
interface, the entire IT team is notified and can quickly address and remediate the event.
With SmartEvent, it was easy to quickly search and filter through events to discover the
problem, enable the appropriate event policy, review specific threat information, and institute
preventative measures. By creating automated alerts and rules, you will ensure that the
network is able to perform without being bogged down by unnecessary traffic.
_____________________
_____________________
463
Check Point Security Engineering
High Availability Environment
The SmartEvent database maintains a synchronized copy of management objects locally on the
SmartEvent server. This process, also known as dbsync, allows SmartEvent to work
independently from different management versions and different management servers in a
High Availability environment.
Management High Availability exists for Security Management Servers and in a MultiDomain Security Management environment. The dbsync process supports High Availability
for the Multi-Domain servers and the Domain servers.
The dbsync process initially connects to the management server with which SIC is established.
It retrieves all the objects and, after the initial synchronization, it gets updates whenever an
object is saved. At this point, dbsync registers all the High Availability management machines
and periodically tests the connectivity with the current management server. If connectivity is
lost, it attempts to connect to the other High Availability management servers until it finds an
active one and connects to it.
If two management servers are active concurrently, dbsync will remain connected to one and it
will not receive any changes made on the other management server until a synchronization
operation is performed.
Log Server High Availability
In SmartConsole, it is possible to configure a Security Gateway such that when it fails to send
its logs to one Log server, it will send its logs to a secondary Log server. To support this
configuration, it is possible to add both Log servers to a single Correlation Unit. In this way,
the Correlation Unit will get an uninterrupted stream of logs from both servers and will
continue to correlate all Firewall logs.
SmartEvent Correlation Unit High Availability
Multiple Correlation Units can read logs from the same Log servers, providing redundancy if
one of them fails. The events detected by the Correlation Units will be duplicated in the
SmartEvent database. These events can be ascertained by filtering with the Detected By field
in the Event Query definition. The Detected By field specifies which Correlation Unit detected
the event. The SmartEvent server becomes unavailable, the Correlation Units retain the events
until they can reconnect with the SmartEvent server and forward the events.
_____________________
_____________________
464
Check Point Security Engineering
Security CheckUp
With Check Point Security Checkup tools, administrators can generate a comprehensive
security analysis report that summarizes security events, their risks, and remediation. These
reports are mainly used for Proof of Concept (PoC) purposes. The Security CheckUp
Advanced and Anonymizer Reports are threat analysis reports that generate charts and
organize security data to display key findings on malware, attacks, data loss, and high risk web
access. SmartEvent must be activated before running the Security CheckUp reports and the
tool is installed as a supplement. The difference between SmartEvent reports and the Security
CheckUp reports is that the Anonymizer report does not use IP addresses or usernames.
Each report can be localized into any language and customized to display information from a
specific time period or filter preferences. Like other reports, Security CheckUp reports can be
generated on a schedule or as-needed basis and saved as a PDF or Excel file for the purpose of
information sharing and security event investigation.
Figure 379 — Security CheckUp Report
L a b 5 .1
Evaluating Threats with SmartEvent
_____________________
_____________________
465
L
A
B
Evaluating Threats with
SmartEvent
5.1
Set up SmartEvent to generate alerts and reports. These applications are valuable for use in executive level
meetings, as well as for record keeping and compliance auditing.
Ta sks :
• Configure the SmartEvent Suite.
• Generate Reports based on available data.
Pe r for ma n c e Ob j ec t ive s:
• Configure a SmartEvent Server to monitor relevant patterns and events.
• Demonstrate how to configure event Alerts in SmartEvent.
• Demonstrate how to run specific SmartEvent reports.
_____________________
_____________________
466
Check Point Security Engineering
Configure the Network Object in SmartConsole
Active the SmartEvent for the A-SMS and A-GW-Cluster objects.
1.
In the SmartConsole on A-GUI, open the following object:
A-SMS
2.
Use the following information to configure the object:
Name: A-SMS
IP Address: 10.1.1.101
Management Blade SmartEvent Server
Selections:
Smart Correlation Unit
3.
If the system displays an information message, click OK to dismiss it.
_____________________
_____________________
467
Check Point Security Engineering
4.
Verify that the object is configured as follows:
Figure 380 — A-SMS Configured
5.
Click OK.
_____________________
_____________________
468
Check Point Security Engineering
6.
Edit the Alpha gateway cluster object, and select the Monitoring option in the Network Security tab:
Figure 381 — Gateway Cluster Properties Configured
_____________________
_____________________
469
Check Point Security Engineering
7.
Select the Monitoring Software Blade branch, and select the following options:
Traffic Connections
Traffic Throughput (Bytes per second)
Figure 382 — Monitoring Software Blade Page
8.
Select the Logs branch.
_____________________
_____________________
470
Check Point Security Engineering
9.
Under the section Send logs and alerts to these log servers, Verify that A-SMS is listed:
Figure 383 — Log Servers branch
10. Click OK.
11. Publish and install the Alpha Security Policy.
_____________________
_____________________
471
Check Point Security Engineering
12. In SmartConsole, select the Logs and Monitor tab:
Figure 384 — Select Server
_____________________
_____________________
472
Check Point Security Engineering
13. Click the + tab, and the system displays a new default tab:
Figure 385 — New Tab
_____________________
_____________________
473
Check Point Security Engineering
14. In the left pane, click the following link and the system displays SmartEvent:
SmartEvent Settings & Policy
Figure 386 — SmartEvent
NOTE
It may take a little longer for SmartEvent to start up and display information the first
time it is launched.
15. In the navigation pane, select General Settings > Objects > Network Objects.
_____________________
_____________________
474
Check Point Security Engineering
16. Verify that the Alpha-Nets object appears in the General Settings > Objects > Network Objects page:
Figure 387 — Network Objects
_____________________
_____________________
475
Check Point Security Engineering
Monitoring Events with SmartEvent
In this section, you’ll define a new event that will be triggered later in the lab.
1.
Expand the Unauthorized Entry branch, and select the Check Point administrator credential guessing:
Figure 388 — Policy Tab > Unauthorized Entry > Check Point Administrator
2.
Change the Failure Detection setting from the default of 3 failures every 600 seconds to 2 failures
every 300 seconds.
_____________________
_____________________
476
Check Point Security Engineering
3.
From the Actions menu, select Install Event Policy, and the system displays the following message:
Figure 389 — SmartEvent Dialog
4.
5.
6.
7.
8.
Click Yes. After the policy is installed, minimize SmartEvent.
Publish and install the Alpha Security Policy.
Then, log out of SmartConsole.
Attempt to log in to SmartConsole, using the wrong password at least five times.
Launch SmartConsole using the correct login.
_____________________
_____________________
477
Check Point Security Engineering
9.
Select the Logs & Monitor view, and create a new tab:
Figure 390 — Logs & Monitor - New Tab
_____________________
_____________________
478
Check Point Security Engineering
10. Click the Open Audit Log View button, and the system displays the following:
Figure 391 — Audit Log View
_____________________
_____________________
479
Check Point Security Engineering
11. View the record for the blocked login attempts:
Figure 392 — Log Details
12. Close the record details.
_____________________
_____________________
480
Check Point Security Engineering
13. Open a new tab in Logs and Monitor.
14. Select Reports.
15. In the reports list, click the star icon for the following items:
Correlated Events
Network Activity
Network Security
Figure 393 — Reports
_____________________
_____________________
481
Check Point Security Engineering
16. Open a new tab, and confirm the availability of new reports:
Figure 394 — New Tab Configured
_____________________
_____________________
482
Check Point Security Engineering
17. Click the Correlated Events report icon:
Figure 395 — Correlated Events
_____________________
_____________________
483
Check Point Security Engineering
18. View the incident report on page two of the report showing the following Event:
Check Point Administrator Credential Guessing
Figure 396 — Check
Point Administrator Credential Guessing - Event Reported
END OF LAB 5.1
_____________________
_____________________
484
Check Point Security Engineering
Review Questions
1.
What are the main components of the SmartEvent Architecture?
2.
Explain how SmartEvent identifies an event.
3.
How would a System Administrator reduce the number of false positives?
_____________________
_____________________
485
Check Point Security Engineering
Remote and Mobile Access
C
H
A
P
T
E
R
6
In today’s business environment, employees need to connect to company applications and
data from off-site locations. Remotely connecting to corporate resources has security
issues that System Administrators need to address. This chapter discusses Check Point
Remote and Mobile Access solutions that protect an organization’s confidential
communications and data in the age of workforce mobility.
Learning Objectives
• Recognize Check Point Remote Access solutions and how they differ.
• Discuss Check Point Capsule components and how they work to protect mobile devices and
business documents.
• Discuss the Mobile Access Software Blade and how it secures communication and data exchange
during remote connections.
• Understand Mobile Access deployment options.
_____________________
_____________________
486
Check Point Security Engineering
Choosing Remote Access Solutions
All Check Point Remote Access solutions provide secure connectivity to corporate resources.
Strong user authentication methods and granular access control reinforce network security.
Check Point Remote Access solutions use IPSec and Secure Socket Layer (SSL) encryption
protocols to create secure connections. All Check Point clients can work through NAT devices,
hotspots, and proxies in situations with complex topologies, such as airports or hotels.
There are a few factors to consider when choosing remote access solutions for your
organization:
• Client-Based or Clientless: Does the solution require a Check Point client to be
installed on the endpoint computer or is it clientless, for which only a web browser is
required? Multiple solutions may be required within your organization to meet different
needs.
• Secure Connectivity or Endpoint Security: Does the solution just require secure
connectivity, whereas traffic is encrypted between the client and the VPN gateway, or
endpoint security that provides protection even when there is no connectivity to the
network?
• SSL VPN versus IPSec VPN: Does your organization need a full VPN tunnel to
protect the access from any installed application to the business or does it need a
simpler business portal for secure access?
I n s t a l l a t i o n Typ e s
There are three types of installations for remote access solutions:
• Client-based — In this solution, the client application is installed on endpoint
computers and devices. Clients are usually installed on a managed device, such as a
company-owned computer or device. The client supplies access to most types of
corporate resources according to the access privileges of the user.
• Clientless — In this solution, users connect through a web browser and use HTTPS
connections instead of connecting through a managed device. Clientless solutions
usually supply access to web-based corporate resources.
• On Demand Client — This remote access solution blends the first two options. A user
connects with a web browser and installs a client when necessary. The client supplies
access privileges to most types of corporate resources according to the access privileges
of the user.
_____________________
_____________________
487
Check Point Security Engineering
Secure Connectivity and Endpoint Security
Secure connectivity can be combined with additional features to protect the network or
endpoint computers. With secure connectivity, traffic is encrypted between the client and VPN
gateway and strong user authentication is supported. After users authenticate, they can access
the corporate resources that are permitted to them in the access policy. All Check Point remote
access solutions supply secure connectivity and require licenses.
Security verification for endpoint computers makes sure that devices connecting to the
gateway meet security requirements. Endpoint machines that are not compliant with the
Security Policy have limited or no connectivity to corporate resources. Some Check Point
solutions supply this.
In terms of Endpoint Security, endpoint computers are protected at all times, even when there
is no connectivity to the corporate network. An integrated desktop Firewall protects endpoint
computers at all times with a centrally-managed Security Policy. This is important because
remote clients are not in the protected network and traffic to clients is only inspected if a
desktop Firewall is present. Some Check Point solutions supply this. These solutions require
licenses based on the number of clients installed.
NOTE
Check Point solutions can include more Endpoint Security capabilities,
such as Anti-Malware and disk encryption.
_____________________
_____________________
488
Check Point Security Engineering
S S L V P N ve r s u s I P S e c ( L aye r 3 ) V P N
Check Point solutions provide enterprise-grade access via both Layer 3 (IPSec) and SSL VPN.
There is a fundamental difference in how an SSL VPN Portal and a Layer 3 VPN tunnel
connect to the corporate network. In a Layer 3 VPN solution, a resident VPN client is needed,
which creates the Layer 3 virtual interface that any application can use. SSL VPN solutions
only require a browser on the client side and allow mobile devices with a dedicated application
to access corporate resources without establishing a VPN tunnel.
Figure 397 — Layer 3 VPN versus SSL VPN
In an SSL VPN solution, users can connect securely to business web-based applications
through a web portal. This solution does not require users to install a VPN client. SSL VPN is
the recommended solution for unmanaged and personal devices used for business purposes.
Layer 3 VPN solutions require remote workers to install a VPN client before gaining access to
corporate resources. Once a user installs the client, the Layer 3 VPN tunnel provides a secured
connection to both web-based and native business applications. This is recommended for
corporations with employees using managed or unmanaged devices.
Both solutions can be configured to enforce two-factor authentication.
_____________________
_____________________
489
Check Point Security Engineering
Clients
All Check Point Remote Access options provide secure remote access to corporate resources.
Each has different features and meets different organizational requirements.
M o b i l e Ac c e s s Po r ta l
The Mobile Access Portal, a clientless SSL VPN solution, is recommended for users who want
to access corporate resources from any unmanaged computer or device. This solution does not
require users to install a VPN agent or client. The Mobile Access Portal provides secure
connectivity and security verification. It requires a Mobile Access Software Blade license on
the Security Gateway. Remote users log in to the portal using an authentication scheme
configured for that Security Gateway. The Mobile Access policy applies to the Mobile Access
Portal. The portal can also be used with managed devices.
The Mobile Access Portal supplies access to web-based corporate resources. The on-demand
client, SSL Network Extender, can be used to access all types of corporate resources.
NOTE
Each Security Gateway enabled with Mobile Access leads to its own
Mobile Access User Portal. Set up the URL in the Mobile Access First
Time Wizard. For portal customization, System Administrators can go to
Portal Customization under Mobile Access in the SmartConsole.
S S L N e t wo rk E x te n d e r
SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is automatically
installed on the remote user's machine through a web browser. This VPN client is installed as a
browser plug-in. Once installed, it enables a secured connection using the SSL VPN tunnel to
link users to the corporate resources. SSL Network Extender requires Mobile Access and
IPSec VPN Software Blade licenses on the Security Gateway.
SSL Network Extender has two modes:
• Network — Users can access all native IP-based and web-based applications in the
internal network. For users to gain access to these applications, System Administrators
must first define these as native applications in Mobile Access. The user can access the
resources by launching the client either from the desktop or the Mobile Access portal.
To work in Network mode, users must have installation privileges.
• Application — Users can access most native IP-based and web-based application types
in the internal network, including most TCP applications. Users can only launch the
client in the Mobile Access portal. Once installed, users can access internal resources
defined as native applications in Mobile Access. Working in Application mode does not
require installation privileges.
_____________________
_____________________
490
Check Point Security Engineering
C h e c k Poi n t M o b i l e
Check Point Mobile offers an remote access option for several different platforms.
• Check Point Mobile for Windows — An IPSec VPN client solution for medium to large
enterprises that do not require an Endpoint Security Policy. It provides both secure
connectivity and security verification. This option requires both IPSec VPN and Mobile
Access Software Blade licenses.
• Check Point Mobile for iPhone and iPad — An SSL VPN client which supplies secure
connectivity and access to web-based corporate resources and Exchange ActiveSync.
This option is best used for mobile workers who have iOS mobile devices. A Mobile
Access Software Blade license is required for this option.
• Check Point Mobile for Android — An SSL VPN client for Android device users. It
supplies secure connectivity and access to web-based corporate resources and
Exchange ActiveSync. A Mobile Access Software Blade license is required for this
option.
C h e c k Poi n t C a p s u l e Wor k s p a c e
Capsule Workspace is an SSL VPN client for mobile devices that provides remote users
seamless access to a separate, secure business environment. A Check Point Capsule license is
required on the Security Gateway. This solution is further discussed in the Check Point
Capsule Solution section.
S e c u Rem ote
SecuRemote is a limited-function IPsec VPN client that only provides secure connectivity.
SecuRemote is a free client and only requires an IPSec VPN Software Blade license on the
Security Gateway.
Ad d i t i o n a l Rem ote Ac c e s s O p t i o n s
Check Point offers additional Remote Access options, including options specifically for
Endpoint Security. For more detail information regarding Remote Access solutions and
options, refer to sk67820.
_____________________
_____________________
491
Check Point Security Engineering
Check Point Capsule
Check Point Capsule addresses mobile access needs by securely protecting devices from
threats and protecting business documents wherever they go, all while providing a secure
business environment for mobile devices. Mobile Threat Prevention is further discussed in the
Threat Prevention chapter.
Check Point Capsule secures remote communication and data exchange using three
components: Capsule Workspace, Capsule Docs and Capsule Cloud.
C a p s u l e Wo rk s p a c e
Using Capsule Workspace, mobile users are provided a secure login with easy access to
business applications, exchange applications, and documents. This solution allows employees
working remotely to securely connect to the network and easily use and store business data and
documents within the application’s security container. Users have access to corporate email,
files, directories, corporate contacts, and calendars. Capsule Workspace allows company
employees to use their personal devices for work-related tasks yet place only business data
under control of the corporate IT team. With Capsule Docs integration and an application-level
passcode, business data is protected everywhere. Capsule Workspace also features offline data
encryption, policy and remote wipe, and sharing control. With Capsule Workspace,
organizations can enhance the productivity of employees while securing the use of personal
devices and protecting business data.
Key benefits include:
• One application is used to access business information, providing segregation between
personal and professional on the device.
• Provides a great end-user experience with push notifications, document editor,
HTML5, and more.
• Provides an end-to-end solution with no compromise on security, from Microsoft
Exchange to the mobile device.
_____________________
_____________________
492
Check Point Security Engineering
Capsule Workspace also has a remote data wiping feature, to delete the stored offline data after
each session. This may be useful when a user certification has been revoked, when a device is
lost, or an employee leaves the company.
Figure 398 — Capsule Workspace
_____________________
_____________________
493
Check Point Security Engineering
Capsule Connect
Capsule Connect complements Capsule Workspace to provide access to native applications.
Key features include:
•
•
•
•
•
Full Layer 3 VPN client
Works in the background
On Demand (iOS) / Always On (Android)
Supports all VPN authentication methods
Infrastructure for Capsule Cloud
Typical user scenarios include:
• Corporate applications using native applications
• Non HTML5 Remote Desktop Solutions
• Corporate mail using Native Clients
_____________________
_____________________
494
Check Point Security Engineering
How Capsule Connect and Capsule Workspace Differ
Capsule Connect and Capsule Workspace both offer secured connection for remote users who
are using their mobile devices. However, there are differences between the two.
Connect
Workspace
VPN type
IPSec VPN (Layer 3)
SSL VPN
Applications
Any application
• Secure browser, including remote terminal
viewing
• ActiveSync provisioning
• Exchange applications and push notifications
• Document viewing and editing
• Roadmap: Chat, SharePoint
• Roadmap: Third-party applications
Operating
system
iOS, Android, WP8
iOS, Android
Business data
isolation
None
•
•
•
•
•
Credential
protection
• One-Time Password
(OTP) login support
• No SSO support
• OTP login support
• SSO for Workspace apps
Compliance/
host checking
MDM cooperative
enforcement
• Jailbreak/root detection
• MDM cooperative enforcement
Application-level passcode
In-app encryption
Remote wipe
Offline data policy
Document sharing control (allow/block/
encrypt on-the-fly)
Table 10: Comparison of Capsule Connect and Capsule Workspace
_____________________
_____________________
495
Check Point Security Engineering
Capsule Docs
The rise of user collaboration and file sharing platforms may lead to security issues, such as
information theft and data leakage. Capsule Docs avoids these issues by securing the actual
document with the following capabilities:
• Classify — Define a set of permissions, which may include markings such as headers,
footers, and watermarks.
• Share — Decide with whom to share the document.
• Encrypt — Apply encryption (AES256 + RSA2048) to the document so that it is
protected and accessed only by the authorized users and groups.
Figure 399 — Capsule Docs Document Classification
Once files are protected, users can store the document anywhere and share them on different
platforms. Capsule Docs secures the document contents regardless of where it is kept or with
whom it is shared. In the event an attacker obtains the document, the content of the document
is encrypted and not accessible to unauthorized users.
Capsule Docs does not require users to have an additional password because it uses Active
Directory credentials for authentication.
Users and System Administrators can share a document with an external user by adding the
recipient’s email address to the list of authorized users. On the first attempt to access the
document, the external user will be asked to install either a viewer or editor client and register
in the system. This registration is fast and required only once.
Capsule Docs also logs any action performed by end users, such as when they add a new user
to the authorized list or when they remove the document’s protection. This can be helpful for
you when auditing and monitoring proprietary documents.
_____________________
_____________________
496
Check Point Security Engineering
Content Encryption
Document content is encrypted with a symmetric key. AES 256 is used for an On-Premise
deployment, and AES 128 is used for a Cloud deployment. The Content Encryption Key is
generated by the client and encrypted with asymmetric keys generated by the management
server. The Content Encryption Key can be accessed with one of the following:
• The Master Key (RSA 2048)
• The Classification Key (RSA 2048) and the User / Group Key (RSA 2048)
Cloud Deployment
Capsule Docs in the Cloud is the best option for organizations that prefer not to deploy an
additional server. In this setup, the Cloud stores community encryption keys, users, policy
settings, and audit logs. LDAP is used to manage users in a Cloud deployment. User
registration is done through the Capsule Web Portal and authentication is done against LDAP.
Figure 400 — Cloud Deployment
_____________________
_____________________
497
Check Point Security Engineering
Capsule Cloud
Capsule Cloud utilizes Check Point Software Blade solutions as a cloud-based service.
Capsule Cloud enforces the organization’s in-network Security Policy to both on- and offpremise devices. It helps the enterprise to protect employees using laptops and mobile device
when they are outside the secured office environment. This is the best option for organizations
with multiple satellite offices and remote branches. For smaller companies and individual
users, the Capsule Connect client can be installed on their devices to connect to Capsule Cloud
for security.
To protect communication between locations, any network traffic coming from and going to
remote devices are directed to the Capsule Cloud through a secure tunnel. Capsule Cloud then
inspects the traffic based on the Security Policies implemented by the corporate office. Capsule
Cloud employs Check Point Security solutions, such as Anti-Bot, Antivirus, Application
Control, IPS, and URL Filter.
Connecting a gateway to Capsule Cloud is more efficient compared to installing the policies
locally, as this set up requires lower machine resources. Security Gateways with limited
capabilities can also access and employ more software blades in Check Point Capsule Cloud.
Cloud Portal
Administrators can manage and apply policies for both on-premise or off-premise devices
using SmartConsole or the Capsule Cloud web user interface. Cloud Portal is the Capsule
Cloud WebUI. Use Cloud Portal to:
•
•
•
•
•
•
•
Set up policies for URL Filtering, Threat Prevention, and HTTPS Inspection
View user traffic and audit logs
Manage users and offices
Download Capsule Cloud applications and utilities
Change client and device settings
Access Capsule Cloud utilities
Determine location of roaming clients (via the Location Awareness feature)
Network administrators with access to the Cloud Portal can have either Administrator or Help
Desk access privileges. Administrators with Administrator privileges can view all tabs and
perform all operations in the Cloud Portal, while those with Help Desk rights are only allowed
to manage users and devices. Offices are corporate gateways that connect to Capsule Cloud
through a VPN. The gateway forwards traffic to Capsule Cloud where traffic is inspected
based on the Security Policies enforced.
_____________________
_____________________
498
Check Point Security Engineering
To connect a device to Capsule Cloud, you must create a VPN Site-to-Site community between
the two. The New Office Wizard will help you to set up this community in the Cloud Portal
and the local gateway management.
The Location Awareness feature gives administrators the option to limit access to Capsule
Cloud to external users. In this option, users with IP addresses or domains and ports within the
internal network will not be allowed to connect to Capsule Cloud.
Figure 401 — Capsule Cloud - Location Awareness
_____________________
_____________________
499
Check Point Security Engineering
Mobile Access Software Blade
Today’s business environment may require employees, contractors, and other knowledge
workers to access corporate resources from remote locations. Without the proper security
measures, you risk credential loss, unauthorized access, data loss and leakage, malware breakin and propagation, and more.
The Check Point Mobile Access Software Blade is a comprehensive remote access solution
that allows mobile and remote workers to easily and securely connect to the corporate network
from any location, with any supported device, while protecting the network, remote users and
mobile devices, from threats.
This Software Blade integrates into an existing Check Point gateway, enabling a more secure
and operationally efficient remote access for your users. The data transmitted by remote access
is decrypted, filtered, and inspected in real-time by Check Point’s gateway security services. It
applies Secure Socket Layer (SSL) and IPSec (also known as Layer 3) VPN protocols to
remote connections to ensure that the communication and data are encrypted.
The Mobile Access Software Blade also provides user authentication and the ability to check
the security posture of the remote device. This further strengthens the security for remote
access. The Mobile Access solution also guarantees authenticity by using standard
authentication methods such as Certificates, RADIUS, SecurID, and Dynamic ID to transfer
information and data.
M o b i l e Ac c e s s W i z a r d
When enabling the Mobile Access Software Blade on a gateway, the Mobile Access Wizard
will guide you through the different configuration settings. It also quickly allows authorized
remote users to access internal web or mail applications through a web browser, mobile device,
or remote access client. The Mobile Access Wizard helps to configure such settings as the
mobile access methods, the primary URL for the Mobile Access Portal, and the applications
that will be available to web or mobile device users.
NOTE
Once Mobile Access is enabled, it uses HTTPS 443. This is the same SSL
port as the Gaia Web portal. To prevent conflict, change the Gaia Web
portal port to a different port, for example TCP port 4434, and add an
access rule to the Firewall policy to allow the new port.
_____________________
_____________________
500
Check Point Security Engineering
Mobile Access Methods
The Mobile Access Methods section of the wizard allows you to select from where users can
access the Mobile Access applications:
• Web — Through a browser on any computer. SSL Network Extender can be
downloaded by users when necessary to access native applications.
• Mobile Devices — Through an iOS or Android Mobile device. Devices must have a
Check Point application installed.
◦ Capsule Workspace — Through a secure container on the mobile device to give users
access to internal websites, file shares, and Exchange servers.
◦ Capsule Connect/VPN — Through a full Layer 3 tunnel application that gives users
network access to all mobile applications.
• Desktops/Laptops — Check Point clients for PCs and Macs that use a Layer 3 tunnel
to provide access to internal network resources.
Web Portal
The primary URL for the Mobile Access Portal will need to be specified. The default is https:/
/<IP address of the gateway>/sslvpn. It is possible to use the same IP address for all portals on
the gateway with a variation in the path. A PFX (.p12) file can be imported to obtain a trusted
certificate. A PFX file is the combined format that holds the private key and certificate. All
portals on the same IP address will use the same certificate.
_____________________
_____________________
501
Check Point Security Engineering
Applications
Mobile Access provides the remote user with access to various corporate applications. The
wizard allows you to select the applications that will be available to web or mobile device
users:
• Web Applications — Select the web applications that users can access. The
applications will show on the Mobile Access portal. Web application options include:
◦ Demo Web Application (World Clock) — While testing Mobile Access, select this
option to have a web application show as it will when in production.
◦ Custom Web Application — Specify a custom URL as the landing page for users
when they connect with Mobile Access. For example, the URL can be the home page
of your company’s intranet site.
◦ Mail/Calendar/Contacts — Specify the details of your Exchange Server and existing
mail/calendar/contacts applications that your mobile users can access. Options
include Capsule Workspace Mail, ActiveSync applications and Outlook Web
applications.
• File Shares — Create and configure file sharing applications using Windows Common
Internet File System (CIFS) protocol.
• Citrix Services — Select to include native applications supported by Citrix Services.
Mobile Access supports Citrix client connectivity to internal XenApp servers.
• Native Apps — Native applications are IP-based applications that are hosted on servers
within the organization. Select to specify the path to an existing executable, such as MS
Remote Desktop, Telnet, and FTP.
Active Directory Integration
If choosing to use Active Directory (AD) when you enable the Mobile Access Software Blade,
select the AD domain, enter your credentials, and test connectivity. Otherwise, select I don't
want to use active directory now.
_____________________
_____________________
502
Check Point Security Engineering
M o b i l e Ac c e s s Wo rk fl ow
Mobile Access allows users to securely connect to company applications and data. Below is an
example of a high-level workflow to configure access to internal applications.
1.
2.
3.
4.
5.
6.
Enable the Mobile Access Software Blade on the Security Gateway using SmartConsole.
Follow the steps in the Mobile Access Wizard to configure settings.
Add Firewall rules to allow mobile device connections.
Create and distribute certificates for mobile user authentication using the Certificate Creation and Distribution Wizard. You can skip this step if you are not using certificates as an
authentication method.
End user downloads an endpoint solution, such as the Capsule Workspace application.
User opens the application (in this example, Capsule Workspace) and enters the Mobile
Access site name and the required user authentication.
Figure 402 — Sample Mobile Access Workflow
_____________________
_____________________
503
Check Point Security Engineering
User Authentication
The following authentication methods are used for Mobile Access:
•
•
•
•
•
Certificate (Internal or External Certificate Authority)
RADIUS server
SecurID
Username and password (internal, LDAP)
Dynamic ID One-Time Password (OTP)
Figure 403 — Authentication Factor Window
NOTE
A certificate can only be used as a first time authentication method.
Dynamic ID cannot be used as a first authentication method.
_____________________
_____________________
504
Check Point Security Engineering
Authentication can be configured for pre-R80 Security Gateways in one of two places:
• In the Gateway Properties window of a gateway in Mobile Access > Authentication:
Select the method that all users must use to authenticate to Mobile Access. The default
authentication method is Username and Password. Settings for Two-Factor
Authentication with a DynamicID OTP can be configured here as well.
• In the Gateway Properties window of a gateway in Legacy Authentication: The default
authentication method is Certificates from the ICA.
With R80.10 and higher Security Gateways, administrators can configure multiple login
options. The log in options can be different for each gateway and each Software Blade with a
supported client. For more information regarding which Mobile Access clients support
multiple log in options, refer to sk111583.
_____________________
_____________________
505
Check Point Security Engineering
G a teway S ec u ri t y Fea t u r e s
Once activated on the Security Gateway, the Mobile Access Software Blade offers a secured
connection by providing security measures on both the server and client side.
Server Side
Mobile Access uses IPS Web Intelligence to protect the network from web-related threats and
attacks, including malicious codes hiding in web-based applications and suspicious SQL
injection. It also scans files, such as documents and executables, using the Antivirus Software
Blade.
With Mobile Access enabled, administrators select the web-based and native applications that
can be accessed by remote users and define the actions that users can perform within the
applications. Mobile Access encrypts all traffic using HTTPS for web-based applications and
3DES or RC4 algorithm for native applications. For end users to access the native applications,
they need to install the SSL Network Extender.
Client Side
On the client side of the connection, Mobile Access can scan endpoint devices to verify their
security compliance and make sure that their protections are up-to-date. Mobile Access can be
configured to refuse a connection if the device is found to be non-compliant.
Mobile Access will only allow connections to devices that were able to authenticate, using one
of the supported authentication methods, including Dynamic ID, which is Check Point’s twofactor authentication method for machines. In addition, security can be enhanced by preventing
browsers from caching certain content, such as a PDF, that attackers may steal.
Organizations can also require remote users to utilize Capsule Workspace, Check Point’s
proprietary virtual desktop. This virtual workspace provides a secured environment, in which
files are encrypted and gives users the option to wipe all the data after each session.
_____________________
_____________________
506
Check Point Security Engineering
Mobile Access Deployment
Mobile Access can be deployed in several ways, depending on which is appropriate for the
organization’s needs:
• Simple Deployment
• Cluster Deployment
Simple Deployment
This deployment is the easiest to configure. In this deployment, a single Security Gateway
enabled with the Mobile Access Software Blade inspects all network traffic, including those
coming from endpoint devices. Your existing gateway acts as your Mobile Access gateway.
Figure 404 — Simple Deployment
Cluster Deployment
A Cluster deployment works best for organizations with a large number of concurrent remote
access users. Each cluster can be deployed in either of the deployments mentioned above. In
this deployment, however, it is recommended that each cluster member has three interfaces:
one interface leading to the organization, a second leading to the Internet, and a third for
synchronization. Each interface is on a different subnet.
_____________________
_____________________
507
Check Point Security Engineering
Mobile Access Policy
Check Point Mobile Access extends the functionality of a Firewall for remote users. The
Mobile Access Policy defines how remote users can securely access internal company
applications and resources using mobile devices. Mobile Access Policy rules are defined and
unified in the Access Control Policy. This includes all rules related to the Mobile Access
Portal, Capsule Workspace, and on-demand clients.
In the Access Control Rule Base, rules can be configured to apply to all Mobile Access
gateways, or just selected gateways. Rules can also be configured to apply to one or more
clients, such as the Mobile Access Portal or Capsule Workspace.
M o b i l e Ac c e s s R u l e B a s e
Mobile Access rules for R80.10 and above Security Gateways can be configured as a part of
the unified Access Control Policy in SmartConsole or in the legacy shared Mobile Access
policy in SmartDashboard. Rules for pre-R80 gateways can only be configured via
SmartDashboard. Mobile Access rules for both policy options must include users and user
groups, the applications to be accessed, and the gateways that the rule applies to.
Figure 405 — Mobile Access Configuration
_____________________
_____________________
508
Check Point Security Engineering
All Mobile Access gateways in an environment must use the same source for the Mobile
Access policy. You cannot configure the environment to have some gateways that use the
unified Access Policy and some that use the legacy policy option.
NOTE
When using the Unified Access Policy, some Mobile Access features and
settings are still configured in SmartDashboard.
To configure an R80.10 gateway to use the unified Access Control Policy:
1.
2.
3.
4.
In SmartConsole, navigate to the Gateways & Servers tab, and open a Mobile Access
gateway object.
Select Mobile Access.
In the Policy Source section, select Unified Access Policy.
Install policy.
Mobile Access in the Access Control Policy
To configure mobile access authorization in the Access Control policy, the Mobile Access
Software Blade must be enabled. The Mobile Access blade only understands rules with a
Mobile Access Blade application defined, and with or without an access role defined in the
Source column.
Security Gateways with Mobile Access enabled, are automatically added to the Remote
Access VPN Community. To configure rules for the Mobile Access portal or client, include the
community or a Remote Access community that includes the Mobile Access gateway in the
VPN column. By default, the Remote Access VPN community contains a user group that
contains all users.
To use a Mobile Access application in the Access Control policy, it must be defined as a
Mobile Application in SmartConsole or SmartDashboard. Other application objects, such as
Content Awareness and URL Filtering objects, cannot be used in rules with Mobile Access.
For example, a URL Filtering Facebook application cannot be used for Mobile Access. A new
Facebook web application must be created and authorized as a web application for Mobile
Access. Mobile application objects can be created in the Services & Applications column of a
rule.
To give access to resources through specified remote access clients, create access roles for the
clients and include them in the Source column of a rule. If an access role is defined in the
Source column of a rule, the Identity Awareness Software Blade must be enabled on all
installation targets that the rule applies to. Access roles for remote access will apply to Mobile
Access and IPSec VPN clients. When an access role for a client is in the Source column of a
rule, the rule will apply to traffic that originates from that client.
_____________________
_____________________
509
Check Point Security Engineering
Mobile Access Policy Layers and Inline Layers
Mobile Access rules can be included in policy layers and inline layers. Mobile Access must be
enabled for each layer that contains rules with Mobile Access applications. In a policy with
Ordered policy layers, the order of rules in the Rule Base is important because the first rule that
matches the traffic is enforced. Matching is continued in each subsequent layer until the
Mobile Access traffic is matched with a Drop rule or accepted in all layers. In this case, the
matched application for Mobile Access is taken from the last rule matched with a Mobile
Access application.
A Mobile Access inline layer can be configured in any Ordered layer. A bypass rule to accept
Mobile Access traffic must be created in all layers that are placed above the Mobile Access
layer. The bypass rule will match the Mobile Access traffic in the layer and allow the traffic to
move to the next layer until it reaches the Mobile Access Inline layer. Use the access role for
all Mobile Access users in the Source column and Accept in the Action column to create the
bypass rule.
As an inline or sub-policy layer, Mobile Access is matched on the parent rule and then on the
inline layer rule. The matched application for Mobile Access is taken from the last rule
matched with a Mobile Access application. If the matched rule in the inline layer does not
contain a Mobile Access application, the policy will look for a Mobile Access application in
the inline layer’s parent rule.
Best Practices
It is best practice to place Mobile Access rules that authorize applications above rules that
contain a related service. For example, a rule that allows access to a Mobile Access web
application, such as Outlook Web Access (OWA) on HTTPS, should be placed above a rule
that allows or blocks HTTPS. If the HTTPS rule is first, the web application will match that
rule and the policy will not reach the rule that contains the Mobile Access application.
Check Point recommends creating an inline layer for Mobile Access rules. To use the inline
layer effectively, define a parent rule in the main policy layer. The parent rule will match all
Mobile Access traffic and send the traffic to the inline layer. An access role that includes all
Mobile Access users in the Source column is required.
_____________________
_____________________
510
Check Point Security Engineering
When creating rules, do not use a Security Gateway as the destination. Use Any or the internal
hosts of relevant applications in the Destination column. This is because Mobile Access
applications are defined in the Services & Applications column. In turn, do not use Any in the
Services & Applications column. To make an application show in the Mobile Access Portal or
Capsule Workspace, it must be a Mobile Access application object that is used explicitly in the
Rule Base.
L a b 6 .1
Managing Mobile Access
_____________________
_____________________
511
Managing Mobile Access
L
A
B
6.1
Define access rights and functions that can be securely operated by remote users within the Check Point
Capsule application.
Ta sks :
• Enable Mobile Access Blade.
• Configure the Check Point Capsule Policy.
• Test Check Point Capsule.
Pe r for ma n c e Ob j ec t ive s:
• Demonstrate how to enable Mobile Access for remote users.
• Configure LDAP integration for remote user authentication of Mobile applications.
_____________________
_____________________
512
Check Point Security Engineering
Enable Mobile Access Blade
Enable the Mobile Access blade and configure the Security Gateway cluster to allow encrypted remote
Check Point Capsule traffic.
1.
Edit the Alpha cluster object (A-GW-Cluster):
Figure 406 — Gateway Cluster Properties - General Properties
_____________________
_____________________
513
Check Point Security Engineering
2.
In the Network Security tab, select the Mobile Access option. The system displays the Mobile Access
Configuration wizard:
Figure 407 — Mobile Access Configuration
3.
Verify that the following categories and sub-categories are all checked:
◦ Web
◦ Mobile Devices
◦ Desktops/Laptops
4.
Click Next.
_____________________
_____________________
514
Check Point Security Engineering
5.
In the Portal URL section, set the Main URL to:
https://203.0.113.1/sslvpn
Figure 408 — Web Portal
6.
Click Next.
_____________________
_____________________
515
Check Point Security Engineering
7.
In the Mail/Calendar/Contacts section of the Applications page, clear the following option:
Mobile Mail (including push mail notifications)
Figure 409 — Applications
8.
Click Next, and the system displays the Active Directory Integration page.
_____________________
_____________________
516
Check Point Security Engineering
9.
Use the following information to create a new domain:
Domain Name: alpha.cp
Username: Administrator
Password: Chkp!234
Domain Controller: 192.168.11.101
Figure 410 — Active Directory Integration
10. Click Connect, and the system uses the predefined credentials to connect to the alpha.cp AD.
NOTE
The connection to the AD server may take a few minutes.
_____________________
_____________________
517
Check Point Security Engineering
11. Click Next, and the system displays the following:
Figure 411 — Users
12. Click Add.
_____________________
_____________________
518
Check Point Security Engineering
13. Search for and select the Even group:
Figure 412 — Users
_____________________
_____________________
519
Check Point Security Engineering
14. Click Next, and the system displays the summary page:
Figure 413 — Mobile Access Configuration Summary
15. Click Finish, to exit the wizard and return to the General Properties page of the cluster object.
16. Click OK, and the system displays the following warning:
Figure 414 — Check Point SmartConsole
17. Click No.
_____________________
_____________________
520
Check Point Security Engineering
18. In the navigation pane of the cluster object, select Platform Portal.
19. In the Platform Portal page, modify the Main URL to:
https://203.0.113.1:4434
Figure 415 — Platform Portal
20. Click OK.
_____________________
_____________________
521
Check Point Security Engineering
Configure the Check Point Capsule Policy
Define the available applications and access rights of remote Capsule users connecting to your network.
In SmartConsole, navigate to the Security Policies tab.
2. In the Shared Policies section, select Mobile Access:
1.
Figure 416 — Shared Policies - Mobile Access
3.
Click the following link:
Open Mobile Access Policy in SmartDashboard
_____________________
_____________________
522
Check Point Security Engineering
4.
The system displays the SmartDashboard Mobile Access Overview page:
Figure 417 — Mobile Access Overview
_____________________
_____________________
523
Check Point Security Engineering
5.
In the Policy page, use the following information to create a Mobile Access rule:
Users: Even
Application: World_Clock
Install On: A-GW-Cluster
Figure 418 — Mobile Access - Policy
_____________________
_____________________
524
Check Point Security Engineering
6.
In the navigation pane, expand Applications, and select Web Applications:
Figure 419 — Mobile Access - Web Applications
_____________________
_____________________
525
Check Point Security Engineering
7.
In the Web Applications page, click the New button. The system displays the following:
Figure 420 — Web Application - General Properties
_____________________
_____________________
526
Check Point Security Engineering
8.
Name the new web application TestApp:
Figure 421 — Web Application
_____________________
_____________________
527
Check Point Security Engineering
In the navigation pane, select Authorized Locations.
10. In the Servers section of the page, select A-DMZ from the Host or DNS name drop-down list:
9.
Figure 422 — Web Application - Authorized Locations
_____________________
_____________________
528
Check Point Security Engineering
11. In the navigation pane, select Link in Portal.
12. In the Link in Portal page, Use the following information to populate the General tab:
Add Link: Selected
Link Text: TestApp
URL: http://192.168.12.101
Figure 423 — Web Applications - Link in Portal
_____________________
_____________________
529
Check Point Security Engineering
13. In the navigation pane, select Additional Settings > Periodic Test.
14. In the Periodic Test page, select the option to run the test every 30 minutes:
Figure 424 — Web Application - Periodic Test
_____________________
_____________________
530
Check Point Security Engineering
15. Click OK, and the system adds the newly configured application to the Web Applications list:
Figure 425 — Mobile Access - Web Applications
_____________________
_____________________
531
Check Point Security Engineering
16. In the navigation pane, select Applications > File Shares:
Figure 426 — Mobile Access - Applications - File Shares
_____________________
_____________________
532
Check Point Security Engineering
17. In the Files Shares page, click New.
18. Name the new application FileShare:
Figure 427 — File Share Application - General Properties
_____________________
_____________________
533
Check Point Security Engineering
19. In the navigation pane, select Authorized Locations.
20. In the Servers section of the page, select A-DMZ from the Host or DNS name drop-down list:
Figure 428 — File Share Application - Authorized Locations
_____________________
_____________________
534
Check Point Security Engineering
21. In the navigation pane, select Link in Portal.
22. Use the following information to configure the link:
Add Link: Selected
Link Text: Alpha File Share
Path: \\192.168.12.101\Share
Figure 429 — File Share Application - Link in Portal
NOTE
Your instructor may provide a different path, based on your classroom configuration.
Verify that the shared drive on A-GUI allows everyone full access.
_____________________
_____________________
535
Check Point Security Engineering
23. Click OK, and the system adds the new application to the list of File Shares:
Figure 430 — Mobile Access - File Shares
_____________________
_____________________
536
Check Point Security Engineering
24. In the navigation pane, select Policy.
25. Add the following applications to Rule 1:
TestApp
FileShare
Figure 431 — Mobile Access - Policy
26. Update the policy.
27. Close SmartDashboard.
28. In SmartConsole, publish and install the Alpha Security Policy.
_____________________
_____________________
537
Check Point Security Engineering
Testing Check Point Mobile Access
Reconfigure B-GUI to function as a remote client using Check Point Mobile Access and connect to the
Alpha domain to test the newly configured applications.
From B-Host, launch a web browser.
2. Use https to authenticate with Check Point Mobile at the following address:
1.
203.0.113.1/sslvpn
Figure 432 — Check Point Mobile Authentication
3.
Use the following information to log into Check Point Capsule:
Username: user2
Password: Chkp!234
_____________________
_____________________
538
Check Point Security Engineering
4.
Click Sign In, and the system displays the applications defined in the Check Point Capsule policy,
which are now available to remote users:
Figure 433 — Check Point Mobile
_____________________
_____________________
539
Check Point Security Engineering
5.
In the Web section of the page, click the World Clock link. The system displays the following:
Figure 434 — World Clock Application
6.
Click the Back button on the browser, to return to the Check Point Mobile page.
_____________________
_____________________
540
Check Point Security Engineering
7.
In the File Shares section of the page, click the Alpha File Share link. The system displays the
following:
Figure 435 — File Access Settings
_____________________
_____________________
541
Check Point Security Engineering
8.
Select the following option:
Access files using the following username and password
9.
Use the information below to enter the login information:
Username: user2
Password: Chkp!234
10. Click OK, and browse the file share.
END OF LAB 6.1
_____________________
_____________________
542
Check Point Security Engineering
Review Questions
1.
What is the difference between an SSL VPN and an IPSec VPN?
2.
How do Capsule Docs and Capsule Workspace work together?
_____________________
_____________________
543
C
H
A
P
T
E
R
Check Point Security Engineering
Threat Prevention
7
Protecting an organization from security threats such as zero-day or Advanced Persistent
Threats (APT) is an important aspect of cyber security administration. The ability to
prevent these and other threats help organizations avoid serious and costly damages. This
chapter provides an overview of Check Point Threat Prevention solutions that protect an
organization from malware and threats targeting company-issued devices, including
smartphones and tablets.
Learning Objectives
• Discuss different Check Point Threat Prevention solutions for dangerous attacks such as zero-day
and Advanced Persistent Threats.
• Understand how SandBlast, Threat Emulation, and Threat Extraction helps to prevent security
incidents.
• Identify how Check Point SandBlast Mobile helps protect an organization from threats targeting
company-issued smartphones and tablets.
_____________________
_____________________
544
Check Point Security Engineering
The Threat Landscape
Today’s Threat Landscape continues to evolve at a rapid pace. As a result, Threat Prevention
has become more complex than ever before. Many organizations are challenged to keep up
with the dynamically expanding landscape of threats as well as new trends, such as
consumerization, regulatory compliance, and cloud-based services. Organizations and
individuals alike continue to be victimized and beleaguered by sophisticated cyber attacks at
an increasing rate. Businesses not only need to be concerned about network attacks, but also
attacks directed at end user’s computers, such as viruses and bots. In addition, new malware is
created nearly every second.
Zero-day attacks and Advanced Persistent Threats (APTs) are different kinds of threats that
attackers employ to target businesses. Both use evasion techniques that undermine an
organization’s defenses. Thus, it is important for organizations to implement a multi-faceted
security strategy to expose and combat these and other threats.
Z e r o - D ay At t a c k s
Zero-day attacks target unknown software flaws or vulnerabilities to deliver new variants of
existing malware. They are known to elude the most up-to-date Anti-Malware and Antivirus
solutions. Because there is no security patch yet available for these vulnerabilities, zero-day
attacks give attackers an opportunity to perform their malicious activities within the targeted
company’s network.
Ad va n c e d Pe r s i s te n t T h r e a t s
APTs are designed to infiltrate an organization’s systems over a period of time while evading
detection. These attacks use multiple techniques in several stages and typically appear as small
unrelated events, which, if taken individually, may seem harmless. In some cases, APTs may
employ zero-day threats as an infection vector, but they also exploit existing vulnerabilities.
APTs are known to be launched and funded by nation-states and certain organizations. They
have targeted both large and small organizations. The damage of a successful APT can have a
severe impact on affected companies. The impact can include data breaches, system downtime,
damaged brand reputation, and various costly fees.
_____________________
_____________________
545
Check Point Security Engineering
Intrusion Prevention System
The Intrusion Prevention System (IPS) is a component of the Threat Prevention solution.
Whereas the Firewall blocks traffic based on source, destination, and port information, IPS
adds another line of defense by analyzing traffic contents to check if it is a risk to the network.
IPS protects users from malware on legitimate websites, controls network usage of selected
applications, and more.
IPS Profile Setting s a n d P rote c t i o ns
The IPS Software Blade delivers complete and proactive intrusion prevention. It features
thousands of signatures, and behavioral and preemptive protections to deliver complete
intrusion prevention for clients, servers, operating system and other vulnerabilities. Its
detection engine combines multiple defense layers to detect and prevent threats.
In R80.10, the IPS Software Blade is managed by the Threat Prevention policy. As part of the
unified Threat Prevention policy, IPS allows more granularity with multiple protection profiles
per gateway. IPS protections are immediately enforced on network traffic when a Threat
Prevention policy is installed on the Security Gateways. Threat Prevention profiles determine
which protections are activated.
IPS profiles can be imported and exported using the ips_export_import command from
the CLI. Using this command, profile configurations can be copied between management
servers of the same version.
Each IPS profile contains a set of activated protections and instructions for what IPS will do
when traffic inspection matches an activated protection. The IPS library of protections is
constantly updated to stay ahead of emerging threats. Security Gateways with IPS enabled will
get the updates when the policy is installed. To view the latest protections, navigate to the
Threat Tools sections and select IPS Protections.
All IPS protections have dynamic tags which will allow Threat Prevention profiles to
automatically activate or deactivate protections tagged by relevant aspects such as protocols,
affected software, and file types.
_____________________
_____________________
546
Check Point Security Engineering
Security Gateways from previous software versions that have IPS and other Threat Prevention
Software Blades enabled, will have their Threat Prevention policy split into two different
layers. In turn, the IPS layer will include the ThreatCloud IPS protections and all other core
IPS protections will remain a part of the Access Control policy installation.
NOTE
Settings for protocol violations, such as “aggressive aging” and “noncompliant HTTP” are accessed from the Inspection Settings section. To
view this section, navigate to Manage & Settings > Blades.
IPS Tu ning a nd Ma inte na nce
IPS is not a static solution and requires regular tuning and maintenance to make it effective
against evolving threats. Below is an overview on how to properly maintain IPS:
• Verify that there are enough CPU resources to enable IPS.
• Update the IPS package, to ensure that the Security Gateway is updated with the latest
protection signatures.
• Set the default IPS action to Prevent, to enable maximum network protection.
• Set the default IPS action for newly downloaded protections to Prevent.
• Clone the Recommended Profile to create a backup copy. Make sure all changes are
done on the cloned profile. Security requirements for different segments in the network
often depend on the specified traffic types and network objects for each segment. For
deployments with a Multi-Domain Server or several gateways, consider creating
separate IPS policies and perform these steps for each segment.
• During the initial process, enable Troubleshooting mode. In this mode, IPS inspects but
does not block a network's unique traffic. Even if all protections are set to Prevent, the
gateway only detects possible threats and generates logs for the traffic.
• Use the Follow Up option to help the analysis and tuning of new protections in the
future.
• Assign the active profile to applicable gateways and set the gateway to bypass IPS
inspection when it is under heavy load. This is to ensure that IPS analysis does not
affect on-network traffic.
• Install policy on the gateways, because policies are not automatically deployed.
• After installing the policy, IPS will begin inspecting the traffic and generating logs.
Collect logs for at least a week or two and then review the logs to decide which
protections to run in Protect or Detect mode, and which ones require further fine-tuning
and analysis.
• Disable Troubleshooting mode for IPS Software Blade to protect the network.
• Change the settings for Updates policy. Configure updates for Newly downloaded
protections and then set to Detect. When new IPS protections are deployed, they are set
to Detect mode.
_____________________
_____________________
547
Check Point Security Engineering
• Clear the follow up and newly downloaded flags for all protections that are reviewed
during the tuning process.
• Tune the new IPS protections that are downloaded twice a month and look for changes
in the behavior of the ones already tuned.
• Monitor Security Gateway performance and configure the applicable settings to
provide the best network security and performance.
NOTE
If a specific IPS profile is in Detect Only Mode for troubleshooting, it will
not block malicious traffic.
L a b 7.1
Understanding IPS Protections
_____________________
_____________________
548
Understanding IPS Protections
L
A
B
7.1
The next step is to modify IPS protections so that you can configure your IPS policy to meet the specific
challenges of the network, such as SQL Injections. Remember, IPS is considered a pre-infection blade, and
is deployed to combat threats at the perimeter.
Ta sks :
• Configure a new default Protection profile.
• Configure the IPS Demo Tool.
• Test IPS enforcement.
• Modify Profile settings.
• Modify the cloned Protection profile.
Pe r for ma n c e Ob j ec t ive s:
• Demonstrate how Threat Prevention profiles affect IPS inspection on a Check Point Security
Gateway.
• Demonstrate how to modify IPS protections and customize enforcement profiles.
_____________________
_____________________
549
Check Point Security Engineering
Configuring the Protection Profile
Before you can determine how specific traffic is handled by the two pre-configured IPS profiles, reconfigure the settings to protect all interfaces on the gateway.
1.
Edit the Alpha Policy and change the DMZ rule to be Any service.
Figure 436 — Alpha Policy - DMZ Rule
_____________________
_____________________
550
Check Point Security Engineering
2.
From the Firewall tab, edit the Alpha Security Gateway Cluster object:
Figure 437 — Check Point Gateway - General Properties
3.
Select the IPS option, and the system displays the following message:
Figure 438 — IPS First Time Activation
_____________________
_____________________
551
Check Point Security Engineering
4.
Verify that the following option is selected:
According to the Threat Prevention policy
Click OK.
6. In the navigation tab, select the IPS branch:
5.
Figure 439 — Check Point Gateway - IPS
_____________________
_____________________
552
Check Point Security Engineering
7.
In the Bypass Under Load section, select the following option:
Bypass IPS inspection when gateway is under heavy load
Figure 440 — Check Point Gateway - IPS Configured
Click OK, and the system displays a message regarding Office Mode pool definition.
9. Click OK to clear the message.
8.
_____________________
_____________________
553
Check Point Security Engineering
10. In the navigation pane, select Mobile Access > Office Mode.
11. In the Office Mode page, select the following option:
Do not offer Office Mode
Figure 441 — Mobile Access - Office Mode Configured
12. Click OK.
_____________________
_____________________
554
Check Point Security Engineering
13. In the navigation pane of the Security Policies view, right-click Access Control > Policy.
14. Click Edit Policy, and the system displays the following window:
Figure 442 — Policy
_____________________
_____________________
555
Check Point Security Engineering
15. Clear the following options:
◦ QOS
◦ Desktop Security
16. Confirm that only the following options are selected:
◦ Access Control
◦ Threat Prevention
Figure 443 — Policy Configured
17. Click OK.
_____________________
_____________________
556
Check Point Security Engineering
18. In the navigation pane, select Threat Prevention > Policy:
Figure 444 — Threat Prevention Policy
_____________________
_____________________
557
Check Point Security Engineering
19. In the navigation pane, select Profiles:
Figure 445 — IPS - Profiles
20. In the profiles page, select the Basic profile.
21. Next, click the Clone icon. The system clones the Basic profile:
Figure 446 — Clone Object
_____________________
_____________________
558
Check Point Security Engineering
22. Name the clone Alpha_Basic.
NOTE
it is best practice to modify clones of the default profiles, rather than edit the
originals, in case you need to revert back to them at some point.
23. Select the Alpha_Basic profile.
24. Click Edit, and the system displays the cloned profile.
25. In the Activation Mode section of the page, select Detect for each mode:
Figure 447 — Profiles
NOTE
By setting the Activation Mode to Detect, rather than Prevent, the Security Gateway
will monitor and log malicious activity but will not block the traffic.
26. Click OK.
_____________________
_____________________
559
Check Point Security Engineering
27. In the navigation pane, select the Threat Prevention > Policy branch:
Figure 448 — Profile Properties - IPS Policy
28. Review the policy settings.
29. Notice that the IPS protections are not included in the default Recommended_Profile.
30. Right-click the Action column of Rule 1.
_____________________
_____________________
560
Check Point Security Engineering
31. Select Alpha_Basic from the drop-down list.
Figure 449 — Action Menu
_____________________
_____________________
561
Check Point Security Engineering
32. Publish and install the Alpha Threat Prevention and Access Control policies:
Figure 450 — Install Policy
_____________________
_____________________
562
Check Point Security Engineering
Configuring the IPS Demonstration Tool
Configure the IPS Demo Tool to test the Check Point IPS software blade.
1.
Power on the Attacker virtual machine:
Figure 451 — IPS Demo Tool
2.
In the Virtual Machine Settings, verify that the only network interface configured for the Attacker is
connected to the External network (vmnet8).
_____________________
_____________________
563
Check Point Security Engineering
3.
To start the IPS demonstration tool on the newly configured Attacker virtual machine, click the IPS
icon from the toolbar at the bottom of the screen. The system displays the following:
Figure 452 — IPS Demo Tool Launched
NOTE
The default network configuration for the tool must be changed to match our
environment. Do this, after configuring eth0.
4.
Type 0, and press Enter. The system displays the following:
Figure 453 — Demo Tool Network Settings Configuration
5.
Type the following at the prompt:
203.0.113.37
_____________________
_____________________
564
Check Point Security Engineering
6.
Press Enter, and the system displays the following:
Figure 454 — Demo Tool Network Settings Configuration
7.
Type the following at the prompt:
203.0.113.254
8.
Press Enter, and the system displays the following:
Figure 455 — Demo Tool Network Settings Configuration
9.
Type the following at the prompt:
203.0.113.171
_____________________
_____________________
565
Check Point Security Engineering
10. Press Enter, and the system displays the following:
Figure 456 — Demo Tool Network Settings Configuration
11. Type the following at the prompt:
203.0.113.254
12. Press Enter, and the system displays the following:
Figure 457 — IPS Tool - Main Menu
13. Use the table below to verify that the network configuration information displayed by the tool is
correct:
Attacker IP Address: 203.0.113.37
Attacker Default Gateway: 203.0.113.254
Target IP Address: 203.0.113.171
Target Default Gateway: 203.0.113.254
14. While keeping the IPS Demo Tool open, open a terminal window.
_____________________
_____________________
566
Check Point Security Engineering
15. Type the following command, and press Enter:
ifconfig -a
Figure 458 — Terminal Window
16. The system should show eth0 as configured with an incorrectly defined IP address or subnet mask.
17. To configure the Attacker virtual machine interface, type the following and press Enter:
ifconfig eth0 203.0.113.37 netmask 255.255.255.0
_____________________
_____________________
567
Check Point Security Engineering
18. To configure the default route for the Attacker virtual machine, type the following, and press Enter:
route add default gw 203.0.113.254 eth0
Figure 459 — Terminal
19. To help identify network issues that may arise, initiate a constant ping from the Attacker to A-DMZ:
Figure 460 — Ping
NOTE
If the ping fails, you can quickly re-IP the interface and add the default route back to
the Attacker’s configuration.
_____________________
_____________________
568
Check Point Security Engineering
Testing the Default Protections
Test the current protection settings for the Check Point IPS software blade.
1.
In the IPS Demo Tool, type 2, and press Enter. The system displays the Attacker menu:
Figure 461 — Attacker Menu
NOTE
Do not run the Run all option 0, as it will change the IP address.
Type 1, to select the Network Security category.
3. Press Enter.
4. Type 0, and press Enter. The system asks you to select an execution mode.
2.
Type 2, and press Enter. The system asks you to define the number of attacks in this sequence.
6. Type 100, and press Enter. The system runs the attacks in the selected category, and presents the
Attacker menu when the attack sequence is completed.
5.
_____________________
_____________________
569
Check Point Security Engineering
From the Logs & Monitor tab, verify that the traffic is being detected.
8. Search field, click Blade > IPS to view the IPS related traffic logs:
7.
Figure 462 — IPS Traffic Logs
9.
Confirm that you see IPS traffic as Detected.
_____________________
_____________________
570
Check Point Security Engineering
Modifying the Protection Profile Settings
Now, configure IPS to protect the network from attacks, rather than simply detect them.
1.
In the navigation pane of the Security Policies view, select Threat Prevention > Policy:
Figure 463 — Threat Prevention - Policy
2.
Edit the Alpha_Basic profile, and the system displays the Profiles window.
_____________________
_____________________
571
Check Point Security Engineering
3.
In the Activation Mode section of the page, select Prevent for all Activation Modes:
Figure 464 — Profiles - General Policy
Click OK, to approve the change and clear the window.
5. Publish and install the Alpha Threat Prevention Policy.
6. From the Attacker virtual machine, return to the Attacker main menu.
7. Type 1, and press Enter. The system displays the Network Security category:
4.
Figure 465 — Network Security Category
_____________________
_____________________
572
Check Point Security Engineering
8.
Type 1, and press Enter. The system displays the IP and ICMP category:
Figure 466 — IP and ICMP Category
9.
Type 5, and press Enter. The system displays the Packet Sanity feature:
Figure 467 — Execute Packet Sanity Attack
10. Press Enter, and the system executes the selected packet sanity attack on the A-GUI virtual machine:
Figure 468 — Trailing Data Attack
_____________________
_____________________
573
Check Point Security Engineering
11. From the A-GUI virtual machine, view the IPS logs in the Logs & Monitor tab:
Figure 469 — Logs & Monitor - IPS Logs
_____________________
_____________________
574
Check Point Security Engineering
12. Open an IPS record:
Figure 470 — Log Detail
13. Review the record and consider the following questions:
◦ What is the threat severity level?
◦ What is the performance impact of this inspection and action?
◦ What is the protection name?
14. Close the record.
_____________________
_____________________
575
Check Point Security Engineering
15. Next, navigate to the Security Policies view.
16. Select Threat Prevention > Policy.
17. Now, enforce the Recommended_Profile:
Figure 471 — Recommended_Profile Enforced
18. In the navigation pane, select Profiles.
_____________________
_____________________
576
Check Point Security Engineering
19. View the Recommended_Profile.
20. Select the following Blade Activation option:
IPS
21. Clear the following Blade Activation option:
Threat Extraction
Figure 472 — Profiles
NOTE
In a production environment, it’s best practice to clone a profile and make any
changes in the clone. This allows you to revert back to the default profile settings, if
necessary.
22. Publish and install the Alpha Security Policy.
_____________________
_____________________
577
Check Point Security Engineering
23. From the Attacker virtual machine, return to the Attacker menu:
24. Type 2, and press Enter. The system displays the Application Intelligence category.
Figure 473 — Application Intelligence Menu
25. Type 2, and press Enter. The system displays the MS-RPC category.
26. Type 1, and press Enter. The system displays the MS-RPC Over CIFS category.
27. In the MS-RPC Over CIFS sub category, select 1, and press Enter. The system displays the following:
Figure 474 — Non-Compliant CIFS Attack
_____________________
_____________________
578
Check Point Security Engineering
28. Press Enter, and the system executes the non-compliant CIFS attack:
Figure 475 — Non-Compliant CIFS Attack Executed
29. Press Ctrl + C to stop the attack.
30. In the Logs & Monitor view of SmartConsole, locate the most recent blocked traffic.
NOTE
If you are not susceptible to a specific attack, for instance, if you did not have CIFS
files on your network, you could allow it because it cannot be successful.
31. Notice that the traffic is not inspected or blocked by IPS.
NOTE
The related protection is inactive in the Recommended profile, so the traffic is
dropped by the Cleanup Rule on the firewall. By leaving some protections inactive in
the profile, especially for low-risk threats, the firewall load is reduced.
_____________________
_____________________
579
Check Point Security Engineering
Working with Logs & Monitor 
to Investigate Threats
Use the Logs & Monitor tab in SmartConsole to investigate unusual IPS related threat traffic.
In the navigation pane of Logs & Monitor view, review the IPS logs.
2. Double-click a record, to view it’s details:
1.
Figure 476 — Log Details
Review the options listed in the Actions section of the page.
4. Consider the following questions:
◦ Could these actions be used to attempt to identify the source of the attack?
3.
◦ In what situations would you consider using any of these actions?
_____________________
_____________________
580
Check Point Security Engineering
Modifying an Existing Protection Profile
Make changes to the protections to prevent and detect specific traffic that you may be concerned about
infiltrating your network.
In SmartConsole, select the Security Policies view.
2. Select Threat Prevention > Policy:
1.
Figure 477 — Threat Prevention Policy
_____________________
_____________________
581
Check Point Security Engineering
In the navigation pane of the IPS tab, select IPS Protections.
4. Click the View button:
3.
Figure 478 — IPS Protections
5.
Click Show Profiles, and the system displays the Show Profiles window.
_____________________
_____________________
582
Check Point Security Engineering
6.
Select the following option:
Specific IPS enabled profiles
7.
Select both of the following options:
Alpha_Basic
Strict
Figure 479 — Show Profiles Configured
_____________________
_____________________
583
Check Point Security Engineering
8.
Click OK, and the system displays the modes of the two selected profiles:
Figure 480 — IPS Protections Modified
9.
Review the first few protections on the page, and consider the following:
◦ Are there protections that are not active on any profile?
◦ Can you see differences between the Default and Recommended profiles?
◦ Which profile is more strictly enforced (more active protections)?
◦ How would you expect the different profiles to affect the performance of the gateway?
10. Sort the protections by descending, alphabetical order.
_____________________
_____________________
584
Check Point Security Engineering
11. Select the following protection. It is Active in the Default Profile but Inactive on the Recommended
profile:
CVE-2009-1761
Figure 481 — IPS - Protections
_____________________
_____________________
585
Check Point Security Engineering
12. Double-click the Selected protection, and the system displays a list of associated IPS profiles:
Figure 482 — Associated IPS Profiles
13. Select the Strict profile.
14. Click the Edit button, and the system displays the following:
Figure 483 — Protection Details
_____________________
_____________________
586
Check Point Security Engineering
15. Use the information below to configure the Protection Details window:
Main Action: Override IPS Policy with Prevent
Track: Log
Capture Packets: Selected
Figure 484 — Protection Settings Configured
16. Click OK.
17. Click Close, and the protection now shows Prevent in the Strict:
_____________________
_____________________
587
Check Point Security Engineering
Figure 485 — Protection Details - General
18. In the search field of the Protections page, enter the following:
sql injection
_____________________
_____________________
588
Check Point Security Engineering
19. Press Enter, and the system displays all projections relating to SQL Injections:
Figure 486 — IPS - Protections - Search Results
20. Select the following protection:
Oracle Database Server Multiple Procedures
21. Double-click the Inactive icon in the Strict column.
_____________________
_____________________
589
Check Point Security Engineering
22. Use the information below to configure the protection:
Main Action: Override IPS Policy with Detect
Track: Log
Capture Packets: Cleared
Figure 487 — Protection Settings Configured
23. Click OK, and the system displays the following message:
Figure 488 — Check Point SmartConsole
24. Click OK, to clear the message.
_____________________
_____________________
590
Check Point Security Engineering
25. Click Close, and the system now displays Detect, rather than Inactive for the modified protection:
Figure 489 — IPS - Protections Modified
NOTE
You can also right-click the profile field and select Detect or Prevent, without having
to edit the protection directly.
26. Publish and install the Alpha Security Policy.
_____________________
_____________________
591
Check Point Security Engineering
END OF LAB 7.1
_____________________
_____________________
592
Check Point Security Engineering
Geo-Protection
Geo-Protection enforces or monitors traffic based on the source or destination country.
Country information is determined by comparing the IP address in the packet against the IP-tocountry database. Private IP addresses are always allowed unless explicitly specified as
blocked on the other side of the connection. Check Point control connections, for example
those between Security Gateways and Security Management Server, are always allowed
regardless of the Geo-Protection policy.
You must have a valid IPS contract and a Software Blade license for each Security Gateway
that enforces Geo-Protection.
Figure 490 — Geo Policy
The IP Address to Country Database
The IP-To-Country database is downloaded to the Security Gateway from a Check Point data
center. To make sure that the database is up-to-date, the Security Gateway should be connected
to the Internet. If the Security Gateway requires a proxy to access the Internet, the proxy must
be defined in SmartDashboard.
_____________________
_____________________
593
Check Point Security Engineering
Log Aggregation by Country
By default, Geo-Protection logs are aggregated, which means that a single log entry is
generated per aggregation interval, for every country that is part of the Policy for Specific
Countries. Logs related to other countries are aggregated to a single log entry.
It is possible to turn off log aggregation by country. In that case, a log is created for every
connection tracked. Turning off log aggregation by country may significantly increase the
number of generated logs and increase CPU usage on the Security Gateway.
You can create a Geo Protection policy with exceptions to allow legitimate traffic through
while blocking or monitoring traffic from untrusted sources or by country. Users can monitor
activity using SmartEvent.
L a b 7. 2
Deploying IPS Geo Policy
_____________________
_____________________
594
Deploying IPS Geo Protection
L
A
B
7.2
Spoof a source address to test the Geo Protection feature of IPS.
Ta sks :
• Modify Anti-Spoofing settings.
• Configure IPS Geo Protection.
• Test IPS Geo Protection features.
Pe r for ma n c e Ob j ec t ive :
• Demonstrate how geographic location can be used to define a security posture.
_____________________
_____________________
595
Check Point Security Engineering
Modifying Anti-Spoofing Settings
Disable anti-spoofing measures on the Security Gateway so that you can spoof addresses to make them
appear to be coming from a country from which you want to block traffic.
1.
From SmartConsole, edit A-GW-Cluster:
Figure 491 — Check Point Gateway - General Properties
2.
Select the following Network Security options:
◦ Application Control
◦ URL Filtering
_____________________
_____________________
596
Check Point Security Engineering
3.
In the navigation pane, select Network Management:
Figure 492 — Check Point Gateway - Topology
Edit the external interface (eth3).
5. In the Topology section, click Modify.
4.
_____________________
_____________________
597
Check Point Security Engineering
6.
Use the information below to configure the Anti-Spoofing section of the tab:
Anti-Spoofing Action: Detect
Spoof Tracking: None
Figure 493 — Interface Properties - Topology
NOTE
Do not disable anti-spoofing measures in a production environment. In this lab, antispoofing is disabled here to spoof traffic needed to demonstrate IPS features.
_____________________
_____________________
598
Check Point Security Engineering
7.
Click OK, to change the new Anti-spoofing setting:
Figure 494 — Network eth3
Click OK, to close the Security Gateway object.
9. Repeat the previous step for every interface configured on the Alpha Security Gateway Cluster.
8.
_____________________
_____________________
599
Check Point Security Engineering
Configuring IPS Geo Protection
Configure Geo Protection measures to block traffic emanating from and traveling to specific countries.
From SmartConsole, select the Security Policies view.
2. In the navigation pane, select Geo Policy:
1.
Figure 495 — Geo Policy
In the navigation pane, expand the Geo Policy option.
4. Click Gateways.
3.
_____________________
_____________________
600
Check Point Security Engineering
5.
Double-click the A-GW-Cluster object, to view the name of the Geo Policy being enforced:
Figure 496 — Geo Policy
Note the name of the enforced policy.
7. In the navigation pane, select Policy.
8. In the Geo Policy pane, verify that the Edited Policy is the same as the enforced policy that you just
noted in the steps above.
9. Set the Activation Mode to Active.
6.
_____________________
_____________________
601
Check Point Security Engineering
10. Click the Add button, and the system displays the following:
Figure 497 — Geo Protection
11. Use the following information to configure the Geo Protection window:
Country: Iran
Action: Drop
Direction: From and To Country
Track: Log
Figure 498 — Geo Protection Configured
_____________________
_____________________
602
Check Point Security Engineering
12. Click OK, and the system adds Iran to the list of policy specific countries:
Figure 499 — Geo Policy
_____________________
_____________________
603
Check Point Security Engineering
13. Add other countries to the list with specific policy settings, such as Allowing traffic to and from Israel
and the United States but blocking traffic from China:
Figure 500 — Geo Policy
14. Publish the changes to the database.
15. Install the Alpha Access Control and Threat Prevention policies.
16. From the Attacker virtual machine, open a terminal session type the following command at the prompt:
nmap -sS -S 195.170.163.4 -e eth0 -P0 203.0.113.171
17. Press Enter, to generate traffic to A-DMZ from a spoofed address.
_____________________
_____________________
604
Check Point Security Engineering
18. From the Logs & Monitor tab view the Geo Policy logs:
Figure 501 — SmartConsole - Logs & Monitor
_____________________
_____________________
605
Check Point Security Engineering
19. View the details of a Geo-Protection item in the logs:
Figure 502 — Log Detail
20. Reconfigure anti-spoofing on all A-GW-Cluster interfaces.
END OF LAB 7.2
_____________________
_____________________
606
Check Point Security Engineering
Antivirus
The Check Point Antivirus Software Blade protects the network from malware attacks, such as
worms, backdoors, viruses, and trojans. Using threat intelligence from ThreatCloud, Antivirus
generally deals with threats coming into the organization’s network. It scans incoming files
like PowerPoint, Word, or Excel files for malicious signatures. It then updates the ThreatCloud
repository for any newly detected malware found in the system.
Aside from monitoring and classifying files, Antivirus also blocks access to websites with
known connections to malware. The Security Gateway uses its caching mechanisms to verify
URLs. If the Security Gateway is unable to verify the URL, the Antivirus blade sends the URL
to ThreatCloud for verification. If found malicious, Antivirus blocks access to the URL before
any damage can take place.
_____________________
_____________________
607
Check Point Security Engineering
Anti-Bot
A bot is malware which uses stealth mechanisms to remain hidden from Antivirus solutions.
They can arrive into a computer as an infected email attachment or as the result of a drive-by
download from a malicious website.
Once infection occurs, the bot takes control of the computer by connecting to a Command &
Control (C&C) server and awaits instructions from attackers who can remotely execute
routines. These routines include data theft, spam distribution, and other activities that consume
significant computer resource and bandwidth. Attackers also use the bot-controlled computer
to target and infect other computers, in effect creating a botnet. An anti-bot tries to prevent
damages by blocking communications from the C&C server.
The Anti-Bot Software Blade identifies bot-infected machines using the multi-tier ThreatSpect
engine to analyze network traffic. ThreatSpect is a discovery technology that has up-to-minute
update feeds from ThreatCloud. The engine is installed on the gateway and performs three
important tasks:
• Performs a reputation check to verify the IP addresses and drop zones of known C&C
sites with real-time updates of an address list. Security Gateways are constantly
updated with the latest list. However, the ThreatSpect engine may query ThreatCloud to
get more updates. ThreatSpect engine also caches this information to minimize time to
deploy updates.
• Reviews the network signatures of over 2,000 bot families that were detected
previously. It matches the traffic’s behavior with known bot behavioral patterns and
blocks communication to C&C sites. This ensures no sensitive information is stolen or
leaked.
• Searches for suspicious activity by monitoring outgoing mail traffic and
communication patterns. For example, it analyzes outgoing mail to identify spam sent
from the organization. It also monitors if a computer participates in Denial of Service
(DoS) attacks.
Once a bot-infected machine is identified, the ThreatSpect engine blocks outbound
communication to C&C sites to protect sensitive data. However, you will still need
remediation to remove the bot from the network.
L a b 7. 3
Reviewing Threat Prevention Settings and Protections
_____________________
_____________________
608
L
A
B
Reviewing Threat Prevention
Settings and Protections
7.3
Configure your environment to connect to the Internet. Then, review specific threats and protection details.
Once you have done that, test the enabled Anti-Bot and Antivirus settings by attempting to download a test
file.
Ta sks :
• Review Threat Prevention settings and protections.
• Test EICAR file access.
Pe r for ma n c e Ob j ec t ive s:
• Identify specific threat protections used by Check Point Threat Prevention.
• Demonstrate the Anti-bot and Antivirus features of R80.10.
_____________________
_____________________
609
Check Point Security Engineering
Review Threat Prevention Settings 
and Protections
Verify that you have enabled Anti-Bot and Anti-Virus software blades, then investigate the protections.
1.
On A-GUI, edit the A-GW-Cluster object:
Figure 503 — Check Point Gateway - General Properties Configured
_____________________
_____________________
610
Check Point Security Engineering
2.
In the Network Security tab, select the Anti-Bot option, and the system displays the following:
Figure 504 — Anti-Bot and Anti-Virus
3.
Verify that the following option is selected by default:
According to the Anti-Bot and Anti-Virus policy
Click OK.
5. Next, select Anti-Virus.
4.
_____________________
_____________________
611
Check Point Security Engineering
6.
Verify that the General Properties page of the cluster object appears as follows:
Figure 505 — Gateway Cluster Properties - General Properties
_____________________
_____________________
612
Check Point Security Engineering
7.
In the navigation pane, select Anti-Bot and Anti-Virus:
Figure 506 — Check Point Gateway - Anti-Bot and Anti-Virus Configured
8.
In the Check Point ThreatCloud Information section, verify that the following option is selected:
Share anonymous attack information with Check Point ThreatCloud.
9.
Click OK.
_____________________
_____________________
613
Check Point Security Engineering
10. In the navigation pane, select Threat Prevention > Policy:
Figure 507 — Threat Prevention - Overview
_____________________
_____________________
614
Check Point Security Engineering
11. In the navigation pane, click Protections:
Figure 508 — Threat Prevention - Protections
_____________________
_____________________
615
Check Point Security Engineering
12. In the list of protection categories, select Malicious Activity.
13. In the Protections pane, select the Activations tab:
Figure 509 — Protections - Activations
14. Note the default actions for Threat Prevention profile enforcement.
_____________________
_____________________
616
Check Point Security Engineering
15. Right-click and select Prevent for all profiles:
Figure 510 — Malicious Activity Category Edited
16. Note how the enforcement for all profiles changed to Prevent.
17. In the navigation pane, select Policy.
18. Identify which protection profile is being implemented.
_____________________
_____________________
617
Check Point Security Engineering
19. Right-click Alpha_Basic and select Edit, to view its details:
Figure 511 — Profiles
20. Click Close.
21. Publish the changes to the database.
_____________________
_____________________
618
Check Point Security Engineering
22. In the Policy page, click the Install Policy button. The system displays the Install Policy window:
Figure 512 — Install Policy
23. Verify that both the Access Control and Threat Prevention policies are selected for install.
24. Click Install, and the system installs the Threat Prevention policy on the Security Gateway cluster
members.
_____________________
_____________________
619
Check Point Security Engineering
Testing EICAR Access
Now that you have basic protections in place, test your gateway’s current Threat Prevention settings.
On A-Host, launch a web browser, enter “eicar file download” into the search field, and press Enter.
2. Navigate to the EICAR file download page:
1.
Figure 513 — EICAR Download Page
NOTE
The EICAR file is a harmless file used to test anti-virus software.
_____________________
_____________________
620
Check Point Security Engineering
3.
Use HTTP to attempt to download and save the zip versions of the EICAR file to the desktop of AHost. Your attempts should be blocked:
Figure 514 — Page Blocked
_____________________
_____________________
621
Check Point Security Engineering
Once the download attempts are complete, identify the Threat Prevention traffic in the Logs & Monitor
tab of SmartConsole.
5. Consider the following questions:
◦ Why didn’t both EICAR downloads show up as the same type of traffic?
4.
◦ Accept or Detect or Drop?
◦ Why was one of the downloads successful, if the EICAR file simulates a virus?
◦ Did the gateway identify the “virus” even when it was zipped?
◦ Why was the traffic allowed, if the Security Gateway identified the file as a virus?
◦ Did the Security Policy function as designed?
END OF LAB 7.3
_____________________
_____________________
622
Check Point Security Engineering
Sandboxing
Sandboxing is a pre-eminent solution which is used to catch zero-day attacks and APTs. It
allows a file to be hosted and executed in a secured environment, separate from the network.
The file is then observed for suspicious routines. If the file displays any type of malicious
behavior, it is prevented from being released into the network. If found safe, the file will be
released to the network. There are currently two types of sandboxing: OS-level and CPU-level.
O S - L eve l S a n d b ox i n g
Also known as traditional sandboxing, OS-level sandboxing emulates a standard operating
system in an isolated environment to execute and screen files. This ensures that suspicious files
are safely isolated from the company’s production network.
The sandbox simulates the files as if the actual user opened it and monitors it for malicious
routines. If the file shows any suspicious behavior, the sandbox updates Threat Cloud for threat
intelligence sharing and deleting the file.
Traditional Sandboxing Evasion Methods
Attackers have created several tactics to avoid sandbox detection. Some of these known
techniques include:
• Delaying launch of a payload, wherein malicious code executes minutes, hours, days,
or even years after the file has been opened.
• Searching for virtual machine indicators, such as scanning registry keys, running
processes, or disk size to identify a sandbox environment.
• Checking for human interaction activities that are difficult to replicate in a virtual
environment, including page scrolling and mouse clicks.
• Operating system fingerprinting to identify systems, services, and hardware and
software configurations that may be available for exploitation.
C P U - L eve l S a n d b ox i n g
CPU-level sandboxing addresses the limitations of traditional sandboxing by performing CPUlevel inspection to monitor any indication of an exploit method executed in CPU instruction
codes (sets). This solution takes advantage of the fact that although attackers have plenty of
vulnerabilities and malware to choose from, they can only use a handful of exploit methods.
_____________________
_____________________
623
Check Point Security Engineering
The image below shows a typical CPU-Level attack scenario:
Figure 515 — Four Stages of a CPU-Level Attack
1.
2.
3.
4.
Finding Vulnerability — One or more vulnerabilities are discovered in the operating system code or widely used applications like Internet browsers and PDF readers. Potentially,
there can be thousands of software vulnerabilities in a system. By exploiting any of these
vulnerabilities, attackers will inject their logic into the system and trigger an attack.
Using an Exploit Method — Exploits allow the injected logic to manipulate the target
system and run the malicious code. This requires overcoming built-in security controls
implemented by the operating system and the CPU, such as Data Execution Prevention
(DEP) and Address Space Layout Randomization (ASLR). This is the stage where CPUlevel sandboxing examines files for an exploit method and catches it before the shellcode
is executed.
Running a Shellcode — A shellcode is a small payload, typically embedded into a file or
web page. After leveraging one or more exploit methods, the attacker then plants the shellcode into executable memory to trick the system to run it. Retrieving the actual malware,
the shellcode then places it on the infected system.
Running the Malware — Executing the malware completes the infection. This is the
stage where traditional sandboxing discovers if a file shows any suspicious routines. However, it is at this stage where evasion techniques usually manifest, such as when a file
delays execution of its routines in an attempt to hide from the sandbox.
_____________________
_____________________
624
Check Point Security Engineering
Check Point SandBlast Zero-Day Protection
SandBlast Zero-Day Protection is Check Point’s solution for zero-day attacks, APT and similar
threats. It is complemented with a suite of attack visibility tools, such as the Logging and
Monitoring view of SmartConsole and SmartEvent. These tools aid in forensics and help to
reveal how detected malware would have behaved, had it been allowed to run.
Check Point offers SandBlast technology solutions for private network and public cloud
settings. To protect end user systems, Check Point expands SandBlast protection with the
SandBlast Agent.
SandBlast Components
SandBlast has several functional components that work together to ensure that attacks are
prevented in real-time. These components include:
•
•
•
•
Threat Emulation
Threat Extraction
Threat Cloud
Mail Transfer Agent
SandBlast Threat Emulation
The Threat Emulation engine is the sandbox component of SandBlast. It protects the network
against advanced and zero-day attacks by performing both CPU-level and OS-level inspection
of files. Threat Emulation hosts the file in a sandbox environment and examines it on a CPUlevel for any indication of exploit activity. This inspection stops the file from executing any of
its routines, particularly those that attempt to evade detection.
SandBlast Threat Extraction
The SandBlast Threat Extraction engine examines document files and removes any active
contents from the document, while Threat Emulation runs the file in its secured environment.
Active contents include objects such as JavaScript, macros, and links, which cyber criminals
may use to insert their malicious code.
While Threat Emulation runs and inspects files, Threat Extraction provides users with a
sanitized, reconstructed document using only safe elements. This ensures business continuity
and end-user productivity without compromising security.
Threat Extraction is typically used for incoming emails only; however, it can be used for
outgoing emails as well. It supports widely used document file types, such as PDF and MS
Word documents.
_____________________
_____________________
625
Check Point Security Engineering
Threat Extraction and Threat Emulation both work together to secure production networks
while ensuring that business will proceed as usual. However, each component works
differently.
The following table details the differences between Threat Extraction and Threat Emulation:
Threat Extraction
Threat Emulation
Preemptively removes possible malicious
content
Proactively detects threats
Always delivers a file
Delivers file if no threats are detected
Works on MS Office and PDF files
Works on MS Office, PDF, executables, and
archive files
Delivers PDF version of original file or
original format with active content remove
Delivers file with original content
Takes less than a second to complete
Takes minutes to complete (less than 3
minutes)
Assumes that all active content is potentially
malicious
Detects threats and provides a detailed report
of discovered threats
Disables any active functionality in
documents regardless of its intent
Delivers full functionality if no threats are
detected
Table 11: Comparison of SandBlast Threat Extraction and Emulation
Threat Cloud
Check Point Threat Cloud is the back-end platform for intelligence sharing for all Check Point
products and services. This platform consolidates big data, external feeds, and shared learning
from various sources, such as:
• Signature and reputation data from different Check Point systems
• External intelligence sources, along with consumer and endpoint data SandBlast agents
• Data and research from Check Point’s Vulnerability Research and Incident Response
teams
Threat Cloud ensures that SandBlast is up-to-date with information to help protect an
organization’s network against the latest threats.
_____________________
_____________________
626
Check Point Security Engineering
Mail Transfer Agent
Mail Transfer Agent (MTA) functionality in Check Point Security Gateways ensures that full
emulation occurs without any disruption to the business, particularly in the flow of email.
Enabling MTA prevents the possibility of email server timeout during file emulation and
manages the emulation of SMTP traffic. MTA completes and closes the connection with the
source email server and then sends the file for emulation.
With MTA enabled, the gateway manages SMTP traffic via port 25 and holds external emails
with potentially malicious attachments. After emulation is complete, MTA sends the email to
the server in the internal network. The detailed process is shown below:
Figure 516 — MTA Functionality Work Flow
1.
2.
3.
4.
5.
6.
MTA acts as an SMTP server by receiving email from the sender and closing the
connection after the complete email and the attachment is received.
MTA holds the email until Threat Extraction reconstructs a clean copy of the attachment.
MTA sends the attachment to the Threat Emulation sandbox environment for inspection.
MTA stores the original attachment in the Security Gateway and modifies the email by
attaching the clean copy of the attachment, along with a link to the original attachment.
MTA then forwards the modified email to the mail server, which then sends it to the
intended recipient.
If the attachment is found to be malicious after inspection, Threat Emulation deletes the
file, logs the event, notifies the administrator, and updates Threat Cloud.
NOTE
To enable MTA functionality in the Security Gateway, activate the Threat
Prevention Software Blade package which includes Antivirus, Anti-Bot,
and either Threat Extraction or Threat Emulation.
_____________________
_____________________
627
Check Point Security Engineering
SandBlast Appliances
SandBlast appliances can be deployed in two modes:
• Inline or Prevent — As a Mail Transfer Agent (MTA) and as part of the web traffic
flow.
• Detect Only — A SPAN port to receive a copy of traffic.
A SandBlast appliance includes the Anti-Bot, Antivirus, Threat Emulation and Threat
Extraction Software Blades. However, it is recommended to use the appliance exclusively for
OS-level sandboxing and CPU-level detection.
Organizations that prefer not to allow files to be sent outside of the corporate network or those
that have a large centralized network architecture requiring high performance and low latency,
may opt for deploying a SandBlast private cloud option. Solution architectures vary depending
in cases such as:
• Customers with Check Point Security Gateways running R77 and above, and with the
Next Generation Threat Prevention (NGTP) package activated.
• Customers with Check Point gateways below R77 or no NGTP package, or with third
party gateways.
• Customers that are evaluating SandBlast prior to installing it.
_____________________
_____________________
628
Check Point Security Engineering
Prevent Mode
When a SandBlast appliance is deployed in Prevent mode, traffic (or an attached file) is sent to
the appliance before it is allowed to enter the internal network. This deployment requires that
the MTA feature in the Security Gateway is enabled.
Prevent mode is also recommended for Proof-of-Concept (POC) scenarios where the customer
is using either a third-party Firewall or an older version of Check Point software. Customers
with no Next Generation Threat Prevention (NGTP) package would also benefit from this type
of deployment.
Figure 517 — SandBlast Appliance in Prevent Mode
_____________________
_____________________
629
Check Point Security Engineering
The detailed workflow of the SandBlast appliance in Prevent mode architecture is:
1.
2.
3.
4.
5.
6.
The attacker sends an email with an attached file.
The Check Point Security Gateway with MTA enabled holds the email.
Threat Extraction reconstructs a safe copy of attachment, and forwards it to the mail
server. The recipient receives the email and safe copy without any delay.
Threat Emulation forwards the attachment to OS-level sandboxing and CPU-level detection within the SandBlast Appliance.
The SandBlast appliance inspects the file. If the file is found malicious, SandBlast updates
ThreatCloud with the information. The file is marked infected and deleted from the MTA
holding area of the Check Point Security Gateway.
If the SandBlast appliance determines the file is harmless, the original file is released to
mail server.
_____________________
_____________________
630
Check Point Security Engineering
Detect Only Mode
For users who want to perform an evaluation first, the SandBlast appliance can be configured
to Detect Only mode or SPAN port deployment to monitor zero-day attacks. In this scenario,
duplicate traffic is sent to the SandBlast appliance while real traffic enters the internal network,
passing through the Security Gateway. Using the MTA feature is not required in this
deployment.
Figure 518 — SandBlast Appliance in Detect Only Mode
The SandBlast appliance Detect Only mode architecture works as follows:
1.
2.
3.
4.
5.
An attacker sends the email with an attachment.
The Check Point Security Gateway or a third-party gateway uses a mirror or TAP port to
duplicate network traffic, sending it to the SandBlast appliance.
The gateway performs a traditional security inspection and permits traffic to enter the network.
The user receives the original email without any delay.
Threat Emulation forwards the attached file to the SandBlast appliance for OS-level sandboxing and CPU-level detection. If the file is found malicious, SandBlast updates ThreatCloud with the new malware and the system administrator is notified of the infection.
_____________________
_____________________
631
Check Point Security Engineering
SandBlast Cloud
SandBlast Cloud performs OS-level sandboxing and CPU-level detection in a Check Point
controlled, public cloud infrastructure. This solution requires no new hardware and is ideal for
users who want to use their existing gateways, have a globally distributed network, or have
high usage of cloud-based or Software-as-a-Service (SaaS) applications. The detailed
workflow of the SandBlast Cloud architecture is as follows:
1.
2.
3.
4.
5.
6.
An email is sent with a malicious attachment.
Check Point Security Gateway with enabled MTA holds the email.
Threat Extraction constructs a clean copy of the attachment in PDF format and forwards it
to the mail server. The recipient receives the email with the PDF copy without delay.
Using the MTA service, Threat Emulation forwards the email to SandBlast Cloud for OSlevel sandboxing and CPU-level detection.
If the file is identified as zero-day malware, SandBlast Cloud updates ThreatCloud with
the new information. The file is marked as infected and deleted from the MTA holding
area in the Security Gateway.
If SandBlast Cloud determines the file to be harmless, it is then released to the mail server.
Figure 519 — SandBlast Cloud Architecture
_____________________
_____________________
632
Check Point Security Engineering
Check Point SandBlast Cloud provides zero-day protection for organizations transitioning to
cloud-based applications. The SandBlast Cloud includes the following security elements:
• Antivirus — Proactively leverages Antivirus signatures to protect against malware in
attached files.
• URL Reputation — Detects and blocks malicious URLs within email body.
• Threat Extraction — Delivers safe, reconstructed copies of documents to users while
inspecting the original files for potential threats.
• Threat Emulation — Forwards inbound email file attachments, including files
originating from URLs within emails, to the sandbox for emulation. It detects and
blocks the file if verified to be malicious or a component of a zero-day attack.
SandBlast Cloud can be deployed in Detect mode, Prevent mode or as a Hybrid.
SandBlast Cloud in Detect Mode
In Detect mode, incoming emails go straight to the inbox without interference, while
attachments are sent to SandBlast Cloud for inspection. This is the ideal mode for introducing
visibility into threats while gradually deploying solution.
SandBlast Cloud in Prevent Mode
In Prevent mode, incoming emails are directed to a temporary quarantine folder within Office
365 to isolate incoming emails from the user inbox. This ensures emails containing malicious
attachments, contents, and URLs will not reach end users.
In the case of a false positive, in which a user determines that the email is from a trusted
source, the email and content can be retrieved from the quarantine folder.
_____________________
_____________________
633
Check Point Security Engineering
Hybrid Deployment
Organizations with an on-premise Exchange server and Cloud Office 365 can use the
following options for a hybrid deployment:
• Exchange mail – Use the Check Point Security Gateway with a Next Generation
Threat Extraction Software Blade license, and use either SandBlast Cloud or appliance
for Threat Emulation.
• Microsoft Office 365 – Subscribe to Check Point SandBlast Cloud security as a
service.
To consolidate logging and have both solutions send logs to the same on-premise SmartLog or
SmartEvent server, users can configure the Log Transfer Agent (LTA) in the Check Point
SandBlast Cloud dashboard.
Exchange Server as MTA Agent
Using an exchange server agent as an MTA agent is the best option for administrators who
want to simplify the mail-holding design during SandBlast implementation. This allows them
to use their existing Exchange agent to hold all corporate email, while Check Point SandBlast
certifies it as safe.
_____________________
_____________________
634
Check Point Security Engineering
SandBlast Agent
SandBlast Agent extends SandBlast protection to end-user systems, such as desktops and
laptops. It is designed to defend endpoint devices and web browsers.
If malware enters an end user’s system, the SandBlast Agent uses its local version of Anti-Bot
to detect and contain these infections. It searches for any Command and Control (C&C)
communication sent over the network. To prevent the malware from spreading within the
network, SandBlast Agent blocks any communication from the affected computer and
quarantines the infected files.
Forensics Analysis
The SandBlast Agent features automated forensic analysis that generates extensive reporting
and diagnostics of security events for faster response against attacks. It shows threat details,
such as arrival method, attack flow, business impact, and infected hosts.
Figure 520 — SandBlast Agent Work Flow
_____________________
_____________________
635
Check Point Security Engineering
To create this report, the SandBlast Agent performs the following:
1.
2.
3.
4.
The SandBlast Agent collects forensics data continuously on the endpoint in a tamperresistant area. This provides full visibility into activity throughout the attack lifecycle, and
requires minimal overhead. The data is stored for a 30-day window by default, but can be
adjusted. Because the agent only records events, it requires less than 1% of CPU resources
and 1 GB of storage.
An Incident report can be triggered by a number of events, including input from SandBlast
Agent, Threat Emulation, Threat Extraction, and other enabled Software Blades.
Raw forensic data are analyzed using advanced algorithms. The SandBlast Agent automatically requests logs from involved endpoints.
Finally, the SandBlast Agent generates a complete view of attacks, including point of
entry, business impact, and full attack flow. The Incident report is sent to SmartEvent.
Aside from providing comprehensive threat reporting, the SandBlast agent recommends
actionable information that can help in the implementation of remediation measures.
Since forensic analysis happens automatically, security response teams do not need to spend
hours building the information from the ground up. The SandBlast Agent enables these teams
to work efficiently and address threats as they unfold.
Figure 521 — SandBlast Agent Forensic Analysis
_____________________
_____________________
636
Check Point Security Engineering
SandBlast Deployment
SandBlast offers businesses flexibility in implementation based on individual business needs,
structure and requirements. You can use a dedicated SandBlast appliance, where Threat
Emulation and Threat Extraction are done in a private, secured cloud environment, or
combined with SandBlast Cloud.
Check Point SandBlast Zero-Day Protection can be deployed as:
• Public Cloud Service — SandBlast Cloud
• Private Cloud — SandBlast Appliance
• Hybrid Solution – SandBlast Appliance and Cloud
Public Cloud Service
In the SandBlast Cloud or Public Cloud Service, OS-level sandboxing and CPU-level
detection are done in a public cloud infrastructure (SandBlast Cloud), which is owned and
operated by Check Point with data centers distributed globally. There is no need to install new
hardware onsite. SandBlast can be up and running within minutes.
It is possible to choose to which public cloud location the files should be sent for detection. If
this is not in accordance to your company regulations, the private cloud solution can be used.
However, this means that you will need to have a dedicated appliance on premise and the files
will not leave the company for checking. Changing the cloud location can be done via the
tecli command.
P r i va te C l o u d
In the Private Cloud solution, OS-level sandboxing and CPU-level detection are done in the
Check Point SandBlast appliance and deployed in a private cloud – inside the customer’s
network. The SandBlast appliance option is best for organizations that have a policy against
sending a file outside the corporate network. A SandBlast appliance has Antivirus, Anti-Bot,
Threat Extraction, and Threat Emulation blades; however, it is highly recommended to use it
solely for OS-level sandboxing and CPU-level detection.
_____________________
_____________________
637
Check Point Security Engineering
H y b r i d S ol u t i o n ( S a n d B l as t A p p l i a n c e a n d C l o u d )
In a hybrid solution, OS-level sandboxing and CPU-level detection work together in both
private and public cloud infrastructures. Administrators can choose which files to emulate
locally in the SandBlast appliance or in the public SandBlast Cloud.
This setup is ideal for companies with a distributed architecture, in which most of their
employees work in a regional or global headquarters environment, while others work from
various satellite offices. With a hybrid solution, the organization can deploy a SandBlast
appliance at its headquarters, and support satellite offices using the SandBlast Cloud.
In a hybrid solution, the Threat Prevention tasks are distributed as follows:
• Check Point Security Gateways perform traditional Next Generation Threat Prevention
duties (Anti-Bot, Antivirus, and Anti-Spam) and also act as an MTA to hold emails.
• Threat Extraction can happen either at the Security Gateway or SandBlast appliance.
• Threat Emulation with OS-level sandboxing and CPU-level detection happens either
with SandBlast appliance or SandBlast Cloud.
A distributed architecture is an efficient way to utilize the Check Point SandBlast solution.
However, it comes with the challenge of provisioning and managing multiple MTAs. Check
Point User Center can help customers with these complex security architectures.
_____________________
_____________________
638
Check Point Security Engineering
SandBlast Mobile
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloudbased algorithms. Once a threat is detected, it triggers an automatic response to keep mobile
devices and data safe.
SandBlast Mobile can analyze behavior across several attack vectors, namely:
• OS-Level Exploits — These are exploits that target mobile operating systems.
SandBlast Mobile examines the device for any signs of weaknesses, such as vulnerable
versions of Open SSL (for Android) or CA certificate, proxy, or VPN configuration (for
Apple).
• Mobile Application Malware — This is malicious codes hidden in mobile
applications.
• Network Attacks — These are attacks on network connections. SandBlast Mobile
detects Man in the Middle (MiTM) attacks on public Wi-Fi hotspots by validating the
integrity of an SSL connection. It also verifies connection security by using a cloudbased honeypot that detects if a malicious actor uses an MiTM attack to break a
connection.
• SMS Phishing — Also known as Smishing, this attack vector uses Short Message
Service (SMS) systems to send text messages with malicious links to coax mobile
device users into divulging personal information such as passwords, social security
numbers, and credit card details. The SandBlast Mobile solution can detect SMS
phishing scams by scanning incoming SMS messages for malicious URLs.
Aside from securing these vectors, SandBlast Mobile employs its own dynamic cloud-based
sandbox to examine and reveal the vulnerabilities and exploits hiding in mobile applications. It
also whitelists trustworthy applications that show behaviors typically associated with mobile
threats. To whitelist these applications, it correlates risk analysis data with aggregated factors
such as application developer reputation, the number of downloads, and application source.
This allows end users to download the applications they need without intervention from their
company’s security team.
SandBlast Mobile is capable of advanced code analysis by automatically capturing and
reverse-engineering applications to expose code and deconstruct flows for semantic analysis.
This helps identify suspicious patterns and behaviors.
SandBlast Mobile also determines risk scores for devices, which are regularly updated once
new findings are uncovered. This continuous analysis provides organizations an up-to-date and
accurate picture of mobile threats in their network, as well as detailed information about what
is being done to mitigate those risks.
_____________________
_____________________
639
Check Point Security Engineering
SandBlast Mobile Components
SandBlast Mobile has four dedicated components that constantly work together to protect
mobile devices and their data. The constant communication between these components ensures
that you are informed of any suspicious activities and threats occurring in the device. The
components are:
•
•
•
•
SandBlast Mobile Protect Application
Behavioral Risk Engine
SandBlast Mobile Dashboard
SandBlast Mobile Gateway
Figure 522 — SandBlast Mobile Components
The SandBlast Mobile Protect Application
SandBlast Mobile Protect is a lightweight mobile application that gathers data and helps
analyze threats to the mobile device. The application monitors the mobile operating system,
application information, and network connections. It also provides data to the mobile Threat
Prevention solution, which is used to identify suspicious or malicious behavior. The
application examines critical risk indicators found in the data it collects. It does not collect or
examine sensitive data such as content or files.
_____________________
_____________________
640
Check Point Security Engineering
To minimize use of device resources and bandwidth, SandBlast Mobile Protect performs some
of its analyses on the device, while resource-intensive analyses are performed in the cloud.
Figure 523 — SandBlast Mobile Protect Application
The Behavioral Risk Engine
The cloud-based Behavioral Risk Engine (BRE) receives information sent by the SandBlast
Mobile Protect application, which includes the device’s network, configuration, operating
system integrity, and metadata related to the installed applications. It harnesses this data to
perform an in-depth mobile threat analysis. This analysis helps detect and monitor possible
dubious activities on the device.
The BRE generates a risk score based on threat type and severity. The risk score determines if
and what mitigation is needed to keep the device and its data protected. Once a threat is
identified, it triggers the SandBlast Mobile Protect application to notify the end user of the risk
level and possible mitigating actions.
_____________________
_____________________
641
Check Point Security Engineering
The SandBlast Mobile Dashboard
The cloud-based SandBlast Mobile dashboard helps you manage and monitor devices and
policies. It is configured as a per-customer instance.
This dashboard can be integrated with an existing Mobile Device Management/Enterprise
Mobility Management solution for automated policy enforcement on at-risk devices. When
integrated, the Mobile Device Management/Enterprise Mobility Management serves as a
repository on which the dashboard synchronizes enrolled devices and identities.
Using the dashboard, you can register new devices using personal information such as a user’s
name, email address, and phone number. The personal information is processed by the
dashboard and may also be stored in the dashboard.
Figure 524 — SandBlast Mobile Dashboard
The SandBlast Mobile Gateway
The cloud-based SandBlast Mobile gateway is a multi-tenant architecture to which mobile
devices are registered. It handles all solution communications with enrolled mobile devices.
The gateway also stores data elements, such as the unique identifier of the registered device
and application certificates that may be viewable per customer instance from the organization’s
dashboard. Personal information is not processed by or stored in the gateway.
_____________________
_____________________
642
Check Point Security Engineering
S a n d B l a s t M o b i l e Wo rk fl ow
The SandBlast Mobile Threat Prevention solution and its components protect mobile devices
from advanced mobile malware, spyware, viruses, and other threats. Below is a detailed
workflow of how the components work together.
Figure 525 — SandBlast Mobile Components Workflow
1.
2.
3.
4.
5.
6.
7.
8.
9.
The SandBlast Mobile Protect application detects changes in applications or network connections with possible MiTM vulnerability.
SandBlast Mobile Protect sends encrypted artifacts to the SandBlast Mobile gateway
using SSL.
The gateway receives data from the device. The gateway process application list is compared to known Application Risk Assessment based on application_id.
The gateway aggregates application artifacts for identification and analysis. It retrieves the
copy of the application online or from the device if not available online.
The BRE initiates the analysis to identify the risk type and assess severity of the risk.
The BRE assigns a risk score to the specific application_id.
Analysis results and application metadata are stored in the BRE database. The BRE sends
out a risk score and application_id to the gateway.
The gateway evaluates risk, score, and application_id. If malicious, it sends a warning to
the SandBlast Mobile Dashboard.
The dashboard sends an alert to SandBlast Mobile Protect. The dashboard also alerts the
company’s Mobile Device Management/Enterprise Mobility Management, so long as they
are configured to do so.
_____________________
_____________________
643
Check Point Security Engineering
L a b 7. 4
Deploying Threat Emulation and Threat Extraction
_____________________
_____________________
644
Deploying Threat Emulation 
and Threat Extraction
L
A
B
7.4
Sometimes it’s a good idea to inspect files for viruses before sending them to external users, such as
partners, to verify that the files pose no threats. Upload files to the Check Point ThreatCloud for inspection.
Then, to handle threats entering the network, configure your Security Gateway to perform Threat
Emulation functions to identify and stop zero-day attacks.
Ta sks :
• Use ThreatCloud to verify file safety.
• Configure Threat Emulation to inspect incoming traffic.
Pe r for ma n c e Ob j ec t ive s:
• Upload a file for Threat detection and emulation.
• Configure Threat Emulation.
_____________________
_____________________
645
Check Point Security Engineering
Use ThreatCloud to Verify File Safety
Upload a file to the ThreatCloud Emulation Service to confirm it is safe to send.
1.
From the A-Host virtual machine, locate the following file on the desktop:
Safe.pdf
2.
Launch a Web browser and navigate to the following site:
https://www.checkpoint.com/threat-prevention-resources/
Figure 526 — Check Point ThreatCloud Emulation Service - Login Page
3.
Click the icon for the following page:
Emulate A File For Malicious Behavior
_____________________
_____________________
646
Check Point Security Engineering
4.
In the Username and Password fields, enter your User Center account login information.
NOTE
If you have not already created a User Center account, do so now. Visit
www.checkpoint.com. Next, select Support/Services and click Enter Support Center.
Click the Sign Up Now button and enter the requested information. Your user center
account should always be created with your work email address.
5.
Click the Go icon.
NOTE
The Upload page may not be visible from all versions of all browser. If you do not
see this page, attempt these steps with an updated Internet Explorer or Chrome
browser.
6.
7.
8.
9.
10.
11.
Click the Choose File button, and the system displays the following window.
Browse to the Safe.pdf file.
Select Safe.pdf, and click Open. The system adds the selected file to the Selected File field.
Click the Upload & Test button, and the system uploads the file to ThreatCloud to be evaluated.
Once the file has been evaluated, the system displays the Results page.
Close the Browser window.
_____________________
_____________________
647
Check Point Security Engineering
Configure Threat Emulation to Inspect Incoming
Traffic
Configure the Security Gateway Cluster to send incoming files for review to the Check Point ThreatCloud.
In SmartConsole, edit the Security Gateway Cluster object.
2. In the Network Security tab, select Threat Emulation. The system displays the Threat Emulation First
Time Activation wizard:
1.
Figure 527 — Threat Emulation First Time Activation - Emulation Location
3.
Verify that the following option is selected:
ThreatCloud Emulation Service
_____________________
_____________________
648
Check Point Security Engineering
4.
Click Next, and the system displays the following:
Figure 528 — Threat Emulation First Time Activation - Compatibility
NOTE
If the system displays an error and the next button is grayed out, this may be the
result of an expired IPS contract. If this happens, it will not negatively affect the lab.
Select the option to Ignore the error and continue. Then click Next.
5.
Verify that you have Internet connectivity by launching a browser on A-GUI, and navigating to the
following site:
www.CheckPoint.com
_____________________
_____________________
649
Check Point Security Engineering
6.
Click Next, and the system displays the following:
Figure 529 — Threat Emulation First Time Activation - Summary
_____________________
_____________________
650
Check Point Security Engineering
7.
Click Finish, and the system shows that Threat Emulation is now configured on the Security Gateway
object:
Figure 530 — Check Point Gateway - General Properties Configured
8.
Click OK.
_____________________
_____________________
651
Check Point Security Engineering
Since you have modified the configuration of the Security Gateway Cluster object, publish and install
the Security Policy.
10. In the Security Policies tab, select the Threat Prevention > Policy:
9.
Figure 531 — Threat Prevention Policy Rule Base
_____________________
_____________________
652
Check Point Security Engineering
11. Edit the Optimized profile.
Figure 532 — Optimized Profile
_____________________
_____________________
653
Check Point Security Engineering
12. In the navigation pane, select Threat Emulation Settings:
Figure 533 — Threat Emulation Settings
13. Verify that the following Protected Scope option is selected:
Inspect incoming files from External and DMZ interfaces
_____________________
_____________________
654
Check Point Security Engineering
14. In the navigation pane, expand the Threat Emulation Settings branch.
15. Select Emulation Environment, and the system displays the following:
Figure 534 — Emulation Environment
16. In the Analysis Location section of the page, select Specify > Check Point ThreatCloud.
_____________________
_____________________
655
Check Point Security Engineering
17. In the navigation pane, select Advanced:
Figure 535 — Advanced
18. Verify that the Emulation Connection Handling Mode selected is as follows:
Background - connections are allowed until emulation handling is complete
19. Click OK to save the new profile.
Figure 536 — SmartConsole
_____________________
_____________________
656
Check Point Security Engineering
20. Verify that the Threat Emulation icon appears in the Internal Network
Figure 537 — Threat Prevention Policy Rule Base Configured
_____________________
_____________________
657
Check Point Security Engineering
21. Install the Threat Prevention policy:
Figure 538 — Threat Prevention Policy Installation
22. Click Close.
END OF LAB 7.4
_____________________
_____________________
658
Check Point Security Engineering
Review Questions
1.
How does SandBlast Threat Emulation and Threat Extraction prevent threats like zero-day
attacks and APT?
2.
How does IPS complement the Firewall Software Blade when it comes to preventing
threats?
_____________________
_____________________
659
Check Point Security Engineering
Questions and Answers
A
P
P
E
N
D
I
X
A
End of chapter review questions are answered in this Appendix.
_____________________
_____________________
660
Check Point Security Engineering
Chapter 1
S y s te m M a n a g e m e n t
1.
What is CPUSE and what is it used for?
CPUSE is Check Point’s Update Service Engine. It is used to support the deployment of
single hotfixes, hotfix accumulators, and major version upgrades.
2.
Name at least three Stateful features provided with the Connection table.
Streaming based applications, such as Web security
Sequence verification and translation
Hide NAT
Logging, accounting, and monitoring
Client and server identification
Data connections
_____________________
_____________________
661
Check Point Security Engineering
Chapter 2
Autom a t i o n a nd O rc h e s t r a t i o n
1.
What are the four command sources which allow you to communicate with the management server using management API?
The four command sources which allow you to communicate with the management server
using management API are:
The SmartConsole GUI
The mgmt_cli tool
Gaia CLI
Web Services
2.
What does the sid command string identify?
The sid command string identifies the session unique identifier.
_____________________
_____________________
662
Check Point Security Engineering
Chapter 3
Red u n d a nc y
1.
What happens when the Sticky Decision Function (SDF) is enabled?
A connection is sticky when all of its packets are handled, in either direction, by a single
cluster member. The SDF enables certain services to operate in a Load Sharing
deployment. VPN deployments with 3rd party VPN peers and Endpoint Connect/SSL
Network Extender encrypted connections are both supported when SDF is enabled.
2.
Describe what a cluster VMAC is and how it works.
Cluster Virtual MAC (VMAC) is a virtual MAC address assigned to a Virtual Router. It is
a variation of the High Availability New mode and Load Sharing Unicast mode.
Configuring the cluster to use VMAC mode allows all cluster members to use the same
Virtual MAC address and minimizes possible traffic outages during a failover. In addition,
G-ARPs for NAT’d addresses are no longer needed.
_____________________
_____________________
663
Check Point Security Engineering
Chapter 4
Ac c e l e r a t i o n
1.
Describe the three paths of traffic flow for SecureXL.
Firewall path — Packets and connections that are inspected by the Firewall. These
packets and connections are not processed by SecureXL.
Accelerated path — Packets and connections that are offloaded from the Firewall to
SecureXL. These packets and connections are quickly processed.
Medium path — Packets that cannot use the accelerated path because they require deeper
inspection. Although it is not necessary for the Firewall to inspect these packets, they can
be offloaded by another feature. For example, packets that are examined by IPS cannot
use the accelerated path and can be offloaded to the IPS Passive Streaming Library (PSL),
which provides stream reassembly for TCP connections. As a result, SecureXL processes
these packets quicker than packets on the slow path.
2.
How does CoreXL improve network performance?
CoreXL acts as a load balancer and improves Security Gateway performance in situations
where much of the traffic cannot be accelerated by SecureXL or when the gateway has
many IPS features enabled, which disables SecureXL functionality. It also improves
performance for gateways with a large Rule Base and/or NAT rules.
3.
When should you consider using Multi-Queue?
Check Point recommends configuring Multi-Queue when the following conditions are
presented:
The CPU load for SND is high (idle is < 20%).
The CPU load for CoreXL Firewall instances is low (idle is > 50%).
There are no CPU cores left to be assigned to the SND by changing interface affinity.
_____________________
_____________________
664
Check Point Security Engineering
Chapter 5
S m a r t E ven t
1.
What are the main components of the SmartEvent Architecture?
Check Point Security Gateway
Log server
Correlation unit
SmartEvent server
Events database
SmartEvent client
2.
Explain how SmartEvent identifies an event.
SmartEvent retrieves logs from Log servers and searches for patterns. The Correlation
Unit scans logs for criteria that match an event definition. SmartEvent uses the following
procedures to identify events:
• Match a log against global exclusions
• Match a log against each event definition
• Create an event candidate
3.
How would a System Administrator reduce the number of false positives?
To eliminate false positives, change the thresholds and other criteria of an event. For
example, increase the number of connections, logs, or failures and/or the period of time
for them to occur.
_____________________
_____________________
665
Check Point Security Engineering
Chapter 6
Rem o te a n d M o b i l e Ac c e s s
1.
What is the difference between an SSL VPN and an IPSec VPN?
In the SSL VPN solution, users can connect securely to business web-based applications
through a web portal, which can be accessed using a web browser. This solution does not
require users to install a VPN agent or client and can be configured to enforce two-factor
authentication.
IPSec, Layer 3 VPN requires remote workers to install a VPN client before gaining access
to corporate resources. Once a user installs the client, the Layer 3 VPN provides a secured
connection to both web-based and native business applications.
2.
How do Capsule Docs and Capsule Workspace work together?
As business documents are edited and viewed on personal devices using Capsule
Workspace, Capsule Docs protects business data and documents no matter where it is
transmitted.
_____________________
_____________________
666
Check Point Security Engineering
Chapter 7
T h r e a t P r eve n t i o n
1.
How does SandBlast Threat Emulation and Threat Extraction prevent threats like zero-day
attacks and APT?
To prevent these threats, Threat Emulation performs CPU-level inspection of incoming
files to look for signs of exploit methods. It runs the inspection in a sandbox environment,
away from the organization’s network. If files exhibit malicious routines, Threat Emulation
deletes them promptly.
While Threat Emulation performs the inspection, Threat Extraction provides a clean,
sanitized version of the file. This is to avoid any disruption to the company's daily
operations.
2.
How does IPS complement the Firewall Software Blade when it comes to preventing
threats?
While Firewall blocks network traffic based on source, destination, and port information,
IPS analyzes its contents. This is to prevent threats such as drive by download, which are
known to hide malicious codes behind hijacked, legitimate websites.
_____________________
_____________________
667
Download