SECURITY ENGINEERING S t u d e n t & L a b R 8 0 . 1 0 M a n u a l © 2017 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and de-compilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to the Third Party copyright notices (http:// www.checkpoint.com/ 3rd_party_copyright.html) for a list of relevant copyrights and third-party licenses. International Headquarters 5 Ha’Solelim Street U.S. Headquarters 959 Skyway Road, Suite 300 San Carlos, CA 94070 Tel Aviv 67897, Israel Tel: +972-3-753 4555 Tel: 650-628-2000 Technical Support, Education & Professional Services 6330 Commerce Drive, Suite 120 Irving, TX 75063 Tel: 972-444-6612 E-mail comments or questions about our courseware to: courseware@us.checkpoint.com For questions or comments about other Check Point documentation, e-mail: CP_TechPub_Feedback@checkpoint.com Document # DOC-Manual-CCSE-R80.10 Revision R80.10 v4 Content Joey Witt, Vanessa Johnson Graphics Chunming Jia, Vanessa Johnson Contributors Beta Testing, Content Contribution, or Technical Review Michael Adjei - Wick Hill - United Kingdom Chris Alblas - QA - England Eric Anderson - Netanium - USA Michael Curtin - ContentWise - Australia Piotr Czopik - CLICO - Poland Brent Denny - Dimension Data Learning Solutions - Australia Valery Fraerman - Diona Master Lab - Russia Alfred Goh - M.Tech Products - Singapore Desmond Gooh - M.Tech Products - Singapore Tim Hall - Shadow Peak - USA Oliver Jantz - Arrow ECS - Germany Mario Jehmlich - Arrow ECS - Germany Anthony Joubaire - Arrow ECS - France Sanjay Kanesamoorthy - Red Education - Australia Arno Kobarg - Red Education - Australia Alfred Koebler - Westcon - Germany Yasushi Kono - Arrow ECS - Germany Fabrizio Lamanna - Check Point Software Technologies - USA Jani Lindner - S&T - Slovenia Dries Mertens - Westcon - Belgium Carlos Moncayo - Rese - Colombia Thomas Norbeck - Glasspaper - Norway Richard Parkin - Arrow ECS - England Jigarkumar Patel - Check Point Software Technologies - USA Mika Rantanen - Hawkware Training - Finland Jason Ross - Red Education - Australia Niklas Savstrom - Infinigate - Sweden Fedor Tsyganov - Softline Group - Russia Madhava V - ITecSys Technologies - India Sandra Van Loon - Avent - The Netherlands Erik Wagemans - Proximus ICT Academy - Belgium Special Thanks: Glen Bayless - Check Point Software Technologies - USA Fabrizio Lamanna - Check Point Software Technologies - USA Kim Winfield - Check Point Software Technologies - USA Daniel Storey - Red Education - Australia (Sydney Beta Host) Kia Wentzel - Arrow ECS - Finland (Helsinki Beta Host) Certification Exam Development: Jason Tugwell Check Point Technical Publications Team: Uri Lewitus, Daly Yam, Eli Har-Even, Paul Grigg, Rachel Teitz, Ronit Segal, Shira Rosenfeld, Yaakov Simon, Devora Hosseinof Table of Contents Preface: Security Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Check Point Security Engineering Course ................................................................................................... 13 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Course Chapters and Learning Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Lab Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Related Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Chapter 1: System Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Advanced Gaia ............................................................................................................................................. 17 Gaia Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Upgrades ....................................................................................................................................................... 21 Upgrade Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Advanced Upgrade with Database Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Lab 1.1: Upgrading to R80.10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Migrating Management Server Data ............................................................................................................ 25 Installing the Security Management Server .................................................................................................. 38 Configuring Security Management Server Using the Gaia Portal ............................................................... 43 Installing SmartConsole ............................................................................................................................... 59 Importing the Check Point Database ............................................................................................................ 66 Launching SmartConsole and Reconfiguring Existing Security Policies .................................................... 73 END OF LAB 1.1 88 Hotfixes ........................................................................................................................................................ 89 The CPUSE Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 The Central Deployment Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Lab 1.2: Applying Check Point Hotfixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Installing the Hotfix on the Security Gateways ............................................................................................ 95 END OF LAB 1.2 102 4 Check Point Security Engineering Lab 1.3: Configuring a New Security Gateway Cluster . . . . . . . . . . . . . . . . . . . . . . . 103 Installing a Second Security Gateway ........................................................................................................ 104 Configuring the Bravo Security Gateway with the First Time Configuration Wizard .............................. 113 Using the Gaia Portal to Configure the Security Gateway ......................................................................... 124 Re-configuring the Primary Gateway ......................................................................................................... 135 Configuring the Alpha Security Policy to Manage the Remote Security Gateway Cluster ....................... 146 END OF LAB 1.3 182 CLI Commands .......................................................................................................................................... 183 CPInfo ........................................................................................................................................................ 191 Lab 1.4: Core CLI Elements of Firewall Administration . . . . . . . . . . . . . . . . . . . . . 193 Managing Policy and Verifying Status from the CLI ................................................................................ 194 Using cpinfo ............................................................................................................................................... 196 Reconfiguring the Security Policies ........................................................................................................... 207 Using fw monitor ........................................................................................................................................ 211 Using tcpdump ........................................................................................................................................... 218 END OF LAB 1.4 219 Advanced Firewall ..................................................................................................................................... 220 Check Point Firewall Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 The Firewall Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Packet Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Chain Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Lab 1.5: Viewing the Chain Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Evaluating the Chain Modules ................................................................................................................... 231 Modifying the Security Policy ................................................................................................................... 233 Reviewing Changes to the Chain Modules ................................................................................................ 237 END OF LAB 1.5 246 Stateful Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Security Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Kernel Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Policy Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Rule Matching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Network Address Translation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Firewall Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 5 Check Point Security Engineering Lab 1.6: Configuring Manual Network Address Translation . . . . . . . . . . . . . . . . . . 271 Configuring the Security Policy ................................................................................................................. 272 Configuring the ARP Table ........................................................................................................................ 283 Reconfigure the Alpha Rule Base .............................................................................................................. 291 END OF LAB 1.6 293 Review Questions ....................................................................................................................................... 294 Chapter 2: Automation & Orchestration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Automation & Orchestration ...................................................................................................................... 296 Check Point APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Check Point API Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Management API Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Management API Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 Lab 2.1: Managing Objects Using the Check Point API . . . . . . . . . . . . . . . . . . . . . . 308 Configuring the Check Point API .............................................................................................................. 309 Defining and Editing Objects in the API .................................................................................................... 312 END OF LAB 2.1 321 Review Questions ....................................................................................................................................... 322 Chapter 3: Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Advanced ClusterXL .................................................................................................................................. 324 Load Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Proxy ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 VMAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Cluster Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Cluster Connectivity Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Add a Member to an Existing Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Sticky Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333 Management High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 OPSEC Certified Clustering Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 Lab 3.1: Deploying a Secondary Security Management Server . . . . . . . . . . . . . . . . 339 Installing the Secondary Management Server ............................................................................................ 340 Configuring Management High Availability ............................................................................................. 344 Testing Management High Availability ..................................................................................................... 350 END OF LAB 3.1 364 VRRP Clusters ........................................................................................................................................... 365 VRRP Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 6 Check Point Security Engineering Lab 3.2: Enabling Check Point VRRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Viewing ClusterXL Failover ...................................................................................................................... 371 Defining a Virtual Router for VRRP .......................................................................................................... 375 Configuring the Security Policy for VRRP ................................................................................................ 387 END OF LAB 3.2 395 Review Questions ....................................................................................................................................... 396 Chapter 4: Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 SecureXL: Security Acceleration ............................................................................................................... 398 Using SecureXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398 Packet Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Session Rate Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 SecureXL Connection Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Packet Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 VPN Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Lab 4.1: Working with SecureXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 Identifying Status of Current Connections ................................................................................................. 407 END OF LAB 4.1 412 CoreXL: Multicore Acceleration ................................................................................................................ 413 Using CoreXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 Processing Core Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Dynamic Dispatcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 Packet Flow with CoreXL and SecureXL Enabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 Multiple Traffic Queues ............................................................................................................................. 421 Using Multi-Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421 Lab 4.2: Working with CoreXL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 Enabling CoreXL ....................................................................................................................................... 425 Reviewing CoreXL Settings ....................................................................................................................... 433 END OF LAB 4.2 434 Review Questions ....................................................................................................................................... 435 Chapter 5: SmartEvent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436 The SmartEvent Solution ........................................................................................................................... 437 SmartEvent Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 SmartEvent Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 SmartEvent Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440 SmartEvent Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441 Defining the Internal Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442 7 Check Point Security Engineering Identifying an Event ................................................................................................................................... 443 Monitoring the Network ............................................................................................................................. 449 Event Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451 Investigating Security Events ..................................................................................................................... 452 Importing Offline Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453 Remediating Security Events ..................................................................................................................... 454 Configuring Event Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454 Configuring IPS Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Reporting Security Events .......................................................................................................................... 458 Using Predefined Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 Defining Custom Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460 Preventative Measures ................................................................................................................................ 461 Creating a New Event Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Reporting an Event to Check Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462 Eliminating False Positives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462 SmartEvent Example .................................................................................................................................. 463 High Availability Environment .................................................................................................................. 464 Security CheckUp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 Lab 5.1: Evaluating Threats with SmartEvent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Configure the Network Object in SmartConsole ....................................................................................... 467 Monitoring Events with SmartEvent .......................................................................................................... 476 END OF LAB 5.1 484 Review Questions ....................................................................................................................................... 485 Chapter 6: Remote and Mobile Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 Choosing Remote Access Solutions ........................................................................................................... 487 Installation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487 Secure Connectivity and Endpoint Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488 SSL VPN versus IPSec (Layer 3) VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Clients ......................................................................................................................................................... 490 Mobile Access Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490 SSL Network Extender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490 Check Point Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 Check Point Capsule Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 SecuRemote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 Additional Remote Access Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 8 Check Point Security Engineering Check Point Capsule .................................................................................................................................. 492 Capsule Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492 Capsule Docs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 Capsule Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 Mobile Access Software Blade .................................................................................................................. 500 Mobile Access Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 Mobile Access Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 Gateway Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 Mobile Access Deployment ....................................................................................................................... 507 Mobile Access Policy ................................................................................................................................. 508 Mobile Access Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510 Lab 6.1: Managing Mobile Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512 Enable Mobile Access Blade ...................................................................................................................... 513 Configure the Check Point Capsule Policy ................................................................................................ 522 Testing Check Point Mobile Access .......................................................................................................... 538 END OF LAB 6.1 542 Review Questions ....................................................................................................................................... 543 Chapter 7: Threat Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 The Threat Landscape ................................................................................................................................ 545 Zero-Day Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 Advanced Persistent Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 Intrusion Prevention System ...................................................................................................................... 546 IPS Profile Settings and Protections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546 IPS Tuning and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 Lab 7.1: Understanding IPS Protections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549 Configuring the Protection Profile ............................................................................................................. 550 Configuring the IPS Demonstration Tool .................................................................................................. 563 Testing the Default Protections .................................................................................................................. 569 Modifying the Protection Profile Settings .................................................................................................. 571 Working with Logs & Monitor to Investigate Threats ............................................................................... 580 Modifying an Existing Protection Profile .................................................................................................. 581 END OF LAB 7.1 592 Geo-Protection ............................................................................................................................................ 593 9 Check Point Security Engineering Lab 7.2: Deploying IPS Geo Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595 Modifying Anti-Spoofing Settings ............................................................................................................. 596 Configuring IPS Geo Protection ................................................................................................................. 600 END OF LAB 7.2 606 Antivirus ..................................................................................................................................................... 607 Anti-Bot ...................................................................................................................................................... 608 Lab 7.3: Reviewing Threat Prevention Settings and Protections . . . . . . . . . . . . . . . 609 Review Threat Prevention Settings and Protections .................................................................................. 610 Testing EICAR Access ............................................................................................................................... 620 END OF LAB 7.3 622 Sandboxing ................................................................................................................................................. 623 OS-Level Sandboxing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 CPU-Level Sandboxing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 Check Point SandBlast Zero-Day Protection ............................................................................................. 625 SandBlast Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 625 SandBlast Appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628 SandBlast Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 632 SandBlast Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 635 SandBlast Deployment ............................................................................................................................... 637 Public Cloud Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637 Private Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637 Hybrid Solution (SandBlast Appliance and Cloud) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638 SandBlast Mobile ....................................................................................................................................... 639 SandBlast Mobile Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 640 SandBlast Mobile Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643 Lab 7.4: Deploying Threat Emulation and Threat Extraction . . . . . . . . . . . . . . . . . 645 Use ThreatCloud to Verify File Safety ....................................................................................................... 646 Configure Threat Emulation to Inspect Incoming Traffic .......................................................................... 648 END OF LAB 7.4 658 Review Questions ...................................................................................................................................... 659 10 Check Point Security Engineering Chapter 8: Questions and Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 660 Chapter 1: System Management ................................................................................................................. 661 Chapter 2: Automation and Orchestration .................................................................................................. 662 Chapter 3: Redundancy .............................................................................................................................. 663 Chapter 4: Acceleration .............................................................................................................................. 664 Chapter 5: SmartEvent ............................................................................................................................... 665 Chapter 6: Remote and Mobile Access ...................................................................................................... 666 Chapter 7: Threat Prevention ..................................................................................................................... 667 11 P R E F A C E Check Point Security Engineering Security Engineering P Welcome to the Check Point Cyber Security Engineering course. This course provides an advanced and in-depth explanation of Check Point technology. It includes advanced upgrading, key techniques for building, deploying and enhancing network performance, and management and troubleshooting features to mitigate security risks. The course is intended to provide you with an understanding of the skills necessary to effectively design, maintain and protect your enterprise network. Preface Outline • Prerequisites • Course Chapters and Learning Objectives • Lab Topology • Related Certification _____________________ _____________________ 12 Check Point Security Engineering Check Point Security Engineering Course This course is designed for security experts and Check Point resellers who need to perform advanced deployment configurations of a Security Gateway and are working towards their Check Point Certified Security Engineering (CCSE) certification. The following professionals benefit best from this course: • System Administrators • Support Analysts • Network Engineers P r e r e q u i s i te s Successful completion of this course depends on knowledge of multiple disciplines related to network-security activities including: • • • • • UNIX and Windows operating systems Certificate management System administration CCSA training/certification Networking (TCP/IP) C o u r s e C ha p te r s a nd L ea r ni ng O b j e c t i ve s Chapter 1: System Management • Understand system management procedures, including how to perform system upgrades and apply hotfixes. • Identify advanced CLI commands. • Understand the Check Point Firewall infrastructure and other advanced Firewall processes and procedures. Chapter 2: Automation and Orchestration • Recognize how Check Point’s flexible API architecture supports automation and orchestration of daily operations. • Understand how to use the management API command line tools and web services to read information, create objects, work on Security Policies, and send commands to the Check Point Security Management Server. _____________________ _____________________ 13 Check Point Security Engineering Chapter 3: Redundancy • Discuss advanced ClusterXL functions and redundancy. • Describe VRRP network redundancy and its advantages. Chapter 4: Acceleration • Understand how SecureXL acceleration technology enhances and optimizes Security Gateway performance. • Understand how CoreXL acceleration technology enhances and improves Security Gateway performance. Chapter 5: SmartEvent • Identify SmartEvent components used to store network activity logs and identify events. • Discuss the SmartEvent process that determines which network activities may lead to critical security issues. • Understand how SmartEvent can assist in detecting, remediating, and preventing security threats targeting organizations. Chapter 6: Remote and Mobile Access • Recognize Check Point Remote Access solutions and how they differ. • Discuss Check Point Capsule components and how they work to protect mobile devices and business documents. • Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. • Understand Mobile Access deployment options. Chapter 7: Threat Prevention • Discuss different Check Point Threat Prevention solutions for dangerous attacks such as zero-day and Advanced Persistent Threats. • Understand how SandBlast, Threat Emulation, and Threat Extraction helps to prevent security incidents. • Identify how Check Point SandBlast Mobile helps protect an organization from threats targeting company-issued smartphones and tablets. _____________________ _____________________ 14 Check Point Security Engineering L a b To p o l o g y Labs for this course were developed using VMware Workstation. Your instructor will have information for the specific settings and configuration requirements of each virtual machine. Most lab exercises will require you to manipulate machines in the virtual network. Review the starting lab topology pictured below. Note the location of each server in relation to the Security Gateways and how they are routed. Make sure you understand the purpose of each machine, and the credentials and applications used throughout the course. As the course progresses, you will add Virtual Machines to this topology during the lab exercises. Figure 1 — Starting CCSE Lab Topology Rel a te d C er ti fi c a t i o n The Check Point Certified Cyber Security Engineer (CCSE) certification is designed for partners and customers seeking to validate their expert level knowledge of Check Point’s software products and security solutions. Students must have a valid CCSA certification before challenging the CCSE exam. _____________________ _____________________ 15 C H A P T E R Check Point Security Engineering System Management 1 Cyber Security experts are expected to acquire and apply in-depth knowledge of systems used to securely manage the organization’s network infrastructure. This course begins with a deep dive into the Check Point Gaia operating system, with how to use essential CLI commands, perform upgrades, and apply hotfixes. We will also take a closer look at the Check Point Firewall infrastructure, chain modules, kernel tables, packet flow, and many more advanced Firewall processes and procedures. Learning Objectives • Understand system management procedures, including how to perform system upgrades and apply hotfixes. • Identify advanced CLI commands. • Understand the Check Point Firewall infrastructure and other advanced Firewall processes and procedures. _____________________ _____________________ 16 Check Point Security Engineering Advanced Gaia Check Point Gaia is the unified, revolutionary, secure operating system for all Check Point appliances, open servers, and virtualized gateways. The cutting-edge technology combines the best features of IPSO and Check Point’s original secure operating system, SecurePlatform, into a single, harmonious operating system to provide greater operational efficiency and robust performance. The Makings of Gaia Gaia was derived from IPSO and SecurePlatform. The IPSO operating system was developed by Ipsilon Networks, a computer networking company specializing in IP switching during the 1990s. Nokia purchased Ipsilon Networks in 1997 and incorporated IPSO into their secure network appliances. Check Point acquired Nokia’s Security business unit in April 2009. As a stripped down operating system, IPSO provided enough functionality to run Check Point Firewalls, along with the incorporation of some standard Unix commands, such as top, ps, and df. It also provided great visibility into kernel statistics, such as network counters, interrupts, and more. Check Point’s SecurePlatform operating system is based on a kernel from Red Hat Software. SecurePlatform’s hardened and optimized operating system eliminated software package components that were unnecessary for a network security device and modified or removed components that could present security risks. Its easy-to-use command shell provided a set of commands required for configuration, administration, and system diagnostics, including network settings, back up and restore utilities, upgrading, and system log viewing. Routine management and maintenance of SecurePlatform was performed through a restricted shell called Standard mode. Standard mode enhanced the security of SecurePlatform by restricting access to utilities that, if used improperly, would damage system stability. SecurePlatform also consisted of a Web Graphical User Interface (WebUI), which enabled users to easily configure settings and perform first time installations. SecurePlatform allowed all system resources to be dedicated to the operating system and the installed Check Point products. With SecurePlatform, resources were no longer consumed by software such as GUIs, office applications, and network file systems. G a i a Fe a t u r e s a n d B e n e f i t s Gaia supports the full suite of Check Point technologies, giving you improved connection capacity and the full power of Check Point security. _____________________ _____________________ 17 Check Point Security Engineering Check Point Gaia offers these key values: • Combine the best features of IPSO and SecurePlatform. • Increase operational efficiency with a wide range of features. • Provide a secure platform for the most demanding environments. Gaia simplifies and strengthens management with the segregation of duties by enabling rolebased administrative access. Additionally, Gaia greatly increases operational efficiency with an advanced and intuitive software update agent, commonly referred to as the Check Point Update Service Engine (CPUSE). Gaia management is made simple with the intuitive and feature-rich WebUI, and instant search options for all commands and properties. The same powerful CLI commands from IPSO and SecurePlatform have been seamlessly integrated into Gaia, along with new commands and capabilities. Figure 2 — Gaia Portal _____________________ _____________________ 18 Check Point Security Engineering Key Features Key features of Gaia include: • Web-based User Interface with search navigation — This interface integrates all Gaia operating system management functions into a dashboard that is accessible via the most popular Web browsers, such as Internet Explorer, Chrome, Firefox, Opera, and Safari. The built-in search navigation tool delivers instant results, and for the CLIinclined users, a Shell Emulator pop-up window is only a single click away. • Full Software Blade support — Gaia provides support for comprehensive Security Gateway and Security Management Software Blade solutions deployed on Check Point appliances and open servers. • High connection capacity — Utilizing the efficiency of a 64-bit operating system, Gaia is capable of boosting the connection capacity of existing Check Point appliances. • Role-based administrative access — Segregation of duties is part of a good Security Policy because it improves operational efficiency and auditing of administrative events. Role-based administrative access gives Gaia customers the ability and granularity to customize their security management policies to meet their business needs. User authentication and authorization is based on industry standard RADIUS and TACACS+ protocols. Specific levels of access can be granted based on each individual’s role and responsibility. • Intelligent software updates — With Gaia, software update times are shortened and post-update testing is performed automatically. New releases and patches can be scheduled for automatic download and installed during off-peak hours for minimal business impact. Notification emails are sent about recommended updates and update statuses. • Native IPv4 and IPv6 support — Check Point Gaia allows easy interoperability with both networking protocols. • Clustering protocol support — Gaia fully supports ClusterXL, Check Point’s proprietary network redundancy protocol, and standard VRRP on all Check Point appliances, open servers, and virtualized environments. • Manageable dynamic routing suite — Multiple dynamic routing and Multicasting protocols are supported by Gaia, providing flexible and uninterrupted network connectivity. All can be managed from both the Gaia portal or the CLI. _____________________ _____________________ 19 Check Point Security Engineering Supported Protocols Dynamic Routing Protocols • RIP RFC 1058 • RIPv2 (with authentication) RFC 1723 • OSPFv2 RFC 2328 • OSPFv3 RFC 5340 • OSPF NSSA RFC 3101 • BGP4 RFCs 1771, 1963, 1966, 1997, 2918 Multicasting Protocols • • • • • • IGMPv2 RFC 2236 IGMPv3 RFC 3376 PIM-SM RFC 4601 PIM-SSM RFC 4601 PIM-DM RFC 3973 PIM-DM state refresh draft-ietf-pim-refresh-02.txt Table 1: Gaia Supported Dynamic and Multicasting Protocols _____________________ _____________________ 20 Check Point Security Engineering Upgrades As a Cyber Security Engineer, it is important to evaluate the overall health, compliance, and performance of your network. This often entails the task of deciding whether to install new hardware to fit business needs or to upgrade to newer software versions to ensure the efficiency of the existing environment. Check Point recommends installing the most recent software release to stay up-to-date with the latest functional improvements, stability fixes, security enhancements, and protections against new and evolving attacks. Upgrades provide added enhancements over an earlier version and eliminate the complexities of re-creating product configurations, Security Policies, and objects. Before upgrading appliances or open servers, verify the interoperability and upgrade path of your existing environment and make use of the appropriate Check Point upgrade tools. To upgrade from R77.XX to R80.10, an advanced upgrade with database migration process must be performed. Upgrades from R80 to R80.10, are performed through the software update agent, CPUSE. NOTE Upgrades to R80 and above are not supported from IPSO and SecurePlatform. For more information, refer to Check Point’s Upgrade Map. U p g r a d e Too l s Upgrade tools back up Check Point configurations, independent of hardware, operating system, and Check Point security management platform version. Use the upgrade tools to back up Check Point configuration settings on disk partitions of Check Point appliances and open servers. Disk space requirements for upgrades vary based on the upgrade version. Before starting an upgrade, refer to the release notes of the desired platform version to verify the space requirements for each disk partition, such as the /var/log/ and root partitions. There is a different package of upgrade tools for each platform. Download the latest version of upgrade tools from the Check Point support site. Before upgrading, a valid service contract that includes software upgrades and major releases must be registered to your organization’s Check Point User Center account. _____________________ _____________________ 21 Check Point Security Engineering The upgrade tools package consists of several files, including the files noted in the table below. Package File Description migrate.conf Holds configuration settings for Advanced Upgrade with Database Migration. migrate Runs Advanced Upgrade with migration. pre_upgrade_verifier Analyzes compatibility of the currently installed configuration with the upgrade version. It gives a report on the actions to take before and after the upgrade. Table 2: Upgrade Tools Package Files Ad va n c e d U p g r a d e w i t h D a t a b a s e M i g r a t i o n As in all upgrade procedures, it is best practice to upgrade the Security Management Server or Multi-Domain Server before upgrading the Security Gateways. To upgrade from an earlier software version, such as R77.30, to Check Point’s R80.10 security management platform, use the Advanced Upgrade with Database Migration method to migrate the database and install the software. With this method of upgrading, the current environment must meet these requirements for database migration: • Available disk space of at least five times the size of the exported database on the target machine. • Size of the /var/log folder of the target machine must be at least 25% of the size of the /var/log directory on the source machine. • Source and target servers must be connected to a network and the connected network interface must have an IP address. • If the source environments uses only IPv4 or only IPv6, the target must use the same IP address configuration. For example, you cannot migrate to an IPv6 configuration if the source environment uses only IPv4. • The target must have the same or higher version and the same set of installed products. • The appropriate package of upgrade tools must be download for each source platform. • The correct ports for SmartConsole must be open in order for SmartConsole to communicate with the Security Management Server. After the requirements for database migration have been met, create a backup copy of the existing system settings from the Gaia WebUI. Gaia operating system settings are not backed up and must be configured manually if the database is restored later due to issues with the upgrade. Take note of operating system settings (interfaces, servers, routes, system settings, etc.) before upgrading. _____________________ _____________________ 22 Check Point Security Engineering It is important to use the correct migration tool package to perform the upgrade. Use the upgrade tools package for the software version you are upgrading too. For example, if upgrading from R77.30 to R80.10, use the migration tools package for R80.10. Download and extract the tools to the old server (R77.30). Use the migrate utility of the upgrade tools package, to export the source Security Management Server database (R77.30) to a file, and then import the file to the new server (R80.10). NOTE SmartEvent databases are not migrated during an advanced upgrade because the databases can be very large. Migration of these databases must be performed separately. Refer to sk110173 for information on how to migrate the SmartEvent database. The Upgrade Verification Service Check Point’s Upgrade Verification Service is an upgrade verification and environment simulation service created to help customers transition to R80.XX as seamlessly as possible. The service will use configuration files from your current platform to simulate the environment and verify that the upgrade can be successfully applied across the key features of the software. The simulation will also ensure that the database is not corrupted during the upgrade process. Upon completion, a status update of the simulation results along with advice on how best to proceed will be provided. For more detailed information regarding the Upgrade Verification Service, refer to sk110267. L a b 1 .1 Upgrading to R80.10 _____________________ _____________________ 23 L A B Upgrading to R80.10 1.1 This lab illustrates how to perform an upgrade of a Security Management Server from R77.30 to R80.10. You will export the configuration of your old server to a Windows machine before installing a new R80.10 server. Once the fresh installation of the new OS is complete, you can then import the rules, objects, and settings of the previous server into the database of the new, upgraded server. Once the upgrade of the Security Management Server is complete, use CPUSE to upgrade a Security Gateway. Ta sks : • Save the database information. • Access the migrate file and transfer via SSH/SCP. • Perform a clean installation of R80.10 Security Management Server. • Configure the Security Management Server. • Install R80.10 SmartConsole. • Import the database. • Upgrade the Security Gateway. Pe r for ma n c e Ob j ec t ive s: • Use the migrate export command to prepare to upgrade a Security Management Server. • Perform an installation of a Security Management Server. • Use the migrate import command to populate the database of a Security Management Server. • Perform an upgrade of Security Gateways in a clustered environment. _____________________ _____________________ 24 Check Point Security Engineering Migrating Management Server Data Export the rules and objects off of the existing Security Management Server so that they can be imported into the new server. From A-GUI, open a Web browser and use HTTPS to connect to A-SMS (10.1.1.101). 2. Use the following credentials to log into the Gaia Portal on A-SMS: 1. Username: admin Password: Chkp!234 In the navigation pane, click User Management > Users. 4. Use the information below to create a new user: 3. Login Name: scpadmin Password: Chkp!234 Home Directory: /home/scpadmin Shell: /bin/bash Assigned Roles: adminRole Access Mechanisms: Web Command Line Click OK. 6. Sign out of the Gaia Portal. 7. Close the web browser. 5. _____________________ _____________________ 25 Check Point Security Engineering 8. From A-GUI, use the following credentials to log into WinSCP and connect to the A-SMS: File Protcol: SCP Host Name: 10.1.1.101 User Name: scpadmin Password: Chkp!234 Figure 3 — WinSCP Login In WinSCP, confirm that the left pane displays the local directory and the right pane displays the remote directory. 10. In the right pane, navigate to the /var/log directory of the old R77.30 Security Management Server: 11. In the left pane (local directory), browse to the location of the Upgrade Tools. 9. NOTE Ask your instructor for the location and name of the upgrade tools file. Though the name varies, the upgrade tools for R80.10 are called: p1_upgrade_tools.tgz _____________________ _____________________ 26 Check Point Security Engineering 12. Create a new directory called tmp in the /var/log directory, if needed. 13. Move the file from A-GUI to the /var/log/tmp directory on A-SMS, and the system displays the following window: Figure 4 — Upload _____________________ _____________________ 27 Check Point Security Engineering 14. Click the Transfer Settings button, and configure the transfer to be in Binary mode: Figure 5 — Binary Mode 15. Click OK. 16. Click OK, to continue the file transfer. 17. Highlight the copied file in the right pane of WinSCP and right-click. _____________________ _____________________ 28 Check Point Security Engineering 18. From the Context Menu, select Custom Commands > UnTar/Gzip: Figure 6 — Special Commands - UnTar/Gzip 19. Click OK, to extract the directory to the following location: /var/log/tmp _____________________ _____________________ 29 Check Point Security Engineering 20. After the extraction completes, verify that the following folder now appears in /var/log/tmp: migrate_tool Figure 7 — migrate_tool Folder _____________________ _____________________ 30 Check Point Security Engineering 21. From the WinSCP window, click the PuTTY Login button. 22. PuTTY logs into the A-SMS server (10.1.1.101) at the /home/admin directory: Figure 8 — PuTTY Session NOTE If you are asked to enter the password for scpadmin, enter the following: Chkp!234 _____________________ _____________________ 31 Check Point Security Engineering 23. Verify that all consoles are closed by issuing the following command: cpstat mg Figure 9 — cpstat mg NOTE The Connected Clients list should be empty. If it is not, execute the cpstop command to force close all open clients. 24. Change to the following directory by executing the following command: cd /var/log/tmp/migrate_tool _____________________ _____________________ 32 Check Point Security Engineering 25. Type the following command and press Enter, to view the contents of the folder: ls Figure 10 — migrate_tool Folder 26. Type the following command: ./migrate export A-SMS-from-r7730-to-r8010.tgz _____________________ _____________________ 33 Check Point Security Engineering 27. Press Enter, to run the script. The system asks the following question: Figure 11 — Warning _____________________ _____________________ 34 Check Point Security Engineering 28. Type y, and press Enter. The system exports the data, creates the export file, and identifies its location on the server: Figure 12 — Export Complete NOTE The time it takes for this process to complete may vary depending on the size of your Security Policy, number of objects in the database, and database revisions. Once complete, the system provides the location of the exported file and returns to the Expert mode command prompt. _____________________ _____________________ 35 Check Point Security Engineering 29. While still in the PuTTY session on A-SMS, initiate an FTP session back to A-GUI (10.1.1.201). NOTE You can also use the WinSCP session that is still open to transfer the file. 30. Type the following commands and press Enter, to prepare to transfer the file: bin hash 31. Type the following command, and press Enter: put A-SMS-from-r7730-to-r8010.tgz NOTE You may want to transfer the file using WinSCP instead of FTP. Just be sure to use Binary Mode for the transfer. 32. Verify that the A-SMS-from-r7730-to-r8010.tgz file has been transferred to A-GUI. _____________________ _____________________ 36 Check Point Security Engineering 33. Close the WinSCP session. 34. In the PuTTY session to A-SMS, issue the following command: shutdown now -h Figure 13 — shutdown now -h 35. Exit PuTTY. 36. Verify that the A-SMS virtual machine is powered down before continuing. _____________________ _____________________ 37 Check Point Security Engineering Installing the Security Management Server Install the R80.10 Management Server. It will manage the Security Gateway cluster for this site. 1. In VMware, verify that the settings for the new A-SMS Virtual Machine is defined as follows: ◦ Name: A-SMS ◦ Memory: 10GB ◦ Processors: 4 ◦ Hard Disk: 80GB ◦ CD/DVD (SATA): Points to R80.10 ISO ◦ Network Adapter: One Interface • Connected • Connect at power on • LAN Segment: LAN 1 NOTE Your classroom configuration may be different. Check with your instructor before continuing to the next step. _____________________ _____________________ 38 Check Point Security Engineering 2. Power on the A-SMS virtual machine, and the Welcome to Check Point Gaia R80.10 screen appears: Figure 14 — Welcome to Check Point Gaia R80.10 3. Within 60 seconds, highlight the option Install Gaia on this system. _____________________ _____________________ 39 Check Point Security Engineering 4. Press the Enter key, to launch the installation: Figure 15 — Welcome At the Welcome screen, highlight OK, and press Enter. 6. Select the keyboard to suit your region. 7. At the Partitions Configuration screen, modify the Logs partition to be 30GB: 5. Figure 16 — Partitions Configuration _____________________ _____________________ 40 Check Point Security Engineering 8. At the Account Configuration screen, enter and confirm Chkp!234 as the password for the OS Level admin account. NOTE Verify that NumLock is on. It is not on by default after installation. If you haven’t already turned it on, do so now and re-enter and confirm your password. If you enter this password without turning NumLock on, you will not be able to log into the system. Tab to OK, and press Enter. 10. Use the following information to configure the Management Interface (eth0) screen: 9. IP Address: 10.1.1.101 Netmask: 255.255.255.0 Default Gateway (IP): 10.1.1.1 Figure 17 — Management Interface (eth0) Configured 11. Select OK, and press Enter. The system displays the Confirmation screen. _____________________ _____________________ 41 Check Point Security Engineering 12. In the Confirmation screen, select OK, and press Enter to proceed. After the drive is formatted and the installation is complete, the system displays the Installation Complete screen: Figure 18 — Installation Complete 13. Press Enter to reboot A-SMS. _____________________ _____________________ 42 Check Point Security Engineering Configuring Security Management Server Using the Gaia Portal Follow these steps to configure the primary Security Management Server for your configuration. From the A-GUI virtual machine, launch an Internet browser. 2. In the address field, type the following: 1. https://10.1.1.101 NOTE Be sure that you are using HTTPS. You may also need to verify that the LANs in VMware are configured properly before you are able to connect. Both the GUI client machine (A-GUI) and the Security Management Server (A-SMS) reside on LAN 2, if you are following the recommended classroom topology. Consult your instructor, if you are using a different configuration. 3. Press Enter, and your browser should warn you that the site’s Security Certificate is from an untrusted source. NOTE Ignore this warning and continue to the site. _____________________ _____________________ 43 Check Point Security Engineering 4. Log into A-SMS with the following credentials: Login: admin Password: Chkp!234 Figure 19 — R80.10 Gaia Portal Login _____________________ _____________________ 44 Check Point Security Engineering 5. Press Enter, and the system displays the following message: Figure 20 — R80.10 First Time Configuration Click Next, and the system displays the deployment Options page. 7. Verify that the following option is selected: 6. Continue with Gaia R80.10 configuration _____________________ _____________________ 45 Check Point Security Engineering 8. Click Next, and the system displays the Management Connection window: Figure 21 — Network Connection 9. Use the information below to verify that the Security Management Server’s network connection is configured properly: Interface: eth0 Configure IPv4: Manually IPv4 Address: 10.1.1.101 Subnet Mask: 255.255.255.0 Default Gateway: 10.1.1.1 Configure IPv6: Off 10. Click Next, and the system displays the Device Information window. _____________________ _____________________ 46 Check Point Security Engineering 11. Use the following information to configure the Device Information window: Host Name: A-SMS Domain Name: alpha.cp Primary DNS Server: 192.168.11.101 Figure 22 — Device Information Configured NOTE Check Point prohibits the use of underscores in object names. 12. Click Next, and the system displays the Date and Time Settings window. 13. Select the option Use Network Time Protocol (NTP). 14. In the Primary NTP server field, type 192.168.11.101. _____________________ _____________________ 47 Check Point Security Engineering 15. Select the correct Time Zone for your location: Figure 23 — Date and Time Settings Configured 16. Click Next, and the system displays the Installation Type window: Figure 24 — Network Configuration - Host Name Options _____________________ _____________________ 48 Check Point Security Engineering 17. Select Security Gateway or Security Management, and click Next. The system displays the Products window. 18. In the Products window, clear the Security Gateway option. 19. Use the information below to configure the Products window: Products: Security Management Advanced: Define Security Management as Primary NOTE Clear the Security Gateway option before continuing. This option must NOT be selected. 20. Verify that the Products window is configured as follows: Figure 25 — Products Configured 21. Click Next, and enter newadmin for the Administrator name. _____________________ _____________________ 49 Check Point Security Engineering 22. Enter and confirm Chkp!234 as the password: Figure 26 — Security Management Administrator 23. Click Next, and confirm that the option Any IP Address is selected in the Security Management GUI Clients window. _____________________ _____________________ 50 Check Point Security Engineering 24. Click Next, and the system displays the Summary page: Figure 27 — Summary 25. Clear the following option: Improve product experience by sending data to Check Point NOTE Though this option is recommended, it is not necessary in our lab. We are not in a production environment and only have limited connection to the Internet. 26. Click Finish, and the system prompts you for a response to the following question: Figure 28 — First Time Configuration Wizard Message _____________________ _____________________ 51 Check Point Security Engineering 27. Click Yes, and the system proceeds with the configuration: Figure 29 — Summary (Progress) 28. Once complete, a message displays indicating that the configuration was successful: Figure 30 — Message _____________________ _____________________ 52 Check Point Security Engineering 29. Click OK, and the Gaia Portal displays the configuration settings of the newly configured Security Management Server: Figure 31 — Check Point Gaia Portal - Security Management Server Configured _____________________ _____________________ 53 Check Point Security Engineering 30. In the System Management section, click Messages. 31. Enter the following for the Banner Message: A-SMS Unauthorized access of this server is prohibited and punishable by law. Figure 32 — Messages Configured 32. Click Apply. _____________________ _____________________ 54 Check Point Security Engineering 33. In the User Management section of the navigation pane, select Users: Figure 33 — Users _____________________ _____________________ 55 Check Point Security Engineering 34. Click the Add button, and the system displays the Add User window: Figure 34 — Add User _____________________ _____________________ 56 Check Point Security Engineering 35. Use the following information to configure the new user: Login Name: adminbash Password: Chkp!234 Real Name: Adminbash Home Directory: /home/adminbash Shell: /bin/bash Access Mechanisms: Web Clish Access Assigned Roles: adminRole Figure 35 — Add User Configured NOTE When you log into the Security Management Server as adminbash, the correct shell is now available for adminbash to connect and transfer files. There is no longer a need to specifically define the shell in the command line. Since this is an OS level user, you must perform this action on every module you want to have the adminbash user defined. _____________________ _____________________ 57 Check Point Security Engineering 36. Click OK, and the system adds the new user to the Users page: Figure 36 — Users _____________________ _____________________ 58 Check Point Security Engineering Installing SmartConsole In this section, you will install SmartConsole on the A-GUI virtual machine. In the navigation pane of Gaia Portal, click Overview. 2. On the Overview page, click the Download Now button to download the SmartConsole installer file: 1. Figure 37 — Web Portal - Overview NOTE You may need to reacquire the configuration lock before downloading the application. The system will prompt you, if this is necessary. _____________________ _____________________ 59 Check Point Security Engineering Save the installer file to the Downloads folder of A-GUI. 4. Log out of the Gaia Portal. 5. Browse the Downloads folder and locate the SmartConsole.exe file: 3. Figure 38 — Downloads Folder _____________________ _____________________ 60 Check Point Security Engineering 6. Double-click the SmartConsole.exe file. The Welcome screen displays. Figure 39 — Welcome Select the option confirming you agree to the Check Point End User License Agreement. 8. Click Install, to begin the installation process. The system displays installation progress information: 7. Figure 40 — Installation _____________________ _____________________ 61 Check Point Security Engineering 9. Verify that the system displays the Thank You window, once the installation completes: 10. Click the Finish button, to complete the SmartConsole installation. 11. Log into A-SMS with the following credentials: Login: newadmin Password: Chkp!234 IP Address: 10.1.1.101 _____________________ _____________________ 62 Check Point Security Engineering 12. Click Login, and the system displays the Fingerprint for verification: Figure 41 — Fingerprint 13. Click Proceed, and the system displays the Welcome to SmartConsole R80.10 page: Figure 42 — Welcome to SmartConsole _____________________ _____________________ 63 Check Point Security Engineering 14. Close the What’s New window. 15. In the Gateways & Servers tab of SmartConsole, identify that there are no Security Gateways managed by this Security Management Server: Figure 43 — Gateways & Servers _____________________ _____________________ 64 Check Point Security Engineering 16. In the navigation pane, click Security Policies: Figure 44 — Security Policies 17. Verify that no rules are present in the Rule Base and that only the A-SMS object is present, as is typical in a default installation before the Security Policy is configured. 18. Close SmartConsole. _____________________ _____________________ 65 Check Point Security Engineering Importing the Check Point Database Use the migrate import command to load the objects, rules, and settings from the previous server into the newly configured R80.10 one. 1. From A-GUI, use the following information to connect to the newly configured Security Management Server via WinSCP: Host Name: 10.1.1.101 User Name: adminbash Password: Chkp!234 Figure 45 — WinSCP Login NOTE In Gaia, the User Name and Password are both case sensitive. 2. Click Login, and WinSCP logs into A-SMS. _____________________ _____________________ 66 Check Point Security Engineering 3. In the right-pane, navigate to the following location: /var/log 4. In the toolbar, click New > Directory. Figure 46 — Create Folder NOTE An alternative method to performing the import from the /var/log location would be to move the migrate file into the upgrade_tools folder and perform the import from that location. Name the new folder Migrate. 6. Click OK. 7. In the left pane of WinSCP, verify that the following file is visible: 5. A-SMS-from-r7730-to-r8010.tgz _____________________ _____________________ 67 Check Point Security Engineering 8. In the right pane of WinSCP, verify that the Migrate folder is visible: Figure 47 — WinSCP _____________________ _____________________ 68 Check Point Security Engineering 9. Copy the A-SMS-from-r7730-to-r8010.tgz file using Binary mode from its location on A-GUI to the Migrate folder on A-SMS: Figure 48 — Copy NOTE When transferring files, make sure you configure the transfer settings to work in Binary mode. 10. Exit WinSCP, after the file transfer is complete. _____________________ _____________________ 69 Check Point Security Engineering 11. Once the file is copied to the server, log into A-SMS (10.1.1.101). 12. To enter Expert Mode, type the following and press Enter: expert NOTE The system asks you to set the Expert Mode password because, as a new installation this value is not currently configured. 13. Execute the following command to set the Expert Mode password: set expert-password 14. Enter and confirm the following as the Expert Mode password: Chkp!234 Figure 49 — set expert-password 15. Execute the following command: save config 16. Next, type the following command and press Enter. expert 17. Enter and confirm the following as the Expert password: Chkp!234 18. Type the following command, and press Enter, to change the directory to the location of the imported file: cd /var/log/Migrate _____________________ _____________________ 70 Check Point Security Engineering 19. Execute an ls command to verify that the file is present: Figure 50 — ls 20. Type the following command, and press Enter, to change the directory to the migration tool application: cd $FWDIR/bin/upgrade_tools Figure 51 — Change Directories 21. Execute an ls command to verify that the file migrate function is present: Figure 52 — ls 22. To import the file into the new Security Management Server, type the following command: ./migrate import /var/log/Migrate/A-SMS-from-r7730-to-r8010.tgz 23. Press Enter, and the system warns you that services must be stopped. _____________________ _____________________ 71 Check Point Security Engineering 24. Type y, and press Enter. The system unzips the file and imports the configuration. Once complete, it displays the following question: Figure 53 — Question 25. Press Enter, to restart Check Point services. 26. Wait for the services to start before proceeding to the next section. _____________________ _____________________ 72 Check Point Security Engineering Launching SmartConsole and Reconfiguring Existing Security Policies Launch SmartConsole and connect to the Security Management Server. From the Start menu on A-GUI, click All Programs > Check Point SmartConsole R80.10 and the system displays the login window. 2. Use the following information to configure the Login window: 1. User Name: newadmin Password: Chkp!234 IP Address: 10.1.1.101 Figure 54 — Login Window _____________________ _____________________ 73 Check Point Security Engineering 3. Click the Login button, and the login attempt should fail: Figure 55 — Check Point SmartConsole NOTE The login failure confirms that the database import completed successfully, because newadmin was not configured in the imported policy. 4. Use the following information to Login: User Name: admin Password: Chkp!234 IP Address: 10.1.1.101 Click the Login button. 6. Select the Gateways & Servers tab. 5. _____________________ _____________________ 74 Check Point Security Engineering 7. In the navigation pane, click Security Policies: Figure 56 — Security Policies - Manage Policies - Recent Policies _____________________ _____________________ 75 Check Point Security Engineering 8. From the recent Policies list, click Alpha_Standard to view: Figure 57 — Security Policies - Alpha Standard Verify that the rules and objects previously configured on the old server are present. 10. Edit the Alpha-Net group object and add an “s” to it’s name. 9. _____________________ _____________________ 76 Check Point Security Engineering 11. Edit the A-GW-Cluster object. 12. Verify that the Version setting on the General Properties page displays R80.10: Figure 58 — General Properties Configured NOTE If the version displayed is not R80.10, click the Get button to retrieve this information from the Security Gateways. 13. Click OK. _____________________ _____________________ 77 Check Point Security Engineering 14. Click Publish, to commit the changes to the database: Figure 59 — SmartConsole _____________________ _____________________ 78 Check Point Security Engineering 15. Click the Install Policy button in the Alpha_Standard Policy Package and the system displays the Install Policy window: Figure 60 — Install Policy NOTE If the Threat Prevention option is selected, clear it before installing the Security Policy. _____________________ _____________________ 79 Check Point Security Engineering 16. As the policy installation is proceeding, identify the Recent Tasks pop-up window displayed by the system in the bottom left of SmartConsole. 17. For the Policy Installation task, click the Details link. The system displays the following window: Figure 61 — Install Policy Details 18. Confirm that the Alpha_Standard policy was successfully installed on both A-GW-Cluster members. 19. Close the Install Policy Details window. 20. Next, edit the B-GW object. 21. Test communication and only reset SIC if communication fails. _____________________ _____________________ 80 Check Point Security Engineering 22. In the General Properties page, verify that the B-GW displays a Version of R77.30: Figure 62 — General Properties Configured 23. Click OK. 24. In the toolbar, click the Application Menu button in the upper left corner of SmartConsole. 25. Select Global Properties. _____________________ _____________________ 81 Check Point Security Engineering 26. Verify that the following settings are defined: ◦ Accept ICMP First ◦ Log Implied Rules Figure 63 — Global Properties 27. Click OK. 28. In the Alpha Security Policy, remove the B-GW object from the Stealth Rule, if it is present. 29. Next, publish and install the Alpha Security Policy. _____________________ _____________________ 82 Check Point Security Engineering 30. Click the + tab, to view the recent policies available to view: Figure 64 — Recent Policies _____________________ _____________________ 83 Check Point Security Engineering 31. Select Bravo_Standard, and the system displays the following: Figure 65 — Bravo_Standard Tab _____________________ _____________________ 84 Check Point Security Engineering 32. In the Bravo_Standard Security Policy page, click the Install Policy button: Figure 66 — Install Policy 33. Click Install, to install the Bravo_Standard Security Policy. _____________________ _____________________ 85 Check Point Security Engineering 34. Confirm that the Security Policy for Bravo installed successfully: Figure 67 — Install Policy Details _____________________ _____________________ 86 Check Point Security Engineering 35. In the navigation pane, select the Gateways & Servers tab. 36. Confirm that all Check Point modules show a status of OK: Figure 68 — Gateway & Servers _____________________ _____________________ 87 Check Point Security Engineering END OF LAB 1.1 _____________________ _____________________ 88 Check Point Security Engineering Hotfixes Hotfixes are updates that are released to correct an issue discovered within the operating system or software. They can be released to address security vulnerabilities and inconsistencies or to provide enhancements and improvements. A Hotfix Accumulator (HFA) is a collection of stability and quality fixes that resolve multiple issues in different products. When installed, HFAs will overwrite the current hotfixes installed on the system. The name of a hotfix identifies the version it is compatible with. For example, R80_JUMBO_HF_1_Bundle _190 is a very large bundle of hotfixes for R80. In addition to hotfixes, some versions may have new features which require the installation of an Add-on. Check Point recommends installing the add-on only if the features enabled are required. When providing a fix to customers, Check Point supplies the updated file and installation package which will interactively install the fix. Gaia automatically provides a list of update packages available for download that are relevant to the operating system version installed. The Status and Actions page of CPUSE displays hotfixes that are available for download and hotfixes that have previously been downloaded, imported, and installed. Figure 69 — CPUSE T h e C P U S E A ge n t CPUSE is an advanced and intuitive tool used to update the Gaia operating system and Check Point software products. It supports the deployment of major and minor software releases, single hotfixes, and HFAs. A major release introduces new functionalities and technologies. Examples of a major release would be R77 and R80. Minor releases include the latest fixes released to customers. R77.30 is an example of a minor release. _____________________ _____________________ 89 Check Point Security Engineering The CPUSE tool automatically locates and displays software update packages and full images relevant to the Gaia operating system version installed on the computer. It also considers the role of the computer (management server, gateway, or Gaia standalone) and other properties. The CPUSE agent is installed on every Gaia-based machine and is responsible for all software deployment on that machine. The machine must be connected to the Internet to obtain software updates from the Check Point Cloud. Prior to every installation, CPUSE runs several verification tests to ensure that the package is compatible and can be installed on the machine without conflicts. To view available packages, in the Gaia Portal navigate to the Upgrades (CPUSE) section and select Status and Actions. All hotfix and minor version packages are displayed in categories and are filtered to show recommended packages only by default. Check Point recommends downloading the latest build of the CPUSE agent prior to applying a hotfix. In most cases, the latest build is downloaded automatically. To check the current build of the agent, click the Hotfixes link next to the CPUSE version number, near the top of the Status and Actions page. A pop-up window will appear displaying hotfix information. The installed build of the deployment agent is displayed at the bottom of the window. The current build can also be checked by using Clish and running the following command: HostName:0>show installer status build Figure 70 — CPUSE > Status and Actions > Hotfixes Link NOTE The latest build of CPUSE is gradually released to all customers; therefore, all machines may not receive the latest build at the same time. Hotfixes can be scheduled to download automatically, manually, or periodically; however, full installation and upgrade packages must be installed manually. _____________________ _____________________ 90 Check Point Security Engineering Download and Install Hotfixes Hotfixes are applied by first downloading or importing the CPUSE package and then installing the package on the machine. In the Gaia Portal, click the lock icon to obtain the lock over the configuration database before applying a hotfix and then navigate to the Status and Actions page. Every hotfix displayed as available for download may or may not be allowed or needed for installation onto your machine. Check Point recommends verifying the package to determine if it can be installed without conflicts. To verify a package, perform one of the following actions: • Select the package and click the More button on the toolbar. From the list of options, click Verifier. Or, • Right-click the package and click Verifier. The Verifier Results window will display, indicating whether or not installation is allowed. If installation is allowed, proceed to download the package. The download progress is displayed in the Status column of the hotfix. The download may be paused at any time. When paused, the status of the package will change to Pausing Download and then to Partially Downloaded and may be resumed at any time. Install the package after it has been successfully downloaded. To install a downloaded package, select the package and click the Install Update button, or right-click the package and select Install Update. Hotfixes can also be downloaded and installed all at once, by simply clicking the Install Update button. Most Jumbo Hotfix packages and private hotfix packages are posted to the Check Point Cloud. Click the Add Hotfixes from the cloud button to search, or enter a package identifier posted to the cloud. Contact Check Point Support to get the package’s CPUSE Identifier, or copy and paste the file name from the Check Point Download Center. Use the CPUSE Identifier search string to add the relevant CPUSE package from the Check Point Cloud. Once the package is added, its status will display as Available for Download. To import a package, click the More button located on the toolbar of the Status and Actions page, and select Import Package. In the Import Package window, browse to the package file, and click Upload. _____________________ _____________________ 91 Check Point Security Engineering CPUSE Software Updates Policy The WebUI offers different methods for downloading hotfixes via CPUSE: • Manually — This is the default method. Downloads can also be manually deployed in Clish. • Scheduled — The CPUSE agent can check for and download hotfixes at a specified time, such as daily, weekly, monthly, or on a selected date. • Automatic — The CPUSE agent will check for updates every three hours and automatically download hotfixes as they become available. The CPUSE agent can also send email notifications to administrators, which can inform them of update events, such as when new packages are available for download and the success or failure of a package installation. To define the CPUSE update policy and configure email notifications, under the Upgrades (CPUSE) section, select Software Updates Policy. Figure 71 — Software Updates Policy Software update packages can be imported and installed offline if: • the Gaia machine has no access to the Check Point Cloud. • the desired CPUSE package is not available in the Check Point Cloud. • the administrator prefers to manually import the CPUSE package. _____________________ _____________________ 92 Check Point Security Engineering T h e C e n t r a l D e p l oym e n t To o l System Administrators can automatically install CPUSE offline packages on multiple Security Gateways and cluster members at the same time using the Central Deployment Tool (CDT). The CDT is a utility that runs on Gaia operating system Security Management Servers and Multi-Domain Servers using software versions R77.30 and higher. The tool communicates with gateways and cluster members over SIC via TCP port 18209. Automatic installation on multiple managed gateways and cluster members is supported for the following package types: • • • • Upgrades to R77.30 Minor version upgrades Hotfixes Jumbo Hotfixes (bundles) or HFAs Prior to using the CDT, all Security Gateways and cluster members must be already installed and configured with SIC established and Security Policies installed. There are also several file requirements that must be met before the utility can be run. This includes the CDT executable and configuration files as well as several optional shell script files. The latest build of the CPUSE agent is also required. CDT uses CPUSE agents to perform package installation on remotely managed gateways and cluster members. The entire process is monitored and managed by the CDT. To begin using the CDT, connect to the command line on the management server, log into Expert mode, and then access the directory that contains the CDT files. Do not use CDT for clean installs of a major version. Also, CDT does not support upgrades or installs of ClusterXL in Load Sharing mode. For more detailed information regarding the CDT utility, refer to the Check Point Central Deployment Tool Administration Guide. Lab 1.2 Applying Check Point Hotfixes Lab 1.3 Configuring a New Security Gateway Cluster _____________________ _____________________ 93 L A B Applying Check Point Hotfixes 1.2 In this lab, you will use the CPUSE utility to patch existing R80.10 gateways. Ta sks : • Install the hotfix on the Security Gateway. Pe r for ma n c e Ob j ec t ive s: • Perform an on-line jumbo hotfix application to the Security Gateway Cluster. _____________________ _____________________ 94 Check Point Security Engineering Installing the Hotfix on the Security Gateways Locate the hotfixes available for an R80.10 Security Gateway and perform an upgrade on both Alpha Cluster members. 1. In SmartConsole, define a new Host object with the following information: Name: A-GUI-NAT Comment: NATed Alpha SmartConsole Color: Orange IP Address: 203.0.113.1 Figure 72 — New Host Configured 2. Click OK, and the system displays the following warning: Figure 73 — SmartConsole 3. Click Yes. _____________________ _____________________ 95 Check Point Security Engineering In the Bravo Security Policy, add the new Host to the Source field of the Management rule: 5. Publish the changes. 6. Install the Bravo Security Policy. 7. From A-GUI, use HTTPS to log into the Gaia Portal on B-GW (203.0.113.100) and confirm connectivity: 4. Figure 74 — Gaia Portal _____________________ _____________________ 96 Check Point Security Engineering 8. Next, use HTTPS to connect to the Gaia Portal of A-GW-01: 9. In the navigation pane, locate the Upgrades (CPUSE) section. _____________________ _____________________ 97 Check Point Security Engineering 10. In the navigation pane, select Status and Actions. The system displays the following page: Figure 75 — Status and Actions 11. Identify the hotfix to apply. NOTE In this lab, apply the latest Jumbo Hotfix available for your Security Gateway,. _____________________ _____________________ 98 Check Point Security Engineering 12. Right-click the hotfix to apply: Figure 76 — CPUSE Options 13. Select Install Update, and the system displays the following message: Figure 77 — Package Install _____________________ _____________________ 99 Check Point Security Engineering 14. Click OK, and the system begins downloading and then installing the selected hotfix: Figure 78 — CPUSE Download Progress NOTE When the system finishes the installation of the hotfix, it reboots automatically. _____________________ _____________________ 100 Check Point Security Engineering 15. After reboot, the system displays the Gaia Portal login page: Figure 79 — Gaia Portal Login 16. Use the following information to log into the Gaia Portal: Username: admin Password: Chkp!234 _____________________ _____________________ 101 Check Point Security Engineering 17. In the Upgrades (CPUSE) > Status and Actions page, confirm that the hotfix installed displays the following status: Installed, self-test passed... Figure 80 — Upgrades (CPUSE) - Status and Actions 18. Next, repeat this section to upgrade A-GW-02 with the same hotfix you applied to A-GW-01. END OF LAB 1.2 _____________________ _____________________ 102 L A B Configuring a New Security Gateway Cluster 1.3 Install and configure a second cluster member for Bravo. Convert the existing Bravo gateway to be a cluster member and upgrade it to R80.10. Complete the configuration by defining a Bravo Cluster object in SmartConsole. Ta sks : • Install a second Security Gateway at the Bravo site. • Reconfigure the Primary Gateway for integration into the cluster. • Define the Bravo Security Gateway Cluster. • Upgrade the old Bravo Security Gateway from R77.30 to R80.10. • Verify Bravo Gateway Cluster status of Active/Standby. Pe r for ma n c e Ob j ec t ive s: • Install the remote Security Gateway in a distributed environment and establish SIC. • Configure a new Security Gateway cluster object and verify its status. _____________________ _____________________ 103 Check Point Security Engineering Installing a Second Security Gateway In this section you will install and configure the second Bravo Security Gateway, which will be managed by the Alpha Security Management Server. 1. In VMware, verify that the following Virtual Machine (VM) has been created by your instructor: • Name: B-GW-02 • OS: Other • Version: Other • Disk Space: 60GB • Memory: 2GB • Four interfaces ◦ eth0 • Do not power on ◦ eth1 • Connect at power on • LAN 21 ◦ eth2 • Connect at power on • LAN 2 ◦ eth3 • Connect at power on • vmnet8 NOTE Your classroom configuration may be different. Check with your instructor before continuing to the next step. 2. Before powering on your VM, verify that it is configured as defined above. _____________________ _____________________ 104 Check Point Security Engineering 3. Power on the B-GW-02 virtual machine, and the Welcome to Check Point Gaia R80.10 screen appears: Figure 81 — Welcome to Check Point Gaia R80.10 4. Highlight the following option: Install Gaia on this system 5. Press the Enter key, to launch the installation. _____________________ _____________________ 105 Check Point Security Engineering 6. When the system is prepared for you to begin the operating system installation, it displays the Welcome screen: Figure 82 — Welcome 7. Tab to OK, and press Enter. The system displays the Keyboard Selection screen: Figure 83 — Keyboard Selection 8. Select the keyboard type to suit your region. _____________________ _____________________ 106 Check Point Security Engineering 9. Tab to OK, and press Enter. The system displays the Partitions Configuration screen: Figure 84 — Partitions Configuration _____________________ _____________________ 107 Check Point Security Engineering 10. Tab to OK, and press Enter. The system displays the Account Configuration screen: Figure 85 — Account Configuration NOTE Again, at this step, you are configuring the password for the admin user, the default OS level administrator. 11. Enter and confirm Chkp!234 as the admin account password. NOTE Verify that NumLock is on. It is not on by default after installation. If you haven’t already turned it on, do so now and re-enter and confirm your password. If you enter this password without turning NumLock on, you will not be able to log into the system. 12. Tab to OK, and press Enter. The system displays the Management Port screen. _____________________ _____________________ 108 Check Point Security Engineering 13. Use the arrow keys to highlight eth3: Figure 86 — Management Port NOTE In this classroom environment, all external interfaces are eth3. This Security Gateway is remotely managed by the A-SMS, so the management interface must be the external interface. 14. Tab to OK, and press Enter. The system displays the Management Interface screen. _____________________ _____________________ 109 Check Point Security Engineering 15. Use the following information to configure the Management Interface screen: IP address: 203.0.113.103 Netmask: 255.255.255.0 Default gateway: 203.0.113.254 Figure 87 — Management Interface _____________________ _____________________ 110 Check Point Security Engineering 16. Tab to OK, and press Enter. The system displays the Confirmation screen: Figure 88 — Confirmation 17. In the Confirmation screen, tab to OK, and press Enter. 18. After the drive is formatted and the installation is complete, the system displays the following screen: Figure 89 — Installation Complete _____________________ _____________________ 111 Check Point Security Engineering 19. Press Enter, to reboot your system. 20. After reboot, the system displays the following prompt: Figure 90 — Login Prompt _____________________ _____________________ 112 Check Point Security Engineering Configuring the Bravo Security Gateway with the First Time Configuration Wizard Follow these steps to configure the branch office Security Gateway and activate its default trial license. NOTE Your instructor will provide alternate directions if you use other licenses. From the A-GUI Virtual Machine, launch an Internet browser, such as Firefox or Internet Explorer. 2. In the address field, type the following: 1. https://203.0.113.103 NOTE Be sure that you are using HTTPS. Press Enter, and your browser should warn you that the site’s Security Certificate is from an untrusted source. 4. Ignore this warning and continue to the Login screen: 5. Log into B-GW-02 with the following credentials: 3. Username: admin Password: Chkp!234 _____________________ _____________________ 113 Check Point Security Engineering 6. Press Enter, and the system displays the following window: Figure 91 — Gaia First Time Configuration Wizard _____________________ _____________________ 114 Check Point Security Engineering 7. Click Next, and the system displays the Deployment Options page: Figure 92 — Deployment Options 8. Verify that the following option is selected: Continue with Gaia R80.10 configuration _____________________ _____________________ 115 Check Point Security Engineering 9. Click Next, and the system displays the Management Connection page: Figure 93 — Management Connection 10. Use the information below to verify that the Security Gateway’s network connection is configured properly: Interface: eth3 Configure IPv4: Manually Configure IPv4: 203.0.113.103 Subnet Mask: 255.255.255.0 Default Gateway: 203.0.113.254 Configure IPv6: Off _____________________ _____________________ 116 Check Point Security Engineering 11. Click Next, and the system displays the Connection to UserCenter page: Figure 94 — Connection to UserCenter 12. Click Next, and the system displays the Device Information page. 13. Use the following information to configure the Device Information page: Host Name: B-GW-02 Domain Name: Leave Blank _____________________ _____________________ 117 Check Point Security Engineering 14. Click Next, and the system displays the Date and Time Settings page: Figure 95 — Date and Time Settings 15. Verify that the time and date is correct for your area. _____________________ _____________________ 118 Check Point Security Engineering 16. Click Next, and the system displays the Installation Type page: Figure 96 — Installation Type _____________________ _____________________ 119 Check Point Security Engineering 17. Select Security Gateway or Security Management, and click Next. The system displays the Products page. 18. On the Products page, uncheck the Security Management option. 19. Use the information below to configure the Products page: Security Gateway: Selected Security Management: Deselected Unit is a part of cluster type: ClusterXL Automatically download Blade Contracts and other important data (highly recommended): Selected Figure 97 — Products _____________________ _____________________ 120 Check Point Security Engineering 20. Click Next, and the system displays the Secure Internal Communications (SIC) page: Figure 98 — Secure Internal Communications (SIC) 21. Enter and confirm sic123 as the Activation Key. _____________________ _____________________ 121 Check Point Security Engineering 22. Click Next, and the system displays the Summary page: Figure 99 — Summary 23. Click Finish, and the system asks you if you want to start the configuration: Figure 100 — First Time Configuration Wizard 24. Click Yes. 25. Once the configuration process is complete, the system prompts you with a restart message: Figure 101 — First Time Configuration Wizard _____________________ _____________________ 122 Check Point Security Engineering 26. Click OK, and the system displays the Login window after reboot: Figure 102 — Login Window 1. Log into B-GW-02 with the following credentials: Username: admin Password: Chkp!234 2. Click the Log In button, and the Gaia Portal displays the configuration settings of the newly configured Security Gateway. _____________________ _____________________ 123 Check Point Security Engineering Using the Gaia Portal to Configure the Security Gateway Define the interfaces and login message for the second Bravo gateway. 1. Review Gaia Portal’s Overview page: Figure 103 — Overview 2. In the Navigation pane, identify the Network Management section. _____________________ _____________________ 124 Check Point Security Engineering 3. Click Network Interfaces, and the system displays the Network Interfaces page: Figure 104 — Network Interfaces NOTE Notice how only eth3 is configured. This is your management interface. In this lab, this also represents your external network. _____________________ _____________________ 125 Check Point Security Engineering 4. Select eth1, and click Edit. The system displays the Edit window: Figure 105 — Edit eth1 5. Use the information below to configure eth1: Enable: Checked Comment: Internal IPv4 Address: 192.168.21.3 Subnet Mask: 255.255.255.0 _____________________ _____________________ 126 Check Point Security Engineering 6. Click OK, and the system saves the new eth1 configuration. Figure 106 — Network Interfaces Double-click eth3, and the system displays a warning. 8. Click OK, and the system displays the Edit window. 9. Use the information below to configure eth3: 7. Enable: Checked Comment: External IPv4 Address: 203.0.113.103 Subnet Mask: 255.255.255.0 _____________________ _____________________ 127 Check Point Security Engineering 10. Verify that the newly configured eth3 appears as follows: Figure 107 — Edit eth3 11. Click OK, to return to the Network Interfaces page. 12. Select eth2, and click Edit. 13. Use the information below to configure eth2: Enable: Checked Comment: Sync IPv4 Address: 192.168.20.3 Subnet Mask: 255.255.255.0 14. Click OK. _____________________ _____________________ 128 Check Point Security Engineering 15. Verify that your interfaces appear as follows: Figure 108 — Network Interfaces 16. In the Management Interface section of the page, notice that the current Management Interface is set to eth3. _____________________ _____________________ 129 Check Point Security Engineering 17. In the Navigation pane, under Network Management, click IPv4 Static Routes: Figure 109 — Network Management - IPv4 Static Routes 18. Verify that the default gateway is 203.0.113.254. _____________________ _____________________ 130 Check Point Security Engineering 19. Click the Add Multiple Static Routes button. 20. Add the following Static routes: 10.1.1.0/24 203.0.113.1 192.168.11.0/24 203.0.113.1 192.168.12.0/24 203.0.113.1 Figure 110 — Add Multiple Routes _____________________ _____________________ 131 Check Point Security Engineering 21. Click Save, and the system adds the static routes: Figure 111 — Network Management - IPv4 Static Routes Configured _____________________ _____________________ 132 Check Point Security Engineering 22. In the Navigation pane, under System Management, click Messages: Figure 112 — System Management - Messages _____________________ _____________________ 133 Check Point Security Engineering 23. In the Banner Message field add the following text: B-GW-02 Unauthorized access of this server is prohibited and punishable by law. Figure 113 — System Management - Messages 24. Click the Apply button. 25. From the toolbar, click Sign Out. _____________________ _____________________ 134 Check Point Security Engineering Re-configuring the Primary Gateway Reconfigure the primary Security Gateway at Bravo to function as part of a cluster. 1. From A-GUI, use HTTPS to connect to the Gaia Portal on B-GW (203.0.113.100): Figure 114 — Gaia Portal - Overview In the navigation pane, select Network Management > Hosts and DNS. 3. In the Hosts and DNS page, change the Host Name to the following: 2. B-GW-01 _____________________ _____________________ 135 Check Point Security Engineering 4. Click Apply. Figure 115 — Hosts and DNS Configured 5. In the navigation pane, select System Management > Messages. _____________________ _____________________ 136 Check Point Security Engineering 6. Modify the Banner Message to reflect the new name of this Security Gateway (B-GW-01): Figure 116 — Messages Configured 7. Log out of the portal on B-GW-01. _____________________ _____________________ 137 Check Point Security Engineering 8. From the virtual system of the first Security Gateway (B-GW-01), run the cpconfig script: Figure 117 — cpconfig From the Configuration Options, review the available options. 10. If option six reads as follows, type 6 and press Enter: 9. 6 Enable Cluster membership for this gateway If option six displays the following, exit cpconfig and skip to step 13: Disable Cluster membership for this gateway 11. Press Y to confirm that you want to enable the cluster membership: Figure 118 — Cluster Membership Enabled 12. Reboot B-GW-01 to enable the changes. _____________________ _____________________ 138 Check Point Security Engineering 13. At A-GUI, open SmartConsole, and remove B-GW from all rules in all Rule Bases. 14. If configured, remove all references of B-GW from the IPSec VPN > MyIntranet > Participating Gateways fields. 15. Disable the Stealth Rule. 16. In the toolbar, click the application Menu button. 17. Select Manage Policies and Layers, and the system displays the following: Figure 119 — Manage Policies and Layers 18. Identify the policies that indicate B-GW as an Installation Target. _____________________ _____________________ 139 Check Point Security Engineering 19. Select the Bravo_Standard policy and click the Edit icon. The system displays the following: Figure 120 — Policy - General 20. In the navigation pane, select installation Targets. _____________________ _____________________ 140 Check Point Security Engineering 21. Remove the B-GW object from the Specific Gateways list. 22. Select the following option: All Gateways Figure 121 — Policy - Installation Targets Configured 23. Click OK. _____________________ _____________________ 141 Check Point Security Engineering 24. Perform the above edits on all other policies that have B-GW as a Installation Target: Figure 122 — Manage Policies and Layers 25. Click Close. 26. Edit the B-INT-NET object. _____________________ _____________________ 142 Check Point Security Engineering 27. In the NAT page, change the Install On Gateway setting to All: Figure 123 — Network Configured 28. Edit all remaining objects that reference B-GW. 29. Publish the changes to the database. 30. Next, locate the B-GW object in the objects list. 31. Right-click B-GW and select Delete. The system displays the following window: Figure 124 — SmartConsole 32. Click Yes. 33. Publish the changes to the database. _____________________ _____________________ 143 Check Point Security Engineering 34. From the Clish prompt on B-GW-01, type the following, and press Enter: set interface eth3 ipv4-address 203.0.113.102 mask-length 24 Figure 125 — set interface 35. Now, run the following command to reconfigure the internal interface: set interface eth1 ipv4-address 192.168.21.2 mask-length 24 36. Run the following command to reconfigure the sync interface: set interface eth2 ipv4-address 192.168.20.2 mask-length 24 37. At the prompt, type the following and press Enter: save config Figure 126 — Save Config 38. Run cpconfig to reset SIC, using sic123 for the activation key. 39. Exit cpconfig. 40. At the prompt, type the following, and press Enter. exit _____________________ _____________________ 144 Check Point Security Engineering 41. After the services restart, use HTTPS to log back into the Gaia Portal on B-GW-01 (203.0.113.102): 42. Confirm that the newly configured IP addresses appear as follows: Figure 127 — Re-configured B-GW-01 Interfaces 43. Enable the Sync interface, if it is not already enabled. _____________________ _____________________ 145 Check Point Security Engineering Configuring the Alpha Security Policy to Manage the Remote Security Gateway Cluster Define the remote Security Gateway objects and incorporate it into the Alpha and Bravo Security Policies. From SmartConsole on A-GUI, expand the Objects pane from the right sidebar. 2. In the Home page of the Objects pane, click New > More > Network Object > Gateways & Servers. 3. Select Gateway. 4. Use the information below to configure the new Security Gateway object: 1. Name: B-GW-01 Color: Firebrick IPv4: 203.0.113.102 Comment: Bravo Security Gateway Cluster Member - One Version: R77.30 _____________________ _____________________ 146 Check Point Security Engineering 5. Verify that the new object appears as follows: Figure 128 — Check Point Gateway - General Properties Configured NOTE Use the IP address of the management interface to define the cluster member gateways. In the case of the Bravo cluster, that’s the external interface. _____________________ _____________________ 147 Check Point Security Engineering 6. Click OK, and the system displays a message indicating that no interfaces are defined. NOTE You will define the interfaces later, after establishing SIC. You are defining this object here to make the Alpha cluster aware of the Bravo members. This will ensure that A-GW-Cluster allows control connections to and from the Bravo gateways. Click Yes, to clear the message. 8. Use the information below to configure the new Security Gateway object: 7. Name: B-GW-02 Color: Firebrick IPv4: 203.0.113.103 Comment: Bravo Security Gateway Cluster Member - Two Version: R80.10 _____________________ _____________________ 148 Check Point Security Engineering 9. Verify that the new object appears as follows: Figure 129 — Check Point Gateway - General Properties Configured 10. Click OK. 11. Click Yes, to clear the message. _____________________ _____________________ 149 Check Point Security Engineering 12. Publish the changes to the database: Figure 130 — SmartConsole 13. Install the Alpha Security Policy: Figure 131 — Install Policy 14. Next, edit the B-GW-01 object. 15. Click the Communication button. _____________________ _____________________ 150 Check Point Security Engineering 16. Enter and confirm the following One Time Password to establish SIC: sic123 Figure 132 — Trusted Communication _____________________ _____________________ 151 Check Point Security Engineering 17. Click OK, and the system displays imported interface information: Figure 133 — Get Topology Results 18. Click Close. 19. Click OK. 20. In the Bravo Rule Base, add B-GW-01 to the following rules: ◦ Management ◦ Stealth _____________________ _____________________ 152 Check Point Security Engineering 21. Install the Bravo Security Policy on B-GW-01: Figure 134 — Install Policy 22. From A-GUI, use HTTPS to connect to B-GW-01 (203.0.113.102): Figure 135 — Gaia Portal Login 23. Log into B-GW-01 as admin. _____________________ _____________________ 153 Check Point Security Engineering 24. In the Gaia Portal, navigate to Upgrades (CPUSE) > Status and Actions: Figure 136 — Upgrade (CPUSE) - Status and Actions NOTE If the CPUSE page fails to populate with available packages after some time, it may be updating the Deployment Agent. If this occurs, log out of the Gaia Portal and wait about 60 seconds. Then, log back into the Gaia Portal as admin and attempt this step again. _____________________ _____________________ 154 Check Point Security Engineering 25. In the Check Point Upgrade Service Engine (CPUSE) page, locate the Major Versions list of available upgrade packages. 26. Select the following package: R80.10 Fresh Install and Upgrade from R7X 27. Right click the package to install: Figure 137 — Package Menu Options _____________________ _____________________ 155 Check Point Security Engineering 28. Select Download, and the system downloads the upgrade package to install: Figure 138 — Upgrade Package Downloaded _____________________ _____________________ 156 Check Point Security Engineering 29. Right-click the downloaded package: Figure 139 — Downloaded Package Menu Options 30. Select the Upgrade option, and the system displays the following message: Figure 140 — Image Upgrade 31. Click OK, to begin the upgrade process. _____________________ _____________________ 157 Check Point Security Engineering 32. After the system reboots, log into B-GW-01 as admin: Figure 141 — Gaia Portal Login 33. Navigate to the Upgrades (CPUSE) - Status and Actions page and confirm that the upgrade completed successfully: Figure 142 — Upgrades (CPUSE) - Status and Actions _____________________ _____________________ 158 Check Point Security Engineering 34. From SmartConsole, select the Gateways & Servers tab. 35. Confirm that the B-GW-01 object has a status of OK. Figure 143 — Gateways & Servers NOTE It is normal for the B-GW-01 object to still appears as a version R77.30 Security Gateway in this view, at this time. This information will be updated with the correct information after the server responds to a specific call for information. 36. Select the B-GW-01 object. _____________________ _____________________ 159 Check Point Security Engineering 37. In the Summary tab, click the Device & License Information link. The system displays the following window: Figure 144 — Device & License Information 38. Notice that the version now shows the correct information. 39. Close the Device & License Information window. _____________________ _____________________ 160 Check Point Security Engineering 40. Edit the B-GW-01 object, and the system displays the following message: Figure 145 — Check Point SmartConsole NOTE If the B-GW-01 object does not show a version of R80.10, change it manually here. 41. Click OK, to clear the message. _____________________ _____________________ 161 Check Point Security Engineering 42. Confirm that the Platform Version now shows R80.10: Figure 146 — Check Point Gateway - General Properties Configured 43. Click OK. 44. Next, establish SIC with B-GW-02, using sic123 as the one-time password. 45. Publish the changes to the database. 46. Install the Alpha_Standard Security Policy. _____________________ _____________________ 162 Check Point Security Engineering 47. From the Home page of the Objects pane, click New > More > Network Object > Gateways & Servers: Figure 147 — Objects Menu 48. Select Cluster, and the system displays the following window: Figure 148 — Check Point Security Gateway Cluster Creation _____________________ _____________________ 163 Check Point Security Engineering 49. Select the following option and click Classic Mode: Don’t show this again. 50. Use the information below to configure the new Security Gateway object: Name: B-GW-Cluster IPv4 Address: 203.0.113.100 Comment: Bravo Security Gateway Cluster Version: R80.10 Network Security: Firewall Figure 149 — Check Point Gateway - General Properties _____________________ _____________________ 164 Check Point Security Engineering 51. Verify that the version selected for the Bravo Cluster object is defined as R80.10. 52. In the navigation pane, select Cluster Members: Figure 150 — Gateway Cluster Properties - Cluster Members 53. In the Cluster Members page, click the Add button. _____________________ _____________________ 165 Check Point Security Engineering 54. Select Add Existing Gateway, and the system displays the following window: Figure 151 — Add Gateway to Cluster 55. Select B-GW-01. 56. Click OK, and the system displays the following message: Figure 152 — Check Point SmartConsole _____________________ _____________________ 166 Check Point Security Engineering 57. Click Yes, and the system adds the gateway to the Member Gateways list: Figure 153 — Member Gateways - Gateway Added _____________________ _____________________ 167 Check Point Security Engineering 58. Next, add B-GW-02 to the Member Gateways list: Figure 154 — Member Gateways - Gateways Added 59. Click OK. _____________________ _____________________ 168 Check Point Security Engineering 60. In the navigation pane, select Network Management: Figure 155 — Network Management _____________________ _____________________ 169 Check Point Security Engineering 61. Click the Get Interfaces button, and the system retrieves and displays the interface information from the cluster members: Figure 156 — Network Management - Get Interfaces _____________________ _____________________ 170 Check Point Security Engineering 62. Double-click eth1, to edit the interface. 63. Use the information below to configure eth1: Name: eth1 Comment: Internal Network Type: Cluster Virtual IPv4: 192.168.21.1/24 Figure 157 — Network eth1 64. Confirm that the interface Topology settings are as follows: Leads To: This Network (Internal) Security Zone: None Anti-Spoofing: Prevent and Log _____________________ _____________________ 171 Check Point Security Engineering 65. Double-click eth2, to edit the interface. 66. Use the information below to configure eth2: Name: eth2 Comment: Sync Network Type: Sync Virtual IPv4 Address: N/A Figure 158 — Network eth2 67. Confirm that the interface Topology settings are as follows: Leads To: This Network (Internal) Security Zone: None Anti-Spoofing: Prevent and Log _____________________ _____________________ 172 Check Point Security Engineering 68. Double-click eth3, to edit the interface. 69. Use the information below to configure eth3: Name: eth3 Comment: External Network Type: Cluster Virtual IPv4: 203.0.113.100/24 Figure 159 — Network eth3 70. Confirm that the interface Topology settings are as follows: Leads To: Internet (External) Security Zone: None Anti-Spoofing: Prevent and Log _____________________ _____________________ 173 Check Point Security Engineering 71. Confirm that the interfaces are configured as follows: Figure 160 — Network Management Configured _____________________ _____________________ 174 Check Point Security Engineering 72. Click OK, and verify that the new B-GW-Cluster object appears in the Gateways and Servers section of the Objects pane: Figure 161 — Security Policies - Access Control 73. Select the Bravo Security Policy. _____________________ _____________________ 175 Check Point Security Engineering 74. Remove all Security Gateway objects from the Stealth and Management rules in the Bravo Security Policy: Figure 162 — Security Gateway Removed from Stealth and Management Rules 75. Add the B-GW-Cluster to the Destination column of the Stealth and Management rules: Figure 163 — Stealth Rule Modified NOTE If the Stealth Rule is disabled here, enable it before continuing to the next step. _____________________ _____________________ 176 Check Point Security Engineering 76. From the Application Menu, select Manage Policies and Layers. The system displays the following window: Figure 164 — Manage Policies and Layers _____________________ _____________________ 177 Check Point Security Engineering 77. Select the Bravo_Standard policy. 78. Click the Edit button, and the system displays the Policy window: Figure 165 — Policy _____________________ _____________________ 178 Check Point Security Engineering 79. In the navigation pane, select Installation Targets. 80. Select the following option: Specific Gateways 81. Add B-GW-Cluster to the Specific Gateways list: Figure 166 — Policy Configured 82. Click OK. 83. Click Close. _____________________ _____________________ 179 Check Point Security Engineering 84. Publish the changes to the database. 85. Install the Bravo Security Policy. 86. Verify that only the B-GW-Cluster (203.0.113.100) is listed as a policy target. 87. Click the Install button. 88. From the B-Host virtual machine, launch a web browser. 89. Use HTTP to connect to A-DMZ (192.168.12.101). 90. In SmartConsole, select Logs & Monitor from the Navigation bar: Figure 167 — Logs & Monitor - Logs _____________________ _____________________ 180 Check Point Security Engineering 91. View the log showing the accepted HTTP traffic from B-Host to A-DMZ: Figure 168 — Log Details 92. Close the log file. _____________________ _____________________ 181 Check Point Security Engineering END OF LAB 1.3 _____________________ _____________________ 182 Check Point Security Engineering CLI Commands Check Point Gaia’s powerful CLI commands and Clish shell are designed for users who prefer to interact with the system by executing commands or scripts.The most common operations are: • • • • • add set show save delete CLI commands can be entered in two modes; Standard mode and Expert mode. Standard mode is the default Check Point shell (Clish) and provide commands for easy configuration and routine administration such as cpstart and cpstop. However, most system commands are not supported. The prompt for standard mode commands is: [hostname]> Expert mode allows advanced Check Point system and underlying Linux functions access to the Gaia operating system. To enter Expert mode, use the <expert> command in Clish. This command opens the Bash shell. The prompt for Expert mode is: [Expert@hostname]# An Expert mode user can run Linux commands such as ls, cd and pwd as they would on any Linux system to directly manipulate the Gaia operating system file system. Basic Check Point commands such as fw ver and cpconfig can also be run from the Expert mode CLI, similar to Gaia Clish. CLI-inclined users can also use CLI commands and tools in Export mode to create automation scripts. These tools include: • dbedit — creates and configures objects and rules in the database for the Security Policy. • fwm load — installs the specified Security Policy on Security Gateways. • send_command — runs functions which are not included with standard Check Point CLI commands and tools. CLI commands and multiple shells are available for all Check Point Gaia-based operating systems, software blades and features. Several useful commands are noted in this section, however many other commands are discussed in greater detail throughout this course. _____________________ _____________________ 183 Check Point Security Engineering Environment Commands Use these commands to set the CLI environment for a user. The syntax to set the client environment is: set clienv <parameter> To save the client environment permanently: save client To acquire the configuration lock from another administrator: lock database override To set inactivity timeout when working with CLI: set inactivity-timeout <value> With this command, <value> is the timeout in minutes. Parameter Description config-lock [on|off] Default value of the Clish configuration lock parameter. If set to on, Clish will lock the configuration and no configuration changes can be made in the WebUI. debug [0 - 6] Debug level. Zero is the default level; do not debug, display error messages only. Level 6 will show handler invocation parameters and results. echo-cmd [on|off] When set to on, echoes all commands before executing them. The default is off. on-failure [continue| stop] When the system encounters an error, commands from a file or script will either continue to run or stop running. The default is stop. output [pretty |structured|xml] Determines the command line output format. The default is pretty. prompt <value> Command prompt string. Defines the appearance of the command prompt. Can consist of any printable characters and a combination of variables. rows <integer> Number of rows to display in the terminal window. syntax-check [on|off] When set to on, puts the shell into syntax-check mode. Commands are checked syntactically and are not executed, but values are validated. The default is off. Table 3: Environment Command Parameters _____________________ _____________________ 184 Check Point Security Engineering System Configuration Commands Gaia system configuration settings can be saved as a ready-to-run CLI script. To save the system configuration to a CLI script: save configuration <scriptname> To restore configuration settings: load configuration <scriptname> To see the latest configuration settings: show configuration This example shows part of the configuration settings as last saved to a CLI script: mem103> show configuration # # Configuration of mem103 # Language version: 10.0v1 # Exported by admin on Mon Mar 19 15:06:22 2016 # set hostname mem103 set timezone London / Europe set password-controls min-password-length 6 set password-controls complexity 2 set password-controls palindrome-check true set password-controls history-checking true set password-controls history-length 10 set password-controls password-expiration never set ntp active off set router-id 6.6.6.103 set IPv6-state off set snmp agent off set snmp agent-version any set snmp community public read-only set snmp traps trap authorizationError disable set snmp traps trap coldStart disable set snmp traps trap configurationChange disable _____________________ _____________________ 185 Check Point Security Engineering System Management Commands There are a multitude of system management tasks that can be performed and configured using CLI, such as managing users, synchronizing system clocks, configuring SNMP, banner messages, core dumps, and more. Examples of several of these tasks are noted below. To add a user account: add user <username> uid 200 homedir /home/<username> To modify user accounts: set user <username> To set a user password: set user <username> password To show the current system date and time: show clock To display the current system day, date, and time: Thu Aug 25 15:25:00 2016 CST A Banner message can be configured to show users when they log in. To set a banner message: set message banner <on | off> msgvalue <banner> Example of a banner message: set message banner on msgvalue “This system is private and confidential” To enable SNMP: set snmp agent on To enable or disable core dumps: set core-dump [enable|disable] To enable or disable IPv6 support: set IPv6-state [on|off] show IPv6-state _____________________ _____________________ 186 Check Point Security Engineering Network Administration Commands The syntax to configure physical interfaces is: set interface <IF> IPv4-address <IP> mask-length <Mask> subnet-mask <Mask> IPv6-address <IF> mask-length <Mask> IPv6-autoconfig [on |off] comments <Text> mac-addr <MAC> mtu <MTU setting> state [on | off] link-speed <Speed_Duplex> auto-negotiation [on | off] Parameter Description interface <IF> Configures a physical or virtual interface with an Interface name. IPv4-address <IP> Assigns the IPv4 or IPv6 address. IPv6-address <IP> IPv6-autoconfig [on|off] If on, automatically gets the IPv6 address from the DHCP. mask-length <Mask> Configures IPv4 or IPv6 subnet mask length using CIDR (/xx) notation. subnet-mask <Mask> Configures IPv4 subnet mask using dotted decimal notation. comments <Text> Adds free text comments to an interface definition. mac-addr <MAC> Configures the interface hardware MAC address. mtu <MTU setting> Configures the Maximum Transmission Unit (MTU) size for an interface with an integer greater than or equal to 68. The default is 1500. state [on|off] Sets interfaces status to enabled or disabled. link-speed <Speed_Duplex> Configures the interface link speed in Mbps and duplex status values, such as 10M/half or 10M/full. auto-negotiation [on|off] Configures automatic negotiation of interface link speed and duplex settings to enabled or disabled. Table 4: Network Administration Command Parameters _____________________ _____________________ 187 Check Point Security Engineering Examples: set interface 255.255.255.0 set interface set interface set interface eth2 IPv4-address 40.40.40.1 subnet-mask eth2 mtu 1500 eth2 state on eth2 link-speed 1000M/full To delete an interface setting: delete interface eth2 IPv4-address Gaia automatically identifies physical interfaces, such as NICs, installed on a computer. Therefore, they cannot be added or deleted using the WebUI or the CLI. Gaia devices can also be configured to be a Dynamic Host Configuration Protocol (DHCP) server. DHCP servers allocate IP addresses and other network parameters to network hosts, thus eliminating the necessity of configuring each host manually. DHCP server subnets can be configured on the Gaia device interfaces to allocate network parameters, such as IPv4 addresses and DNS parameters, to hosts behind the Gaia interface. Use DHCP commands to configure the Gaia device as a DHCP server for network hosts. To create DHCP server subnets: add dhcp server <parameter> <value> netmask <value> include-ip-pool start <value> end <value> exclude-ip-pool start <value> end <value> _____________________ _____________________ 188 Check Point Security Engineering To change DHCP server subnet configurations: set dhcp server subnet <value> Parameter Description subnet <value> The IPv4 address of the DHCP subnet on an Ethernet interface of the Gaia device. Hosts behind the Gaia interface get IPv4 addresses from address pools in the subnet. For example, 192.168.1.0/24 netmask <value> The IPv4 subnet mask in CIDR notation. For example, /24 start <value> The IPv4 address that starts or ends the allocated IP pool range. end <value> include-ip-pool <value> The range of IPv4 addresses to include in the IP pool. For example 192.0.2.20-192.0.2.90 exclude-ip-pool <value> The range of IPv4 addresses to exclude from the IP pool. enable Enable or disable the DHCP server subnet, or the DHCP server process (depending on the context). disable default-gateway <value> The IPv4 address of the default gateway for the network hosts. domain <value> The domain name of the network hosts. For example, testdomain.com. dns <value> The Domain Name Service (DNS) servers that the network hosts will use to resolve host names. Optionally, specify a primary, secondary and tertiary server in the order of precedence. all All DHCP server configuration settings. subnet DHCP server subnet configuration settings. subnet <value> ip-pools The IP pools in the DHCP server subnet, and their status: enabled or disabled. status [enabled|disabled] The status of the DHCP server process: enabled or disabled. Table 5: DHCP Command Parameters _____________________ _____________________ 189 Check Point Security Engineering Gaia uses the Domain Name Service (DNS) to translate host names in to IP addresses. To enable DNS lookups, the primary DNS server must be entered for your system. The system will consult the primary DNS server to resolve host names. A DNS suffix, which is a search for host-name lookup, can also be defined. To configure the DNS server: set dns primary <value> To configure the DNS suffix: set dns suffix <value> The value parameter for both examples is an IPv4 or IPv6 address. Additional CLI Commands There are many more CLI commands available, such as commands which allow you to define static routes and configure system logging. To view a list of all possible CLI commands, log into Clish and press the Esc tab on your keyboard twice. For operation specific commands, press the tab key twice. _____________________ _____________________ 190 Check Point Security Engineering CPInfo CPInfo is a Check Point utility that collects diagnostic data on a machine at the time of execution. The CPInfo output file allows Check Point’s support engineers to analyze customer setups remotely. The support engineer opens the CPInfo file in demo mode, while viewing actual customer Security Policies and objects. This process allows for a more in-depth analysis of all of the customer’s configuration options and environment settings. CPInfo collects the entire gateway installation directory, including $FWDIR/log/* files. Some of the other viewable information includes routing tables, system message logs, and the output of various command, such as ifconfig and fw ctl pstat commands. CPInfo files are sent to Check Point Technical Support via email or FTP. To use CPInfo, make sure that the platform’s current version of cpinfo is installed to extract the CPInfo file. Run the cpinfo command with the relevant flags in Clish or in Expert mode: • -l — This flag is to include log records in the output file. Including log records will yield a very large output. • -z — This flag instructs the utility to gzip (compress) the output. • -v — This flag prints version information. • -n — This flag tells the utility to not collect and create a CPInfo file. It should be used with -f. • -f <file> — This flag uploads additional files to the Check Point server. It should be used in combination with -n and -i. If the file to be uploaded is not compressed, CPInfo will first compress it and then upload it. • -o <filename> — This flag directs the output to a file and to the screen. It also specifies a file name. • -y — This flag instructs the utility to display all installed hotfixes. • -k — This flag includes Firewall tables in the output. • -i — This flag is for non-interactive mode. • -d — This flag instructs the utility not to check for updates. • -a — This flag forces the update check. By default, the update check of CPInfo utility is once a week. • -u — This flag connects to the User Center with username and password. • -e <e-mail> — Specifies a single email or multiple emails of people that should be notified about upload status. Multiple emails must be enclosed in double-quotations and separated by semi-colons. For example: “<email #1>;<email #2>” • -s <SR_Number> — Specifies the Service Request number opened with Check Point Support. For example, -s 28-123456789 • -T <timeout> — Specifies the timeout in seconds for the commands executed by the utility. This does not apply to collection of the CPInfo output file itself. The default timeout is 600 seconds (5 minutes). • -h — The flags displays the built-in help. _____________________ _____________________ 191 Check Point Security Engineering Lab 1.4 Core CLI Elements of Firewall Administration _____________________ _____________________ 192 L A B Core CLI Elements of Firewall Administration 1.4 Use a selection of common commands and tools to manage the firewall and monitor and capture traffic logs for troubleshooting purposes. Ta sks : • Install the Security Policy and verify status with fw stat. • Uninstall the Policy and verify status with fw stat. • Run cpinfo on a Security Gateway. • Find information from cpinfo output. • Open cpinfo from InfoView. • Run the fw ctl pstat command. • Run basic fw monitor and tcpdump commands on a Security Gateway. Pe r for ma n c e Ob j ec t ive s: • Perform basic tasks related to Security Policy management from the Command Line Interface. • Use common commands to evaluate the condition of a Security Gateway. _____________________ _____________________ 193 Check Point Security Engineering Managing Policy and Verifying Status from the CLI Policy status for a Gateway is regularly verified in SmartConsole. The fw stat command is also useful to verify Policy status. In circumstances where you cannot log in to SmartConsole, fw unloadlocal can be used to uninstall the Policy. 1. From the A-GW-01 virtual machine, run the following command: fw stat Figure 169 — fwstat 2. Run fw unloadlocal from the command line: Figure 170 — fw unloadlocal NOTE Only run the fw unloadlocal command when absolutely necessary. Now that the Security Policy is no longer installed, all interfaces are currently open and passing traffic without inspection. _____________________ _____________________ 194 Check Point Security Engineering 3. Verify that the policy was removed by executing the fw stat command again: Figure 171 — fw stat 4. Run fw fetch 10.1.1.101 from the command line: Figure 172 — fw fetch localhost NOTE Ignore any error messages for services that have not started. 5. Run the fw stat command to verify that the Security Gateway was able to fetch the policy from the Security Management Server: Figure 173 — fw stat 6. Type the following command and press Enter: exit _____________________ _____________________ 195 Check Point Security Engineering Using cpinfo In this section, you will view a list of hotfixes applied to the Security Gateway and collect server configuration files. From A-GUI, use Putty to log into A-GW-01 (10.1.1.2). Once logged in, enter Expert mode. 2. At the Expert mode prompt for A-GW-01, run the following command: 1. cpinfo -y all Figure 174 — cpinfo -y all 3. ‘ Review all hotfixes applied to the Security Gateway. _____________________ _____________________ 196 Check Point Security Engineering 4. Next, run the following command: cpinfo -l -o A-GW-01-cpinfo.txt NOTE In the command above (cpinfo -l), that is a lower case L, not a number 1. 5. Press Enter, and the system asks if you for an SR number. Figure 175 — cpinfo -l -o NOTE You may not be prompted for an SR number. If not prompted, continue with the next step by typing n and pressing Enter. _____________________ _____________________ 197 Check Point Security Engineering 6. Type s, and press Enter. The file collection runs for about a minute. As cpinfo runs, status messages will display: Figure 176 — cpinfo -l -z 7. Once cpinfo has finished, the output file A-GW-01-cpinfo.txt will be created in the following default directory for the administrator: /home/admin _____________________ _____________________ 198 Check Point Security Engineering 8. From A-GUI, use HTTPS to connect to A-GW-01 (10.1.1.2). Figure 177 — Login Window 9. Use the following credentials to log into the Gaia Portal: Username: admin Password: Chkp!234 _____________________ _____________________ 199 Check Point Security Engineering 10. In the navigation pane, select User Management > Users: Figure 178 — Users _____________________ _____________________ 200 Check Point Security Engineering 11. In the Users page, click the Add button. NOTE If necessary, gain control of the configuration by clicking the Lock in the Gaia Portal toolbar. 12. Using the information below, configure a new user: Login Name: gaiaAdmin Password: Chkp!234 Real Name: Gaiaadmin Home Directory: /home/gaiaAdmin Shell: /bin/bash Assigned Roles: adminRole Access Mechanisms: Web Clish Access Figure 179 — Add User Configured _____________________ _____________________ 201 Check Point Security Engineering 13. Click OK, and the system adds the new user to the Users list: Figure 180 — Users 14. Log out of the Gaia Portal. _____________________ _____________________ 202 Check Point Security Engineering 15. From A-GUI, use the following credentials to start a WinSCP session to A-GW-01: Host Name: 10.1.1.2 User name: gaiaAdmin Password: Chkp!234 Figure 181 — Login - WinSCP _____________________ _____________________ 203 Check Point Security Engineering 16. Navigate to and locate the compressed A-GW-01-cpinfo.txt.info.gz file (/home/admin): Figure 182 — WinSCP Session 17. Transfer the file to A-GUI. NOTE If using FTP from the Security Gateway to a FTP server, make sure to use Binary mode. _____________________ _____________________ 204 Check Point Security Engineering 18. Navigate to the directory to which you transferred the text file, and open it in WordPad: Figure 183 — CPINFO File _____________________ _____________________ 205 Check Point Security Engineering 19. Scroll down to view the CP Status section of the file. 20. Using the Edit menu’s Find option, identify the following: ◦ FireWall-1 Version Information ◦ Version ◦ CP License Figure 184 — Find 21. Exit WordPad. _____________________ _____________________ 206 Check Point Security Engineering Reconfiguring the Security Policies Modify both Security Policies to allow FTP traffic between the sites. In the Bravo_Standard policy, add a new rule above the Cleanup rule. 2. Use the information below to configure the new rule: 1. Name: Incoming Source: Any Destination: B-INT-NET Services & Applications: FTP Action: Accept Track: Log Figure 185 — Incoming Rule 1. In the Alpha_Standard policy, add a new rule above the LDAP rule. _____________________ _____________________ 207 Check Point Security Engineering 2. Use the information below to configure the new rule: Name: FTP Source: Any Destination: Alpha-Nets Services & Applications: FTP Action: Accept Track: Log Figure 186 — FTP Rule Publish the changes to the database. 4. Install the Bravo Security Policy. 5. Install the Alpha Security Policy. 3. _____________________ _____________________ 208 Check Point Security Engineering From A-GUI, log into the Gaia Portal on A-GW-01. 7. Define a new user called scpAdmin with the adminRole and scponly shell access: 6. Figure 187 — Add User _____________________ _____________________ 209 Check Point Security Engineering 8. Click OK, to add the user to the Users list: Figure 188 — Users 9. Log out of Gaia Portal. _____________________ _____________________ 210 Check Point Security Engineering Using fw monitor In this section you will test fw monitor. It’s important to remember that in a production environment where a Security Gateway is already under heavy load, the fw monitor command can dramatically affect performance because we have to turn off acceleration. It is always best to test packet captures during offpeak times. 1. Execute the following command to verify that A-GW-01 is the Active gateway: cphaprob stat NOTE In Expert Mode on A-GW-02, if it is the Active gateway, execute the following commands to force A-GW-01 to become active: clusterXL_admin down clusterXL_admin up 2. In Expert Mode on A-GW-01, navigate to the following directory: cd /var/log/tmp NOTE Check Point recommends that you run the fw monitor command from a directory with plenty of space, such as /var/log, so that you do not fill up the hard drive. _____________________ _____________________ 211 Check Point Security Engineering 3. At the prompt, type the following, and press Enter: fwaccel off Figure 189 — fwaccel off NOTE This command turns off SecureXL acceleration and ensures a complete capture in the next step. 4. Type the following at the prompt to start fw monitor: fw monitor -o monitorfile.pcap Figure 190 — fw monitor 5. Generate FTP traffic from B-Host (192.168.21.201) to A-GUI (10.1.1.201). _____________________ _____________________ 212 Check Point Security Engineering From A-GW-01, type CTRL + C to end monitoring. 7. Use WinSCP to transfer the monitorfile.pcap to A-GUI from A-GW-01. 6. Figure 191 — monitorfile.pcap Transferred _____________________ _____________________ 213 Check Point Security Engineering 8. On A-GUI, double-click the transferred pcap file to review the created output in Wireshark: Figure 192 — monitorfile.pcap in Wireshark _____________________ _____________________ 214 Check Point Security Engineering 9. Locate the FTP traffic from 192.168.21.201 to 10.1.1.201: Figure 193 — FTP Traffic Identified NOTE To identify the FTP traffic in WireShark, use the following filter: tcp.port==21 _____________________ _____________________ 215 Check Point Security Engineering 10. Log in to A-GW-01, and type the following in Expert mode: fw monitor -e "accept src=203.0.113.100 or dst=10.1.1.201 and dport=21;" -ci 20 -o monitorfile2.pcap NOTE This monitors traffic to and from specific addresses and only captures twenty inbound events. 11. Generate FTP Traffic from: ◦ A-GUI to B-Host ◦ B-Host to A-GUI 12. From A-GW-01, type CTRL + C to end monitoring. NOTE When you return to A-GW-01, the fw monitor may have already ended. This happens when it reaches the specified number of records collected, which, in this case, is 20. 13. From A-GUI, use WinSCP to transfer the monitorfile2.pcap off the Security Gateway. _____________________ _____________________ 216 Check Point Security Engineering 14. Review the created output file to see that only the FTP traffic to and from 192.168.21.201 is shown: Figure 194 — monitorfile2.pcap in WireShark _____________________ _____________________ 217 Check Point Security Engineering Using tcpdump Use tcpdump to retrieve Layer 2 information from the Security Gateway. 1. From A-GW-01, run the following command in expert mode: tcpdump -i eth0 icmp -w dumpfile.pcap Generate ICMP traffic from A-GUI to the B-Host virtual machine. 3. On A-GW-01, type CTRL + C to end monitoring: 2. Figure 195 — Ending tcpdump _____________________ _____________________ 218 Check Point Security Engineering Use WinSCP to transfer the newly created tcpdump file to A-GUI. 5. Use WireShark to view the contents of the tcpdump file. 6. From A-GW-01, type the following, and press Enter: 4. fwaccel on END OF LAB 1.4 _____________________ _____________________ 219 Check Point Security Engineering Advanced Firewall The Check Point Firewall Software Blade builds on the award-winning technology first offered in Check Point’s Firewall solution and provides the industry’s best cyber security. Having demonstrated industry leadership and continued innovation since the introduction of the Firewall-1 in 1994, Check Point Firewalls are trusted by 100% of the Fortune 100 companies. C h e c k Poi n t F i r ewal l I n f r a s t r u c t u r e As a security expert considering the needs of your organization, in-depth knowledge of Security Gateways must be applied as you implement them beyond a simple distributed deployment. To establish a framework for assessing gateway performance in a complex network topology, you must understand the infrastructure. You should recall from the CCSA that fundamentally, Check Point security components are divided into the following components: • GUI Client • Security Management • Security Gateway GUI Client GUI applications, for object manipulation, log viewing and reporting, such as SmartView Monitor and SmartEvent, are all unified into one console (SmartConsole). These GUI applications offer you the ability to configure, manage and monitor security solutions, perform maintenance tasks, generate reports and enforce corporate policy in real-time. Check Point periodically releases new executables that include updates for SmartConsole applications. These updates are not always related to or aligned with Security Gateway hotfixes and are considered a separate, unrelated release track. Security Management The management component is responsible for all management operations in the system. It contains several elements, such as the management server, reporting suite, log server, etc. All of the functionality of the Management server is implemented in User-Mode processes, where each process is responsible for several operations. _____________________ _____________________ 220 Check Point Security Engineering Check Point Management (cpm) is the main management process. It provides the architecture for a unified security environment. CPM allows the GUI client and management server to communicate via web services using TCP port 19009. It empowers the migration from legacy Client-side logic to Server-side logic. The cpm process performs database tasks, such as creating, deleting, and modifying objects, and compiling policy. Processes controlled by CPM include: • web_services — Transfers requests to the dle_server. • dle_server — Contains all the logic of the server and validates information before it is written into the database. • object_store — Translates and writes data to the database. CPM saves all data in the Postgres SQL database and stores most of the data in Solr, a standalone search server powered by the Lucene Java search library. The Postgres SQL database contains objects, policies, users, administrators, licenses, and management data.The data is segmented into multiple database domains. Solr generates indexes of the data to be used for full text searching capabilities. Figure 196 — CPM Architecture _____________________ _____________________ 221 Check Point Security Engineering Additional significant management processes include: • fwm — Firewall Management (fwm) is on all management products, including MultiDomain Security Management, and on products that require direct GUI access, such as SmartEvent. The fwm process is used mainly for backward compatibility of gateways. It provides GUI client communication, database manipulation, policy compilation, and Management High Availability synchronization. • fwd — Check Point Firewall Daemon (fwd) allows other processes, including the kernel, to forward logs to external Log servers, as well as the Security Management Server. It communicates with the kernel using command line tools, such as the fw commands, kernel variables, and kernel control commands. • fwssd — A child process of fwd. It is responsible for managing Firewall Security Servers which provide a higher level of protocol enforcement. • cpd — Check Point Daemon (cpd) is a core process on every Check Point product. It allows Secure Internal Communication (SIC) functionality, pulls application monitoring status, transfers messages between Firewall processes, fetches and installs policy, and more. • cpwd — Check Point WatchDog (cpwd) invokes and monitors critical processes, such as Check Point daemons on the local machine, and attempts to restart them if they fail. Among the processes monitored by cpwd are cpd, fwd, and fwm. The cpwd_admin utility shows the status of processes and configures cpwd. _____________________ _____________________ 222 Check Point Security Engineering Security Gateway The Security Gateway, sometimes referred to simply as the Firewall, is the component in the system responsible for security enforcement, encryption/decryption, authentication, and accounting. The functionality of the Security Gateway is implemented both in User-Mode and in the kernel. The Security Gateway is a network device running an operating system which makes it vulnerable to possible Network layer attacks. To mitigate this vulnerability, some of the Firewall functionality is implemented in the kernel mode. This allows the traffic to be inspected before even getting to the operating system IP stack. Figure 197 — Operating System Kernel The Firewa ll Kernel The Firewall kernel is responsible for the majority of the Security Gateway’s operations, such as security enforcement, encryption/decryption, NAT, etc. In order to detect which part of the kernel might be responsible for a specific issue, start by considering the inner structure of the Firewall kernel and its interaction with the operating system kernel (Gaia), the hardware, and other kernel components, such as acceleration. There are certain processes that operate at the operating system level in the User Mode space and others that operate in kernel mode space. _____________________ _____________________ 223 Check Point Security Engineering User and Kernel Mode Processes The Kernel Mode resides in the Data Link layer of the OSI model. The Firewall kernel inspects packets between the Data Link layer and the Network layer. Every packet that goes through the Firewall is inspected. In the Network layers, you would not see all those packets. User Mode is not mandatory, however, it allows the Firewall to function more efficiently in the Application layer. The Firewall employs services of the operating system and allows easier inspection of files on open connections. It is possible and, in some cases, required for user and kernel processes to communicate. To allow this, there are two mechanisms: Input/Output Controls (IOctl) and traps. When a Kernel process wishes to signal to a User Mode process, it sets a trap by changing a value in a registry key. The User Mode process monitoring that flag stumbles on the trap and performs the requested operation. When a User Mode entity needs to write information to a kernel process, it uses IOctl, which is an infrastructure allowing the entity to call a function in the kernel and supply the required parameters. Figure 198 — Processes As administrators trying to debug the Firewall, the first observation to make is to decide which Firewall functionality is implemented in the user space and which is implemented in the kernel. Once that distinction is made, decide the best approach to use in addressing the problem, including which tool is the most appropriate to use. _____________________ _____________________ 224 Check Point Security Engineering Pa c ket F l ow To understand how packets are inspected, consider the Firewall kernel more closely. Inbound and Outbound Packet Flow Traffic first arrives into the Firewall through one of the Firewall Network Interface Cards (NICs). The Check Point Firewall kernel is installed on each Firewall NIC that is enabled in the operating system. The Firewall kernel consists of two completely separate, logical parts called the Inbound and Outbound, which represents the process of packets coming in and out of the Firewall. These processes work on each packet through another process called inspection. Each part acts independently and does not assume that a packet was inspected or processed by the other. Therefore, some functionality is implemented both on the Inbound and on the Outbound. Some key points include: • Each direction has its own ordered chain of modules, or packet processing handlers. • Handlers decide whether to continue, terminate or hold the processing of a packet. • Inspection is performed on virtually defragmented packets. The inspection process does expect that a packet in the Outbound that has not entered the Inbound first originated from the Security Gateway itself. It also assumed that a packet not originating from the gateway was Inbound. Figure 199 — Check Point Firewall Kernel Inspection Points _____________________ _____________________ 225 Check Point Security Engineering Packet Inspection Flow The following diagram describes a packet flow through the Firewall kernel and how the User Mode processes work to control the traffic. Figure 200 — Packet Inspection Flow 1. 2. 3. 4. 5. 6. The packet arrives at the Security Gateway and is intercepted by the NIC on the Inbound. The Firewall kernel Inbound chain begins inspecting the packet. The packet is matched against the Rule Base. A log is generated and sent from the kernel to the User Mode process, fwd, located in the Security Gateway. The fwd process on the Security Gateway sends the log to the fwd process on the Management server, where it is forwarded to cpm via cpd. cpm sends the log to the relevant SmartConsole GUI application, such as SmartView Monitor. At the same time, depending on routing decisions made by the operating system and excluding specific scenarios such as VPN routing, the packet is routed to a selected NIC. The packet must go through the Firewall kernel again, only this time through the Outbound chain to the appropriate NIC and to the network. _____________________ _____________________ 226 Check Point Security Engineering Chain Modules Chain Modules are packet processing handlers. Handlers decide which modules will inspect the packet and, based on the inspection, may then modify, pass, or drop the packets. Each module in the chain has an unique job. The number of chains on a Security Gateway is based on the number of blades and features enabled for that gateway. Inbound and outbound packets are inspected in both directions by chain modules. Familiarity with the elements of a chain module is an important step in understanding how traffic moves through the firewall, and will ultimately be of great assistance when debugging is required. Consider the following chain module example. The location of the module in the chain is a relative, serial number to the location of this chain module for this particular gateway configuration. For example, above the fw VM outbound is the 6th chain module. It may be in a different location in other gateway scenarios. The chain position is an absolute number that never changes. In the Firewall kernel, each kernel is associated with a key, which specifies the type of traffic applicable to the chain module. For Wire Mode configuration, chain modules marked with 1 will not apply and for Stateful Mode, the chain modules marked with 2 will not apply. Chain Modules marked ffff, such as IP Options Strip/Restore, and 3 will apply to all traffic. Figure 201 — Chain Module Example To take a look at an actual chain, use the fw ctl chain command. This will show you the chain modules actually loaded on your machine and their order. _____________________ _____________________ 227 Check Point Security Engineering Inbound fw ctl Chain Modules View the chain modules displayed below. In this figure, we see the Inbound chain, though this is just one example and in different configurations some chain modules will not appear and others might be added. Between different releases, chain modules are added or removed, depending on the version specific design decisions. Figure 202 — Inbound Chain Outbound Chain Modules View the chain modules displayed below. Shown in this figure, the Outbound chain shows roughly the same chain modules as seen on the Inbound. The most significant difference is that in the Inbound, the vpn decrypt and vpn decrypt verify chain modules are present. This makes sense because it is expected that a packet would be decrypted on the Inbound. In addition, the Outbound chain also has the vpn encrypt chain module, if the packet needs to be encrypted on the Outbound. Figure 203 — Outbound Chain _____________________ _____________________ 228 Check Point Security Engineering Wire Mode Wire Mode enables VPN connections to successfully maintain a private and secure VPN session without employing Stateful Inspection. Using Wire Mode, the Firewall can be bypassed for VPN connections by defining internal interfaces and communities as “trusted”. This improves the performance of the VPN tunnel and reduces downtime. With Stateful Inspection no longer taking place, dynamic-routing protocols that do not survive state verification in non-Wire Mode configurations can now be deployed. Wire Mode is based on a trusted source and destination and uses internal interfaces, such as the Security Gateway and VPN Communities. Lab 1.5 Viewing the Chain Modules _____________________ _____________________ 229 L A B Viewing the Chain Modules 1.5 One way to help understand how the Security Gateway handles traffic is to review the inbound and outbound chain modules. These modules show how the kernel processes traffic as it enters and exits the gateway. In this lab, you will make changes to the Security Policy and identify how those changes affect the chain modules. Ta sks : • Evaluate the Chain Modules. • Modify the Security Policy. • Review Changes to the Chain Modules. Pe r for ma n c e Ob j ec t ive s: • Demonstrate an understanding of how different Check Point software blade deployments can affect traffic inspection on the Security Gateway. • Evaluate how changes in the environment affect the Chain Modules. _____________________ _____________________ 230 Check Point Security Engineering Evaluating the Chain Modules Review the chain module in place for kernel level traffic inspection. 1. Connect with SSH and use the following credentials to log into the A-GW-01 virtual machine: Username: admin Password: Chkp!234 IP Address: 10.1.1.2 2. Type the following command and press Enter: fw ctl chain Figure 204 — fw ctl chain _____________________ _____________________ 231 Check Point Security Engineering 3. Consider the following questions when evaluating the chain modules: ◦ Can you see how the traffic flows through the kernel? ◦ Besides the Firewall, what other modules are engaged? ◦ Can you tell if IPS is currently deployed? ◦ Could you tell if this is a cluster by looking at the inspection chain? _____________________ _____________________ 232 Check Point Security Engineering Modifying the Security Policy Make changes to the Security Policy that will be visible in the chain modules. 1. From A-GUI, use the following credentials to log into SmartConsole: Username: admin Password: Chkp!234 IP Address: 10.1.1.101 In SmartConsole, edit the A-GW-Cluster object. 3. In the Network Security tab, clear the following option: 2. IPSec VPN _____________________ _____________________ 233 Check Point Security Engineering 4. Verify that the object is configured as follows: Figure 205 — General Properties Configured Click OK. 6. In the Alpha Security Policy, add the A-SMS to the Source field of the Management rule. 5. _____________________ _____________________ 234 Check Point Security Engineering 7. Add SSH to the Services & Applications field of the Management rule: Figure 206 — Management Rule Configured _____________________ _____________________ 235 Check Point Security Engineering 8. Publish the changes and install the Alpha Security Policy. Figure 207 — Installation Process _____________________ _____________________ 236 Check Point Security Engineering Reviewing Changes to the Chain Modules Run the fw ctl chain command to view the chain modules. In the Gateways & Servers tab, expand the A-GW-Cluster object. 2. Right-click the A-GW-01 and select Actions: 1. Figure 208 — Actions Menu _____________________ _____________________ 237 Check Point Security Engineering 3. Select Open Shell, and the system displays the following window: Figure 209 — Open Shell 4. Use the following information to log into the shell: Username: admin Password: Chkp!234 Remember Password: Selected 5. Click Login, and the system displays the Fingerprint Confirmation window: Figure 210 — Fingerprint Confirmation _____________________ _____________________ 238 Check Point Security Engineering 6. Click Yes, and the system opens an SSH session with A-GW-01: Figure 211 — SSH Connection _____________________ _____________________ 239 Check Point Security Engineering 7. Type the following command and press Enter, to view the chain modules: fw ctl chain Figure 212 — fw ctl chain 8. Review the inbound chain and the outbound chain and consider the following questions: ◦ What changes do you see since making modifications to the A-GW object? ◦ Can you tell if VPN is a deployed product? ◦ When comparing the chain after configuration changes were made, what differences can you see? 9. Close the session. _____________________ _____________________ 240 Check Point Security Engineering 10. From SmartConsole, edit the A-GW-Cluster object. 11. Select the QOS option in the Network Security tab: Figure 213 — General Properties Configured 12. Click OK. NOTE You will see an error because QOS is not properly deployed. Disregard this error in this instance. 13. Publish the changes. 14. Install the Alpha Security Policy. _____________________ _____________________ 241 Check Point Security Engineering 15. Re-launch the session to A-GW-01. 16. Execute the following command: fw ctl chain Figure 214 — fw ctl chain NOTE In Expert Mode, you can also send the output of the fw ctl chain command to a file. 17. Review the inbound chain and the outbound chain and consider the following questions: ◦ What changes do you see since making modifications to the A-GW object? ◦ Which line in each module indicates that QOS is deployed? ◦ What do you need to do to successfully deploy QOS? _____________________ _____________________ 242 Check Point Security Engineering 18. Execute the following command: fw monitor Figure 215 — fw monitor _____________________ _____________________ 243 Check Point Security Engineering 19. From a new Putty session to A-GW-01, execute the following command: fw ctl chain | more Figure 216 — fw ctl chain 20. Identify where in the chain fw monitor inserts itself. 21. From the session running fw monitor, press Ctrl + C. 22. Close the Putty session. _____________________ _____________________ 244 Check Point Security Engineering 23. In SmartConsole, edit the A-GW-Cluster object. 24. In the Network Security tab, clear the QOS option: Figure 217 — General Properties Configured 25. Click OK. _____________________ _____________________ 245 Check Point Security Engineering 26. Remove A-SMS from the Source field of the Management Rule: Figure 218 — Rule Base Configured 27. Publish the changes to the database. 28. Install the Alpha Security Policy. END OF LAB 1.5 _____________________ _____________________ 246 Check Point Security Engineering S t a te f u l I n s p e c t i o n Stateful Inspection was invented by Check Point to provide accurate and highly efficient traffic inspection. Apart from checking the IP Header of a packet, Stateful Inspection also implements checks on other characteristics of a packet, such as TCP stream, sequence numbers, UDP communication and port numbers to monitor the state of a packet operating primarily at the Transport layer of the operating system. The Inspection Engine examines every packet as they are intercepted at the Network layer. The connection state and context information are stored and updated dynamically in the kernel tables. Kernel tables are also known as State tables. To see the process flow of the Inspection Engine, review the flow chart below. Figure 219 — Inspection Process Flowchart 1. 2. 3. 4. 5. 6. Packets pass through the Network Interface Card (NIC) to the Inspection Module, which inspects the packets and their data. Packets are matched to the policy Rule Base. Packets that do not match any rule are dropped. Logging and/or alerts that have been defined are started. Packets that pass inspection are moved through the TCP/IP stack to their destination. For packets that do not pass inspection and are rejected by the rule definition, a negative acknowledgment (NACK) is sent (i.e. RST packet on TCP and ICMP unreachable on UDP). Packets that do not pass inspection and do not apply to any of the rules are dropped without sending a NACK. _____________________ _____________________ 247 Check Point Security Engineering S e c u r i t y S e r ve r s Security servers are a necessary and crucial element to Firewall functionality. Some Firewall features require a higher level of protocol enforcement and RFC compliance, such as in the Application Layer. Security servers are the individual processes within the Firewall system that are responsible for the detailed protocol-specific security inspection such as FTP, HTTP, or SIP and other inspection services like DLP. NOTE When Identity Awareness is deployed, this process operates differently. How a Security Server Works Essentially, when a client initiates a connection to a server, the Firewall kernel signals the fwd process using a trap. fwd spawns the fwssd child service, which runs the Security server. Then, the Security server binds to a socket and manages the connection. fwd waits for connections on the ports of other servers (daemons) and starts the corresponding server when the connection is made. fwd also talks to its children processes on other servers using a pipe and signals. The $FWDIR/conf/fwauthd.conf file contains the structure of the security servers showing the port numbers, corresponding protocol name, and status. If the real port is 0, then a higher random port is assigned. Figure 220 — Example of $FWDIR/conf/fwauthd.conf _____________________ _____________________ 248 Check Point Security Engineering Ker n el Ta b le s There are dozens of kernel tables, each storing information relevant to a specific Firewall function. Using the information saved in the kernel tables, very elaborate and precise protections can be implemented. To view all existing kernel tables, type the command fw tab -t <tablename> at the command prompt. To view only the table names and get a perspective on the number of kernel tables available, use the fw tab -s command. Most traffic related information is saved in the kernel tables. Information is also stored in htabs, ghtabs, arrays, kbufs, and other devices. Tables may be created, deleted, modified, and read. In particular, consider the Connections table. Connections Table The Connections table is essentially an approved list of connections. The Firewall, as a network security device, inspects every packet coming in and out of each interface. After the first packet is matched against the Rule Base, we assume that the returning packet might not be accepted in the Rule Base. For example, we allow 74.100.100.1 to connect with 212.150.141.5 using Telnet on port 23 in the Rule Base and drop everything else. The syn packet will match the Rule Base and pass; but the Syn-Ack packet comes back with the reversed tuple (source IP 212.150.141.5, Destination IP 74.100.100.1) and source port 23 with a random destination port. (Reference the Connections Table figure in the following section). To mitigate this, for every recorded connection, a matching, reversed-tuple entry is also added to the list of approved connections. Some scenarios such as NAT, data connections and elaborate protocols, such as Voice over IP (VoIP), introduce more complexity to the logic behind maintaining the Connections table. The Connections table provides enhanced performance. As we saw in the Inspection Process Flowchart, the action of matching a packet against the Rule Base may be very costly (especially if there is a very large Rule Base with dynamic objects and logical servers that need to be resolved). By maintaining the list of approved connections in the Connections table, the gateway can enforce an intelligent analysis for assumed rule-matching, thus saving valuable time and computing power. _____________________ _____________________ 249 Check Point Security Engineering The Connections table also allows server replies. We noted earlier that sometimes Server to Client (S2C) packets might not match the Rule Base. In these cases, they would be handled by the Connections table. To view the Connections table, use the following command: fw tab -t connections -f NOTE Using the fw tab -t connections -f command could impact performance. The following Stateful features are provided with the Connections table: • Streaming based applications • Sequence verification and translation • Hide NAT (Explicit entries to the Connections table may need to be added when the S2C packets returning to the Firewall may not match the Rule Base.) • Logging, accounting, monitoring, etc. • Client and server identification • Data connections _____________________ _____________________ 250 Check Point Security Engineering Connections Table Format Each new packet is recorded in the table in all available entries. In FireWall-1 version 4.1, only one entry was made to each new connection. Each packet had to go through the Connections table several times to verify all available types of connection. Today, each packet goes through a single lookup as all available entries are already recorded in the table. Figure 221 — Connections Table The Symbolic Link format provides the 6-tuple of the connection we want to pass. The arrow is a pointer to the tuple of the Real Entry in the Connections table. The first six attributes in every entry in the Connections table state the connection’s 6-tuple. The 6-tuple is a unique identification of the connection within the system. The direction can be either 0 for Inbound or 1 for Outbound. In the Connections Table figure, we see a simple connection representation in the Connections table. The first entry is called the Real Entry and holds all of the relevant information for that traffic, such as state, sequence numbers and matching rule. The Real Entry allows the Client to Server (C2S) packet to enter the Firewall on the Inbound. The second entry is a Symbolic Link, allowing for the same C2S packets to enter the Firewall on the Outbound. The third entry is another Symbolic Link that allows for the S2C traffic to enter the Firewall on the Inbound. The last entry is also a Symbolic Link and allows for the S2C packet to enter the Firewall on the Outbound. _____________________ _____________________ 251 Check Point Security Engineering Po l i c y I n s t a l l a t i o n The policy installation process is divided into three main stages: Verification & Compilation, Transfer (CPTA), and Commit. Figure 222 — Policy Installation Process _____________________ _____________________ 252 Check Point Security Engineering Verification & Compilation The Verification & Compilation stage of policy installation occurs on the management side. It involves the following steps: 1. 2. 3. 4. 5. 6. Initiation — Policy installation is initiated either from SmartConsole or from the command line. Information required for the policy installation, such as the list of gateways on which the policy is to be installed, is provided. User permissions for policy installation will also occur prior to continuing to the next step in the process. Database Dump — A database dump from postgres to old file formats for cpmitable only if changes occurred. A dump from non cpmi will occur any time. Verification — Information in the database is verified to comply with a number of rules specific to the application and package for which policy installation is requested. If this verification fails, the process ends here, and an error message is passed to the initiator. The system can also issue warnings in addition to fail/success messages. Conversion — The information in the database is converted from its initial format to the format understandable by later participants in the flow, such as code generation and gateway. Fwm rexec — Fwm loader takes a lot of memory. To release memory after verification and conversion, fwm state is saved to a file located in the $FWDIR/tmp/ directory. fwm is then re-executed as a fwm load command to push the files for code generation and compilation. Code Generation and Compilation — Policy is translated to the INSPECT language and compiled with the INSPECT compiler. Also, some additional data transformations are completed. After verifying and converting the database, the fwm process compiles the relevant files, such as objects_5_0.C, and AccessCTRRules_0.C, into several compiled files (local.ft, local.set, etc.). The complied policy will be copied to the $FWDIR/state/<gateway name> directory on the management server. Transfer (CPTA) The Transfer stage occurs between both the management server and the gateway. Once the policy is successfully compiled and moved to $FWDIR/state/<gateway> on the management server, the Check Point Policy Transfer Agent (CPTA) transfers the compiled policy to the gateway using SIC. Using SIC will ensure that the management server is eligible to install policy on the gateway. It also encrypts the connection via SSL so that the policy data transferred to the gateway is trusted. Once SIC is initialized, SIC authentication will occur for every policy installation. _____________________ _____________________ 253 Check Point Security Engineering Commit During the Commit stage, the Firewall is instructed to load the new policy it has just received from the management server. The following steps will occur: • The cpd process on the gateway will execute the following command to load the policy which was just transferred to the gateway: fw fetchlocal -d $FWDIR/state/_tmp/FW1 • The policy will then be loaded into the kernel. • If successful, the new policy will be copied to the $FWDIR/state/FW1 folder on the gateway. • If the fetchlocal process fails, cpd will get a notification regarding the failed process and will inform the fwm process that loading the policy has failed. _____________________ _____________________ 254 Check Point Security Engineering Policy Installation Flow The graphic below displays a general process flow for policy installation. Differences are version specific, so $FWDIR is replaced with the compatibility package when other products or versions are used. Figure 223 — Policy Installation Flow 1. 2. 3. 4. 5. 6. 7. 8. 9. The policy is defined in SmartConsole. After the policy is published, it is saved in the postgres database. At a push, verification of user permission is performed. Database dump from postgres to old file formats (object_5_0.C and others) for cpmitable, only if changes occurred, and a dump for non cpmi will occur. All *.W files are stored in rulebases_5_0.fws. After the policy is saved, files are created under $FWDIR/conf/*.W. fwm_gen compiles the new $FWDIR/conf/*.W into a machine language, creating a new file called $FWDIR/conf/*.pf. The $FWDIR/conf/*.pf is actually the input from the $FWDIR/conf/*.W and the $FWDIR/conf/objects.C files. The $FWDIR/conf/*.W file is the exact same information defined in the GUI, just in a text format instead of a graphic one. c_preprocessor compiles the *.pf and lib/*.def files, creating a new file called *.cpp. All new generated files are stored under $FWDIR/state/ on the management server. *.ccp is compiled and translated to a machine language and transferred to the gateway. $FWDIR/state/ directory is pushed to the enforcement module (gateway). cpd and the kernel on the enforcement module performs an automatic load. _____________________ _____________________ 255 Check Point Security Engineering Policy Installation by Management Processes Now we will examine how policy installation is handled by the Management processes. Figure 224 — Policy Installation by Management Processes When policy installation is initiated from SmartConsole: 1. 2. 3. 4. 5. 6. The Check Point Management Interface (cpmi) policy installation command is sent to fwm on the Management server. fwm performs verification and conversion of the database information for the installation targets for which policy installation is requested. After conversion, fwm invokes fw loader to perform code generation, compilation, transfer to all applicable gateways, and commit. cpd on the Security Gateway listens for install policy connections and receives the files. cpd invokes fw fetchlocal to load the new policy into the kernel. cpd waits for fw fetchlocal to complete the process and then informs the Management server of the command’s status (installation succeeded or failed). NOTE Additional steps may be included for debugging purposes. _____________________ _____________________ 256 Check Point Security Engineering Rul e Mat c h in g The Security Gateway determines the rule to apply to a connection; therefore, it is important to understand how rules are matched. The columns of a rule contain the expected elements of a connection and dictate what happens to the connection. Column Based Matching Security Gateway versions prior to R80.10, inspect and match connections row by row (left to right), based on the order of rules within the Rule Base. The Rule Base is examined top-tobottom and the first matching rule is executed. R80.10 and later Security Gateways match rules by column, such that only the rules within the Rule Base that may possibly match a connection are considered. Column based matching eliminates the process of examining rules which do not contain the applicable elements of the connection. The Matching Process Access Control Policy rules use the following columns to filter and match traffic entering and exiting the network: Source Destination VPN (if enabled) Services & Applications (if Appl Control & URL Filtering Software Blades are enabled) • Content (Content Awareness must be enabled) • Time • Installed On (target gateway) • • • • Inspection starts in the first ordered layer of the Access Control policy (usually Policy or Network). If a matched rule contains an inline layer, that inline layer is processed. Matching continues with each additional ordered policy layer after a successful match. Any drop stops the matching process and drops the connection. Currently, the Security Gateway begins examining the fields of the Destination column to identify rules that may match the connection. When possible matches are filtered, matching continues with the Source column. Final inspection on the filtered results occurs when all columns are matched and the first rule (top to bottom) that matches is executed for that layer, and subsequent inline or ordered layers are processed. _____________________ _____________________ 257 Check Point Security Engineering The illustration below displays the matching process for traffic connecting to the A-Host from the B-Host using FTP. Figure 225 — Column Based Matching Illustration A Unified Access Control policy may contain application or data criteria that cannot be matched on the first packet connection. The integration of application and data criteria requires deep packet inspection. To optimize the matching process, the Firewall may need to turn on one or more inspection engines and inspect the header and body of the connection before determining the final match. Otherwise, the Rule Base may decide to block the connection at an early stage. An early block may indicate that the connection did not contain enough applicable data criteria for the engine to make a proper detection, or that all potential rules matching the connection result in a Drop or Reject action. Additional levels of inspection include matching by port and matching by protocol signatures. _____________________ _____________________ 258 Check Point Security Engineering Rule Matching by Port By default, a service object is matched by port in the first packet of the transport protocol. When matching by port, the Firewall blade does not consider the actual protocol that runs over the port, although service names and port numbers typically identify services (like HTTP, HTTPS, and FTP) that run over transport protocols (such as TCP and UDP). For example, if the Firewall log indicates that HTTP service was matched on port 80, this means that the first packet contained port 80 in the transport protocol. Rule Matching by Protocol Signature For R80.10 and later gateways, more advanced inspection of the protocol for a service is possible if Protocol Signature is enabled for that service. Matching a rule by protocol signature or by service provides an additional level of security when the Rule Base contains rules including: • an application, a URL site, or a service with a protocol signature in the Services & Applications column • a data type in the Content column Matching by protocol signature and services is discussed in greater detail in the CCSM. NOTE The match by protocol signature feature is disabled by default for R80 and higher gateways. The Firewall cannot match services by protocol signature for R77.30 and lower gateways. _____________________ _____________________ 259 Check Point Security Engineering Rule Matching in the Threat Prevention Policy R80.10 and higher Threat Prevention policies may contain multiple Ordered layers in which the Security Gateway installs as one Rule Base. The unified Rule Base determines how all connections are inspected. When a connection matches rules in more than one layer, the gateway enforces the strictest action and settings. Figure 226 — Threat Prevention Policy Rule Matching Example When Threat Emulation and Threat Extraction run in Mail Transfer Agent (MTA) mode, the action of the first rule matched is enforced. Threat Emulation runs in tandem with Threat Extraction for R80.10 and higher gateways. To enable the Threat Extraction Software Blade, the gateway must be established as an MTA. Threat Prevention solutions are discussed in greater detail in a later chapter. _____________________ _____________________ 260 Check Point Security Engineering N et wo rk Ad d r es s Tr a ns l a t i on Network Address Translation (NAT) and Network Address Port Translation (NAPT) are the two primary technologies traditionally used as methods to hide networks so actual IP addresses are not revealed or required to be publicly routable. This reduces the need for more publicly routable IPs, and allows access to internal (sometimes non-routable) resources from an external network. How NAT Works NAT is regarded as an infrastructure of services used, for example, to create clustering solutions, security servers, office mode connections, etc. Infrastructure • INSPECT rules and tables • Performed on the first packet Features • NAT Rule Base is efficient • Dual NAT (automatic rules) • Rule priorities Table 6: NAT When NAT is defined on a network object, NAT rules are automatically added to the NAT Rule Base. Those rules are called Automatic NAT rules. NAT is translated during policy installation to tables and performed on the first packet of the connection. The NAT Rule Base is very efficient and can match two NAT rules on the same connection. This is called bi-directional NAT and only applies for Automatic NAT rules. NOTE Even though NAT merges two Automatic NAT rules into one, this feature may be disabled and NAT rules may be manually defined for additional options. NAT rules are prioritized according to the list below: 1. 2. 3. 4. Manual/Pre-Automatic NAT Automatic Static NAT Automatic Hide NAT Post-Automatic/Manual NAT rules _____________________ _____________________ 261 Check Point Security Engineering Hide NAT Process Consider first the original packet. When the packet arrives at the Inbound interface, it is inspected by the Security Policy. If accepted, the packet is entered into the Connections table. The first packet of the connection is matched against NAT rules. The packet is translated if a match is found. Then the packet arrives at the TCP/IP stack of the Firewall Module machine and is routed to the Outbound interface. Figure 227 — Hide NAT During the NAT Rule Base traversal, both NAT source and destination are decided. However, they are actually performed at the following locations: • src nat on the server side • dst nat depending on the relevant GUI property The Reply packet arrives at the Inbound interface of the Firewall machine. The packet is passed by the Security Policy since it is found in the Connections table. The packet's destination, which is the source of the original packet, is translated according to the NAT information. This takes place when the packet was translated in the first initial connection. The packet arrives at the TCP/IP stack of the Firewall machine and is routed to the Outbound interface. The packet goes through the Outbound interface and its source, the destination of the original packet, is translated according to the information in the NAT tables. The packet then leaves the Firewall machine. _____________________ _____________________ 262 Check Point Security Engineering Manual NAT Many organizations prefer to define their own NAT rules rather than relying on the system generated rules. There are also certain situations when manual NAT rules must be used, such as when: • Rules exist that are restricted to specified destination IP addresses and to specified source IP addresses. • Both source and destination IP addresses translate in the same packet. • Static NAT occurs in only one direction. • Rules exist that only use specified services (ports). • IP addresses translate for dynamic objects. The NAT Rule Base is processed one rule at a time from top to bottom, similarly to the Firewall Rule Base. Therefore, Manual NAT rules must be placed in the right order to be applied correctly. Manual NAT rules are added to the NAT Rule Base either above or below any already existing Automatic NAT rules. For example, in the figure below, the first NAT rule was manually created and the other NAT rules were automatically generated based on the NAT settings applied to the respective network objects. The Manual NAT rule is placed at the top of the NAT Rule Base so that it is the first rule to be matched. Figure 228 — Manual NAT Example The NAT Rule Base consists of the source, destination, and services information for the original packet and the translated source, destination and services information after NAT has been applied. The processing order for the overall inspection and routing of packets by the Security Gateway is as follows: 1. 2. 3. Firewall — Inspection on the Original Packet. NAT — Translate the IP and/or port number as required. Routing — Forward on the resulting packet. _____________________ _____________________ 263 Check Point Security Engineering When configuring Manual NAT in Global Properties, check the Translate destination on client side checkbox in the Manual NAT rules section. Figure 229 — Global Properties for NAT Rules _____________________ _____________________ 264 Check Point Security Engineering Proxy ARP for Manual NAT For Manual NAT rules, it is necessary to configure proxy ARPs to associate the translated IP address. A proxy ARP allows the Security Gateway to answer ARP queries for a network address that is located on that same network. The ARP proxy is aware of the location of the traffic’s destination, offering its own MAC address as the destination. When the data is received from the external network, the Security Gateway forwards the data to the relevant host on the internal network. The configuration of proxy ARPs is necessary for situations such as when a manual Static NAT rule has been created and the Security Gateway does not answer the ARP requests for the Static NAT’d IP address in the Manual NAT rule. Another situation would be when a Security Gateway replies to ARP requests with an incorrect MAC address, mostly for the NAT traffic. To configure a proxy ARP: 1. 2. 3. Match the IP addresses of the relevant hosts on the internal network to the MAC address of the Security Gateway on the external network. This is saved in the $FWDIR/conf/ local.arp file. Create the relevant Manual NAT rules. Install the Security Policy. _____________________ _____________________ 265 Check Point Security Engineering Firewa ll Admi ni stra ti on In addition to understanding the Firewall kernel structure, it is important to familiarize yourself with configuration file structure and commands typically used for troubleshooting problems. To begin with, lets consider how the Firewall configuration files are broken down. The main sub-grouping of configuration files are divided into directories located under /opt. • CPsuite-R80 — Manages Firewall modules (R75.20 - R80). CPsuite is the generic installation. • CPshrd-R80 — Stores what used to be called SVN foundation, including cpd database, licenses, registry and generic low level Check Point infrastructure. (not version related). • CPEdgecmp-R80 — Manages Edge devices. The /lib and /conf directories store definition files that are important to take into consideration. For instance, the $FWDIR/lib/*.def files include Rule Base and protocol definitions. User definitions are stored in $FWDIR/conf/fwauth.NDB and Security server configuration settings are stored in $FWDIR/conf/fwauthd.conf. $FWDIR/conf/classes.C defines fields for each object used in the objects_5_0.C file, such as color, num/string and default value. Though the $FWDIR/database/ directory on the Management server has no relevancy, this directory is particularly noteworthy on the gateway itself, where specific object entries are stored for that particular gateway. There are different ways to view and edit database files such as these. • dbedit — A command line utility on the Management server itself. • GuiDBedit.exe — An executable tool on the Windows-based GUI client machine under: C:\Program Files (x86)\CheckPoint\SmartConsole\R80\Program. NOTE The objects_5_0.C file is still used for legacy gateways on R77.30 and older. The database for R80.10 is located in PostgreSQL. x86 was added to the path because most computers now run in 64-bit mode. _____________________ _____________________ 266 Check Point Security Engineering Common Commands • cpconfig — This command is used to run a command line version of the Check Point Configuration tool and configure or reconfigure a Security Gateway/Management installation. • cplic print — Located in $CPDIR/bin, this command prints details of Check Point licenses on the local machine. cplic print -x prints the licenses with signatures and cplic del <signature> deletes a license. • cpstart — This command is used to start all Check Point processes and applications running on a machine. • cpstop — This command is used to terminate all Check Point processes and applications running on a machine. The commands cpstop and cpstart are actually calling fwstop and fwstart scripts for all Check Point products, including the Firewall stop/start scripts located in $FWDIR/bin. These are scripts that run when you perform cpstop, cpstart and cprestart with different flags. cprestart is an internal command used for Dynamically Assigned IP (DAIP) devices, such as Edge devices. Not all Check Point processes are brought down when cprestart is used; therefore, cpstop and cpstart should always be used. _____________________ _____________________ 267 Check Point Security Engineering FW Monitor The Check Point tool, fw monitor, is a packet analyzer tool which is on every Check Point Security Gateway and is essential for packet capture and Firewall traffic analysis. It provides kernel level inspection; but will not run in indiscriminate mode. fw monitor works for layers 3 and above in the OSI Network layer stack. The syntax is the same regardless of the platform and supports the.pcap output format used in Ethereal and Wireshark packet analyzer tools. Figure 230 — fw monitor The easiest way to use fw monitor is to invoke it without any parameters. However, in a busy system, running fw monitor without any filters can create a great detail of output and makes the analysis difficult. Filter expressions are used to specify packets to be captured and limit the amount of output. The general syntax is: fw monitor -e “accept <expression>;” -o <filename> Filter expressions include: • host [<IP_Address>] • net [<Network_IP_Address>, <Mask_Length>] • port [<IANA_Port_Number>] NOTE Check Point recommends turning SecureXL (fwaccel off) when using fw monitor to avoid misleading traffic captures. If SecureXL is on, the tool will only show non-accelerated packets. SecureXL is discussed in a later chapter. _____________________ _____________________ 268 Check Point Security Engineering For example, to capture everything between host X and host Y: [Expert@HostName]# fw monitor -e “host(x.x.x.x)and host(y.y.y.y),accept;” -o/var/log/fw_mon.cap For more fw monitor capture examples, refer to sk30583. C2S Connections and S2C Packets fw monitor captures packets as they enter and leave the Firewall kernel and when the packet enters and leaves the Inbound and Outbound chains. In the case of Client-to-Server (C2S) communication, a client designated as Host1, according to the policy, sends traffic destined for a web server located behind the Firewall. Since the traffic is permitted passage through the Firewall based on the policy Rule Base, the packet must traverse and be inspected by both chains of the Firewall. The command fw monitor works by loading a special filter that is applied to suspicious packets. This filter is different from the INSPECT filter used to implement a Rule Base. Where the Rule Base determines which packet is accepted, rejected or dropped, the INSPECT filter generated by fw monitor simply captures kernel packet flows. You can capture everything through the kernel using fw monitor, even a particular type of traffic or source. Once fw monitor is executed, the specified INSPECT filter is compiled and loaded to the kernel. Any parameters following accept in the fw monitor command will be displayed by fw monitor. The same filter is executed on all interfaces in all directions. The fw monitor output uses specific expressions to explain the location of the packet as it moves through the Firewall. Figure 231 — C2S and S2C Connections _____________________ _____________________ 269 Check Point Security Engineering There are four inspection points as a packet passes through the kernel: • • • • i — Before the virtual machine, in the Inbound direction (pre-Inbound) I — After the virtual machine, in the Inbound direction (post-Inbound) o — Before the virtual machine, in the Outbound direction (pre-Outbound) O — After the virtual machine, in the Outbound direction (post-Outbound) In our C2S scenario, i represents the packet as it left the client. The I represents the packet already checked against the tables and Rule Base. In case of Static NAT, the destination IP address will be changed. The o means the packet is before the Outbound kernel (same as I) and O means the packet is in the Outbound kernel chain, as it will appear at the web server. In the case of Hide NAT, the source IP address will be different here. For packets traveling from Server-to-Client (S2C), the inspection points are the reverse. I could be the NAT’d packet on its way out of the Inbound chain in the Firewall in the case of Static NAT. At this point, the packet has already been checked by the tables and Rule Base. The O is the packet as it will appear to the client. Lab 1.6 Configuring Manual NAT _____________________ _____________________ 270 Configuring Manual Network Address Translation L A B 1.6 In some circumstances, you may want to define your own NAT rules rather than rely on the automatic system generated NAT rules. In this lab, you will configure manual NAT for HTTP traffic incoming to the DMZ server. Ta sks : • Configure Manual NAT in the Security Policy. • Configure the ARP file to facilitate NAT functionality. • Test Manual NAT for HTTP traffic to the A-DMZ server. Pe r for ma n c e Ob j ec t ive s: • Complete the tasks necessary to perform Manual Network Address Translation. • Create the ARP entries necessary for Manual NAT. _____________________ _____________________ 271 Check Point Security Engineering Configuring the Security Policy Follow these steps to define manual NAT in the Security Policy. 1. In the Alpha_Standard Security Policy, disable the DMZ rule: Figure 232 — DMZ Rule Disabled 2. Edit the A-DMZ object: Figure 233 — A-DMZ _____________________ _____________________ 272 Check Point Security Engineering In the navigation pane, select NAT. 4. In the NAT page, clear the following option: 3. Add automatic address translation rules Figure 234 — A-DMZ - Automatic NAT Disabled 5. Click OK. _____________________ _____________________ 273 Check Point Security Engineering In the Alpha_Standard Security Policy, select Access Control > NAT. 7. Confirm that A-DMZ is not included in the Static NAT rules: 6. Figure 235 — Network Address Translation Rules Publish the changes to the database. 9. In the objects pane of SmartConsole, create a new Host object. 8. _____________________ _____________________ 274 Check Point Security Engineering 10. Use the information below to define the General page of the new Host: Name: A-DMZ-NAT Comment: Static NAT address of A-DMZ Color: Dark Blue IP Address: 203.0.113.171 Figure 236 — A-DMZ-NAT 11. Click OK. _____________________ _____________________ 275 Check Point Security Engineering 12. In the Rule Base, add a new rule above the disabled DMZ rule: Figure 237 — Default Rule Added _____________________ _____________________ 276 Check Point Security Engineering 13. Use the following information to configure the new rule: Name: Incoming Source: Any Destination: A-DMZ-NAT Services & Applications: http Action: Accept Track: Log Install On: A-GW-Cluster Figure 238 — Incoming Rule _____________________ _____________________ 277 Check Point Security Engineering 14. View the NAT Rule Base: Figure 239 — NAT Rule Base _____________________ _____________________ 278 Check Point Security Engineering 15. Add a new rule to the top of the NAT Rule Base: Figure 240 — Default Rule Added to NAT Rule Base NOTE To add the first manual NAT rule to the NAT Rule Base, select the Add Rule to Top button from the toolbar directly above the NAT Rule Base. 16. In the Original Destination field, add the A-DMZ-NAT object. 17. In the Original Services field, add HTTP. 18. In the Translated Destination field, add A-DMZ. 19. In the Install On field, add A-GW-Cluster. _____________________ _____________________ 279 Check Point Security Engineering 20. Verify that the new rule appears as follows: Figure 241 — Manual NAT Rule Configured _____________________ _____________________ 280 Check Point Security Engineering 21. Add a new rule below the first manual NAT rule. 22. In the Original Source column, add A-DMZ. 23. In the Original Services column, add HTTP. 24. In the Translated Source column, add A-DMZ-NAT. 25. In the Install On column, add A-GW-Cluster. 26. Verify that the new reciprocal manual NAT rule appears as follows: Figure 242 — Reciprocal Manual NAT Rule Configured _____________________ _____________________ 281 Check Point Security Engineering 27. Publish the changes to the database: Figure 243 — SmartConsole 28. Install the Alpha Security Policy. _____________________ _____________________ 282 Check Point Security Engineering Configuring the ARP Table Configure the ARP table for manual NAT to work successfully. 1. From A-GUI, connect to the Gaia Portal on A-GW-01: Figure 244 — Gaia Portal _____________________ _____________________ 283 Check Point Security Engineering 2. In the navigation pane, select ARP: Figure 245 — Gaia Portal - ARP _____________________ _____________________ 284 Check Point Security Engineering In the Proxy ARP section of the page, click the Add button. 4. Use the information below to configure the Add New Proxy ARP Entry window: 3. IPv4 Address: 203.0.113.171 Advertise IP via: Interface Name eth3 Real IP Address: 203.0.113.2 Figure 246 — Add New Proxy ARP Entry Configured _____________________ _____________________ 285 Check Point Security Engineering 5. Click Save, to add the entry to the ARP table: Figure 247 — Proxy ARP Entry Added 6. Log out of the Gaia Portal on A-GW-01. _____________________ _____________________ 286 Check Point Security Engineering Log into the Gaia Portal on A-GW-02. 8. In the navigation pane, select ARP. 9. In the Proxy ARP section of the page, click Add. 10. Use the information below to configure the Add New Proxy ARP Entry: 7. IPv4 Address: 203.0.113.171 Advertise IP via: Interface Name eth3 Real IP Address: 203.0.113.3 Figure 248 — Add New Proxy ARP Entry Configured _____________________ _____________________ 287 Check Point Security Engineering 11. Click Save, to add the entry to the ARP table: Figure 249 — Proxy ARP Entry Added 12. Log out of the Gaia Portal on A-GW-02. _____________________ _____________________ 288 Check Point Security Engineering 13. In SmartConsole, select Global Properties from the Application Menu. 14. In the navigation pane, select NAT - Network Address Translation. 15. On the NAT page, select the following option: Merge manual proxy ARP configuration Figure 250 — Global Properties - NAT Configured 16. Publish the changes and install the Alpha_Standard Security Policy. _____________________ _____________________ 289 Check Point Security Engineering 17. From B-Host, open a Web browser. 18. Use HTTP to connect to the static NAT address of A-DMZ (203.0.113.171). 19. From A-GUI, identify the accepted HTTP traffic from B-Host to A-DMZ. 20. View the log details to see the NAT taking place. _____________________ _____________________ 290 Check Point Security Engineering Reconfigure the Alpha Rule Base Remove the manual NAT configuration and configure automatic Static NAT for the DMZ object. In the Alpha Security Policy, delete the Incoming rule. 2. Enable the DMZ rule. 3. Add the following to the Services & Applications field of the DMZ rule: 1. ftp 4. Configure the Destination column of the DMZ rule to include only the A-DMZ object: Figure 251 — DMZ Rule Configured _____________________ _____________________ 291 Check Point Security Engineering Edit the A-DMZ object. 6. Use the information below to configure the NAT settings for A-DMZ: 5. Add automatic address translation rules: Selected Translation Method: Static Translation IP Address: 203.0.113.171 Install on Gateway: A-GW-Cluster Figure 252 — Host - NAT Configured Click OK. 8. In SmartConsole, view the NAT Rule Base. 9. Delete the two manual NAT rules. 10. Delete the A-DMZ-NAT object. 7. _____________________ _____________________ 292 Check Point Security Engineering 11. Confirm that the Alpha NAT Rule Base appears as follows: Figure 253 — NAT Rule Base Configured 12. Publish the changes to the database. END OF LAB 1.6 _____________________ _____________________ 293 Check Point Security Engineering Review Questions 1. What is CPUSE and what is it used for? 2. Name at least three Stateful features provided with the Connection table. _____________________ _____________________ 294 Check Point Security Engineering Automation & Orchestration C H A P T E R 2 Trusted Application Programming Interfaces (APIs) enable enterprises using network or orchestration systems to securely integrate a security management solution that has automation capabilities into their workflow processes. The Check Point API makes it easy to integrate securely with orchestration, change management and ticketing systems. With the ability to control exactly what that integration can and cannot do, organizations have the confidence to embed security into their IT ecosystem. Learning Objectives • Recognize how Check Point’s flexible API architecture supports automation and orchestration of daily operations. • Understand how to use the management API command line tools and web services to read information, create objects, work on Security Policies, and send commands to the Check Point Security Management Server. _____________________ _____________________ 295 Check Point Security Engineering Automation & Orchestration Automation is the process of automating tasks normally performed by human intervention to be performed by a machine as a means to providing efficiency and minimizing human error. Orchestration is the choreography of automating the arrangement, coordination and management of processes performed within complex computer systems and services into a logical workflow. It reduces the time and effort for deploying multiple instances of a single task by automatically performing a series of tasks which previously could only be performed by multiple administrators. How Automation and Orchestration Differ Automation and Orchestration differ in that automation relates to codifying tasks whereas orchestration relates to codifying processes. Automation is concerned with executing a single task, such as launching a web server or stopping a service, in a repeatable, consistent manner. Orchestration takes a series of automated tasks developed through automation and puts them all together into a process workflow which can simplify the complex management of today’s network security infrastructures. For example, an organization may use a cloud orchestrator programming to manage the interconnections and interactions among their cloud-based and on-site business units. Orchestration also involves the process of coordinating an exchange of information through web service interactions, such as XML and JSON. C h e c k Poi n t A P I s Check Point’s R80.10 Security Management platform provides the framework to support both Automation and Orchestration through its flexible API architecture. An API is a set of routines, protocols, and tools for building software applications. Check Point provides a complete CLI and API interface for security management which will enable the automation of daily operations and full integration with 3rd party and other systems, such as network management systems, ticketing systems, virtualization servers, and cloud orchestrators. Automation and SmartConsole management operations are allowed based on the same privilege profile. Check Point APIs allow system engineers and developers to make changes to their organization’s Security Policy with CLI tools and Web Services. An API can be used to: • Execute an automated script to perform common tasks. • Integrate Check Point products with 3rd party solutions. • Create products that use and enhance the Check Point solution. _____________________ _____________________ 296 Check Point Security Engineering There are different APIs for various Check Point products: • Management API — Used to read information, create objects, work on Security Policies and send commands to the Check Point Security Management Server. The Management API has a JSON/XML web services option, a Gaia CLI from the R80.10 SmartConsole, the new mgmt_cli tool, and the Gaia Clish. • Threat Prevention API — A cloud-based service used to control Threat Emulation, Antivirus, and Threat Extraction products. • Identity Awareness Web Services API — A web services API used to add, remove, and show the status of identity parameters. For example, using the API, a new user can be added to an Access Role or a user can be allowed to connect to the internal network from a different IP address. • OPSEC SDK — These APIs are used to open and monitor connections between the Security Management Server and gateways, and other hosts and objects. During this course, we will focus solely on the Management API. NOTE OPSEC SDK contains APIs for commands that were originally used with SecurePlatform. These commands can also be used on the Gaia operating system. _____________________ _____________________ 297 Check Point Security Engineering C h e c k Poi n t A P I A rc hi te c t u r e The Check Point API Architecture consists of the API server and API interaction mechanisms. The API server communicates with CPM in the same way as SmartConsole. An API automated session will generate audit logs and will display the validation errors and warnings. The API architecture also supports Concurrent Administration. The same permission profiles that control the GUI are enforced when using an automation session. The API server uses JavaScript Object Notation (JSON) for data interchanges. JSON is a lightweight data-interchanging format which is easy for individuals to read and write, and for machines to parse and generate. Interaction mechanisms are command sources, such as Web Services and Management CLIs. All API clients use the same port as the Gaia Portal. Figure 254 — API Architecture Command Sources Command sources allow you to communicate with the API server and perform many tasks using management APIs. • The SmartConsole GUI console — From SmartConsole, click the Command Line button to open a CLI window and enter API commands. For example, you can use the add host command to create a new host and then publish the changes. • The mgmt_cli Tool — Runs in Expert mode and lets you enter commands from a Windows or Linux computer. mgmt_cli uses the same authentication (username and password) as the GUI client; however, it does not require a GUI installation. • Gaia CLI — Log in to Gaia with an administrator account on the Security Management Server and enter API commands using Clish. • Web Services — Send HTTPS Post requests to the Security Management Server. _____________________ _____________________ 298 Check Point Security Engineering RESTful API RESTful APIs allow systems to use web services to access, manipulate, delete, change, and add resources. They use standard HTTP methods sent by script to GET, PUT, POST, and DELETE data. The management API uses RESTful API to send calls using the POST method. An example of using a RESTful API to call the login would be: HTTP POST https://<mgmt>/web_api/login Content-Type: application/json The content type Header tells the client how to compose requests in the body to the server. _____________________ _____________________ 299 Check Point Security Engineering Operational Flow The chart below diagrams the operational flow of an API session. Figure 255 — API Operational Flow _____________________ _____________________ 300 Check Point Security Engineering API Server Configuration The management API server is part of the R80.10 management server installation. To manage security through API and CLI, you must first configure the API server. The API server runs scripts that automate daily tasks on the Security Management Server. It also integrates Check Point products with third party systems. To configure the API server, in SmartConsole, go to Manage & Settings > Blade. In the Management API section, click Advanced Settings and the Management API Settings window will open. Configure the Startup Settings and the Access Settings. Startup Settings start the API server when the Security Management Server starts. The Automatic start setting is selected by default in the following environments: • Security Management Servers (without gateway functionality) with at least 4GB of RAM • Standalone Security Management Servers (with gateway functionality) with at least 8GB of RAM NOTE Verify your installation requirements prior to configuring the API server. _____________________ _____________________ 301 Check Point Security Engineering Access Settings configure IP addresses from which the API server accepts requests. The Management server only option is selected by default. This option instructs the API server to accept scripts and web requests only from the Security Management Server. To send an API request, open a command line interface on the server and use the mgmt_cli utility. Figure 256 — Configure API Server To verify that the API server is running, run the following command in Expert mode: api status To start the API server, run the following command in Expert mode: api start To stop the API server, run the following command in Expert mode: api stop _____________________ _____________________ 302 Check Point Security Engineering Management API Commands To type API commands from the SmartConsole GUI, click the command line interface button located in the bottom left corner to open the Command Line interface window. Figure 257 — Command Line Interface Basic API Commands include: • • • • • • • • login add set show delete publish discard logout _____________________ _____________________ 303 Check Point Security Engineering In the GUI, scripting begins with a login dialog to receive a session token. A login command creates a session. User name and password parameters are always required. Here is the syntax for a login script: login user <username> password <password> --format json The output for this example is as follows: { “sid” : “97BVpRfN4j8logN-V2XqGYMW3DDwIhoSN0Og8PiKDiM”, “url” : “https://192.0.2.1:443/web_api”, “uid” : “7a13a360-9b24-40d7-acd3-5b50247be33e”, “session-timeout” : 600, “last-login-was-at” : { “posix” : 1430032266851, “iso-8601” : “2015-04-26T10:11+0300” } } NOTE “--format json” is optional. The sid string represents the session unique identifier. This identifier is entered in the ‘Xchkp-sid’ header of each request. The url parameter identifies the URL which was used to reach the API server. The uid string is the session object identifier. It may be used in discard API to discard changes that were made in the session, when the administrator is working from another session. API commands can be used to create scripts for key security management components, including: • • • • • Network Objects — Hosts, Networks, Groups, Access Roles Services and Applications — Service TCP, Service UDP, Application Policy — Install policy, policy package management Access Control and NAT — Access rules, NAT rules VPN — VPN Community Meshed, VPN Community Star For example, to create a new host, use the following command: add host name <New Host Name> ip-address <ip address> _____________________ _____________________ 304 Check Point Security Engineering The mgmt_cli Tool The mgmt_cli tool uses the same syntax that is used inside the SmartConsole GUI. The only difference is that when using the tool, for a command to run, you must to provide login credentials or use a session-id token that was obtained previously using the login command. The mgmt_cli tool transforms the arguments it receives to RESTful API calls. The mgmt_cli tool can be run on any Linux or Windows machine. A Linux version of the command line tool is included in all R80.10 Gaia installations. The executable mgmt_cli is included in the R80.10 SmartConsole installation. The mgmt_cli.exe does not require a GUI installation. It can be copied to run on most Windows-based computers. The following API script example uses the mgmt_cli tool to log in and create a new host: mgmt_cli mgmt_cli id.txt mgmt_cli mgmt_cli login user “AdminUser1” password “teabag” > id.txt add host name “New_Host_1” ip-address “1.1.1.1 -s publish -s id.txt logout -s id.txt In the example above, the output from the login command is redirected to a file called id.txt. By using the -s parameter, the rest of the commands read id.txt and automatically extract the session-id from this file. Users logged in to a management server as Root, can run mgmt_cli commands without providing their credentials. These are users with Super Administrator permissions. To use this option, add --root true to the end of the mgmt_cli command. All mgmt_cli commands can use CSV files for automation purposes as well. For example, the following command can be used to create multiple host objects from a Microsoft Excel spreadsheet: # mgmt_cli add host --batch hosts1.csv Gaia CLI (Clish) To run management API commands in Gaia’s shell, you must first log in as a administration user. The syntax is identical to the commands that you run in the SmartConsole GUI; however, all management commands begin with the mgmt command. For example: mgmt add host. _____________________ _____________________ 305 Check Point Security Engineering Web Services Using Web Services to build an application that communicates with the Check Point management server requires the following components for the web request: • HTTP Post to — Identifies the management server and port. The default port is 443. • HTTP Headers — Consists of the content-type, such as application/json, and the x-chkp-sid header. The x-chkp-sid is the session ID token and is mandatory in all API calls, except login. • Request payload — Text containing the different parameters in the specified format (json or xml). Management API Support Check Point Management API utilizes the full potential of the R80.XX Security Management Server and can be used within any programming environment. To assist you in building automation tools for your organization, Check Point recommends the following reference tools. The Management API Reference Guide This online guide provides an introduction to Check Point Management API. The guide may be accessed via the Check Point User Center and the management server (/api_docs). Figure 258 — Management API Reference Guide _____________________ _____________________ 306 Check Point Security Engineering The Check Point CheckMates Community Join the Check Point CheckMates community to browse the latest scripts built by experts in the field, get code samples, network with developers, and access additional API documentation. A direct link to Check Point CheckMates is located on the Check Point website, or enter this URL into your browser: https://community.checkpoint.com/ Figure 259 — Check Point CheckMates L a b 2 .1 Managing Objects Using the Check Point API _____________________ _____________________ 307 L A B Managing Objects Using the Check Point API 2.1 Check Point’s Application Programming Interface (API) allows administrators to quickly and easily perform common tasks through a command line interface. Ta sks : • Configure the Check Point API. • Create and edit objects using the Check Point API. Pe r for ma n c e Ob j ec t ive s: • Demonstrate how to define new network and group objects using the Check Point API. • Demonstrate how to modify existing objects using the Check Point API. _____________________ _____________________ 308 Check Point Security Engineering Configuring the Check Point API Activate the API software blade. Select the Manage & Settings tab. 2. Select the Blades icon. 3. In the Blades page, identify the Management API section: 1. Figure 260 — Management API Settings _____________________ _____________________ 309 Check Point Security Engineering 4. Click the Advanced Settings button, and the system displays the following window: Figure 261 — Management API Advanced Settings 5. Use the information below to confirm the Management API settings: Startup Settings: Automatic Start Accept API calls from: Management Server Only Launch a Putty session from A-GUI to A-SMS. 7. Log into the server as admin: 6. Figure 262 — Putty Session _____________________ _____________________ 310 Check Point Security Engineering 8. At the prompt, type the following command and press Enter: api status Figure 263 — api status NOTE The API should be running by default. If it is not, you can stop and start it using the following commands: • api start • api stop Check Point recommends restarting the API with the api restart command after making major changes. 9. Close the Putty session. _____________________ _____________________ 311 Check Point Security Engineering Defining and Editing Objects in the API Create and edit basic objects through the API. 1. In SmartConsole, click the Command Line icon in the lower left of the screen. The system displays the following window: Figure 264 — Command Line _____________________ _____________________ 312 Check Point Security Engineering 2. To define a new host from the API, execute the following command: add host name “myHost1” ip-address 192.168.0.201 Figure 265 — add new host NOTE All object names in this lab are case sensitive _____________________ _____________________ 313 Check Point Security Engineering 3. To define a new network object, execute the following command: add network name “myNetwork” subnet 192.168.0.0 subnet-mask 255.255.255.0 Figure 266 — add network name _____________________ _____________________ 314 Check Point Security Engineering 4. In the objects panel, verify that the following new objects are now listed: ◦ myHost1 ◦ myNetwork Figure 267 — Objects Panel _____________________ _____________________ 315 Check Point Security Engineering 5. From the API, execute the following command: add group name “myGroup” members myHost1 Figure 268 — add group name NOTE This will create a new group object and will include myHost1 a member of this group. _____________________ _____________________ 316 Check Point Security Engineering 6. Execute the following command: add host name "My Test Host" ip-address 192.168.0.111 groups myGroup Figure 269 — add host name NOTE By defining the new object name with surrounding quotation marks, the system allows the name to include spaces. _____________________ _____________________ 317 Check Point Security Engineering 7. To edit an existing object, use the set command: set host name “myHost1” color "blue" Figure 270 — set host _____________________ _____________________ 318 Check Point Security Engineering 8. To define a group with multiple member objects, execute the following command: add group name "myGroup1" members.1 "My Test Host" members.2 "A-GUI" Figure 271 — add group name Close the Command Line window. 10. In SmartConsole, view the myGroup object to view the added member objects: 9. Figure 272 — myGroup _____________________ _____________________ 319 Check Point Security Engineering 11. Click OK. 12. View the myGroup1 object to confirm its member objects: Figure 273 — myGroup1 13. Click OK. 14. Next, discard all the changes without publishing: Figure 274 — SmartConsole 15. Click Discard. _____________________ _____________________ 320 Check Point Security Engineering 16. Verify that the objects created in the API are no longer listed in the objects pane: Figure 275 — Objects Discarded END OF LAB 2.1 _____________________ _____________________ 321 Check Point Security Engineering Review Questions 1. What are the four command sources which allow you to communicate with the management server using management API? 2. What does the sid command string identify? _____________________ _____________________ 322 C H A P T E R Check Point Security Engineering Redundancy 3 Security Gateways can be configured to provide redundancy to prevent network downtime. The failure of a Security Gateway or VPN connection can result in the loss of active connections, many of which can be mission critical and result in the loss of critical data. Whether your preferred network redundancy protocol is Check Point ClusterXL technology or standard Virtual Routing Redundancy Protocol (VRRP), it is no longer a platform choice you will have to make with Gaia. Both ClusterXL and VRRP are fully supported by Gaia. The concept of clustering was introduced in the CCSA course. During this chapter we will explore clustering in greater detail. Learning Objectives • Discuss advanced ClusterXL functions and redundancy. • Describe VRRP network redundancy and its advantages. _____________________ _____________________ 323 Check Point Security Engineering Advanced ClusterXL ClusterXL supplies an infrastructure that ensures no data is lost in event of a system failure. This Check Point cluster solution uses unique physical IP and MAC addresses for its cluster members and virtual IP addresses to represent the cluster itself. The virtual IP addresses do not belong to an actual machine interface, and it is recommended that each cluster member have at least three interfaces: one external interface, one internal interface, and one for synchronization. ClusterXL is part of the standard Security Gateway installation and can be configured for Load Sharing or High Availability mode. Advantages of Using ClusterXL Both ClusterXL and VRRP are fully supported by Gaia and available to all Check Point appliances, open servers and virtualized environments. While both platforms provide the ability to monitor the state of their clusters, ClusterXL provides more in-depth operational and monitoring capabilities. For example, when using ClusterXL, System Administrators know when their cluster has failed over and can also see why it failed over by using the cphaprob list command. In addition, if an interface goes down, System Administrators can determine if it is fully down or partially down by using the cphaprob -a if command. They can see which firewall is currently active, or in the case of Load Sharing, which gateway is carrying the load and the percentage of the load carried using the cphaprob stat command. Advantages of using ClusterXL include: • • • • • Tight integration with Check Point management and enforcement points Transparent failover Higher performance Easy deployment Cost-effective Load Sharing ClusterXL Load Sharing distributes traffic within a cluster so that the total throughput of multiple members is increased. In Load Sharing clusters, all functioning members are active and handle network traffic. This is referred to as an Active/Active configuration. Load Sharing clusters increase linear performance for CPU-intensive applications such as VPNs, security servers, policy servers, and User Directory (LDAP). With Load Sharing, if any member of a cluster becomes unreachable, transparent failover occurs to the remaining operational members in the cluster, thus providing High Availability. All connections are shared between the remaining Security Gateway, without interruption. _____________________ _____________________ 324 Check Point Security Engineering ClusterXL Load Sharing configurations require all machines to be synchronized, which differs from High Availability. Machines in a ClusterXL High Availability configuration do not have to be synchronized, however connections will be lost upon failover if they are not. ClusterXL offers two different Load Sharing solutions: Multicast and Unicast. These modes differ in the way members receive the packets sent to the cluster. Multicast Load Sharing In ClusterXL Multicast Load Sharing mode, every member of the cluster receives all of the packets sent to the cluster IP address. The Multicast mechanism allows several interfaces to be associated with a single Multicast MAC address. Therefore, when a router or Layer 3 switch forwards packets to all of the cluster members using Multicast mode, a ClusterXL decision algorithm on the cluster members decides which cluster member should perform enforcement processing on the packet. Only that machine processes the packet and sends the packet to its destination. The other machines drop the packet. This decision-making process is the core of the Multicast Load Sharing mechanism. It has to ensure that at least one member will process each packet so that the traffic is not blocked, and no two members will handle the same packets, so that traffic is not duplicated. Only routers or Layer 3 switches that accept a Multicast MAC address as a response to an ARP request with a Unicast IP address are supported for Multicast Load Sharing. Unicast Load Sharing In ClusterXL Load Sharing Unicast mode, one machine, called the Pivot machine, receives all traffic from a router with a Unicast configuration and redistributes the packets to the other machines in the cluster. The Pivot machine is chosen automatically by ClusterXL. The Pivot is the only machine that communicates with the router. In this scheme, the router uses the Pivot’s Unicast MAC address to communicate to the cluster. The Pivot functions as a cluster router, both from the internal network outwards and vice versa. This functionality also applies to DMZ networks. After the Pivot first receives the packet from the router or switch, the Pivot’s Load Sharing decision function decides which cluster member should handle the packet. This decision function is made in a similar fashion to the Multicast Load Sharing decision. The Pivot may also decide to handle the packet itself. In such a case, Pivot Load Sharing will give the packet to the Pivot’s Firewall component for processing. If the Pivot encounters a problem, a regular failover event occurs and another cluster member assumes the role of the new Pivot. The Pivot member is always the active member with the highest priority. Therefore, when the original pivot recovers, it will resume its previous role. The non-pivot members are also active, but do not make decisions. _____________________ _____________________ 325 Check Point Security Engineering Because the Pivot is busy distributing traffic, the Pivot participates to a lesser extent in the actual Load Sharing function. The other cluster members take on more traffic load. Since the Check Point Pivot feature is based on Unicast addresses only, it can work with all routers and Layer 3 switches. The following diagram and steps outline how a packet travels through a Unicast Load Sharing cluster. Figure 276 — Unicast Load Sharing Mode Packet Path _____________________ _____________________ 326 Check Point Security Engineering When the router sends a packet through the cluster, the following occurs: 1. 2. 3. 4. 5. 6. 7. 8. The router sends an ARP request for the cluster IP address. The Pivot returns an ARP reply with its own Unicast MAC address, to the router. The router sends the packet to the Pivot. The Pivot decides which cluster member should handle the packet. The Pivot forwards the packet to the designated cluster member without changing the packet. The destination IP address of the packet remains unchanged and neither decryption nor NAT functionality is performed on the forwarded packet. When sending the packet, the Pivot uses the virtual MAC address of the designated cluster member. The packet is forwarded through the original interface. The receiving cluster member performs inspection and sends the packet to its destination. The return packet first reaches the Pivot. The return packet then goes through the same process although it may not necessarily be forwarded by the Pivot to the same cluster member. The Pivot assigns the cluster member to handle the packet. The receiving cluster member performs inspection and sends the packet to its destination. P roxy A R P Address Resolution Protocol (ARP) is a communications protocol used to map an IP address to a physical machine address (MAC address) that is recognized by the local network. When a packet arrives at a gateway, the gateway will ask ARP to find a physical host or MAC address. ARP will try to locate the address and provide it so that the packet can be converted and sent to the host machine. An ARP cache table is used to maintain a correlation between each MAC address and its corresponding IP address. If ARP does not find an entry for the IP address, it will broadcast a request packet for the MAC address. By design, in ClusterXL High Availability mode or Load Sharing Unicast/Multicast mode, Gratuitous ARP request packets for specified hosts, will be sent with the Source IP addresses of the specified hosts. These requests update the ARP cache tables and do not expect a reply. Cluster synchronization does not rely on ARP. Proxy ARP enables a host or router to reply to any ARP requests with its own MAC address. In many cases the network will configure a gateway to act in proxy as the host. The gateway will accept the ARP requests and reply with its own MAC address. The Proxy ARP recognizes the destination of the network traffic and provides its MAC address as the final destination. The traffic is then routed to the intended destination using another interface or via tunnel. Proxy ARP is also useful for environments that have NAT’d Firewalls. _____________________ _____________________ 327 Check Point Security Engineering When using static NAT, a cluster can be configured to automatically recognize the hosts hidden behind it and issue ARP replies with the cluster MAC address, on their behalf. This process is referred to as Automatic Proxy ARP. If using ClusterXL VMAC mode or different subnets for the cluster IP, the Proxy ARP must be configured manually. Configuration for Proxy ARP entails: 1. 2. Configuring Data Link layer to Network layer matching on each cluster member, thus matching the IP addresses of the relevant hosts on the network where they are located to the MAC address of the Security Gateway on the network where the IP addresses of these hosts should be published. Creating relevant Manual NAT rules. The policy must be installed. Proxy ARP can create denial-of-service (DoS) attacks on a network if mis-configured. V M AC Cluster Virtual MAC (VMAC) is a variation of the High Availability (HA) and Load Sharing Unicast mode for ClusterXL. Upon failover in High Availability/Load Sharing Unicast mode, a new Active/Pivot member will send Gratuitous-ARP requests (G-ARPs) for the virtual IP with the physical MAC address of the new Active/Pivot. When this occurs, a member with a large number of Static NAT entries can transmit too many G-ARPs and network components may start to ignore them or refrain from updating them fast enough in their ARP cache table. As a result, traffic outages may occur. Configuring the cluster to use VMAC mode allows all cluster members to use the same Virtual MAC address and minimizes possible traffic outages during a failover. In addition, G-ARPs for NAT’d IP addresses are no longer needed. VMAC that is advertised by the cluster members through G-ARP requests, keeps the real MAC address of each member and adds another VMAC address on top of it. Keeping the real MAC address of each member is necessary in that connectivity to the IP address of the member itself is required. VMAC failover time is shorter than a failover that involves a physical MAC address. _____________________ _____________________ 328 Check Point Security Engineering Configuring VMAC VMAC can be configured via SmartConsole or CLI. To configure VMAC via SmartConsole, select the cluster object and navigate to the Gateway Cluster Properties window. Select the ClusterXL and VRRP menu option, and then enable the Use Virtual MAC option located under the Advanced Settings section. Figure 277 — Gateway Cluster Properties - Use Virtual MAC To configure VMAC using the command line, you must first set the value of the global kernel parameter, fwha_vmac_global_param_enabled to 1. (The default value is 0. The default value means that VMAC is disabled). To ensure that VMAC mode is enabled, run the following command on all members: fw ctl get int fwha_vmac_global_param_enabled If the value returned is 1, the feature is enabled. If not enabled, use the following command: fw ctl set int fwha_vmac_global_param_enabled _____________________ _____________________ 329 Check Point Security Engineering To view the VMAC address of each virtual cluster interface, run the following command: cphaprob -a if C l u s ter S y n c h ro n i z a t i o n To make sure each Gateway cluster member is aware of the connections going through the other members, a mechanism called State Synchronization exists, which allows status information about connections on the Security Gateways to be shared between the members. State Synchronization enables all machines in the cluster to be aware of the connections passing through each of the other machines. It ensures that if there is a failure in a cluster member, connections that were handled by the failed machine will be maintained by the other machines. Since the synchronization network carries the most sensitive Security Policy information in the organization, it is critical that system engineers protect it against malicious and unintentional threats. Check Point recommends using one of the following strategies to secure the synchronization interfaces: • Use a dedicated synchronization network. • Connect the physical network interfaces of the cluster members directly using a crosscable. In a cluster with three or more members, use a dedicated hub or switch. Every IP-based service, including TCP and UDP, recognized by the Security Gateway is synchronized. State Synchronization is used both by ClusterXL and by third-party OPSEC Certified clustering products. State Synchronization works in the following two modes: • Full Synchronization — Transfers all Firewall kernel table information from one cluster member to another. Full synchronization is used for initial transfers of state information for thousands of connections. If a cluster member is brought up after failing, it will perform full sync. Once all members are synchronized, only updates are transferred via delta sync. Full synchronization between cluster members is handled by the Firewall kernel using TCP port 256. • Delta Synchronization — Transfers changes in the kernel tables between cluster members. Delta sync is much quicker than full sync. It is handled by the Firewall kernel, using UDP Multicast or Broadcast on port 8116. Running cphastart on a cluster member activates ClusterXL on the member is the recommended way to start a cluster member. It does not initiate full synchronization. cphamcset turns off the cluster process. State Synchronization also stops. It is still possible to open connections directly to the cluster member. These commands should only be run by the Security Gateway, not directly by the user. To monitor the synchronization mechanism on ClusterXL or third-party OPSEC Certified clustering products, run the following command: fw ctl pstat _____________________ _____________________ 330 Check Point Security Engineering Synchronized Cluster Restrictions The following restrictions apply to synchronizing cluster members: Only cluster members running on the same platform can be synchronized. The cluster members must be of the same software version. With CoreXL enabled, the number of cores must be the same. A user-authenticated connection through a cluster member will be lost if the cluster member fails. This is because the user-authentication state is maintained by a process on the Security Gateway and it cannot be synchronized on members the same way that kernel data is synchronized. All other synchronized cluster members will be unable to resume the connection. However, a client-authenticated or session-authenticated connection will be maintained, because the states of these authentications are saved in kernel tables and can be synchronized. • The state of connections using system resources cannot be synchronized for the same reason that user-authenticated connections cannot be synchronized. • Accounting information is accumulated on each cluster member and sent to the Security Management Server, where the information is aggregated. In case of a failover, accounting information that was accumulated on the failed member but not yet reported to the Security Management Server is lost. To minimize the risk, reduce the period in which accounting information is sent. Navigate to the cluster object’s Logs > Additional Logging window, and edit the number of seconds to update the Account Log. • • • • To Synchronize or Not to Synchronize In general, all connections on a cluster are synchronized between members. There are a few exceptions. System engineers may choose not to synchronize certain types of connections for a variety of reasons, such as: • A significant load on the network is caused by the use of a particular service. • A service may open many short connections, whose loss may not be very important, or even noticed. For example, DNS over UDP or HTTP. • Bi-directional stickiness is employed for all connections. For example, any cluster in High Availability mode or ClusterXL in a Load Sharing mode with no VPN or static NAT. Sticky connections are discussed later in this chapter. For all TCP services whose protocol type is HTTP or None, you can configure the Security Gateway to delay a connection so that it will only be synchronized if it still exists after the connection is initiated for x seconds. This capability is only available if a SecureXL-enabled device is installed on the gateway. SecureXL is discussed in greater detail in a later chapter. _____________________ _____________________ 331 Check Point Security Engineering C l u s ter C o n n e c t i v i t y U p g ra d e There are several methods available for upgrading ClusterXL deployments. The simplest method is to upgrade each cluster member as an independent gateway, but this will cause system downtime. Other methods involve at least one Active member or two cluster members handling traffic during the upgrade. With these methods, connections that are initiated during or after the upgrade process could possibly be dropped. The Connectivity Upgrade (CU) method synchronizes existing connections to maintain connectivity and eliminate downtime during cluster upgrades. In a Cluster Connectivity Upgrade, there is always at least one Active cluster member that handles the traffic, and connection failover is guaranteed. Connections are even synchronized between cluster members running different Check Point software versions. Using CU, cluster members can be upgraded to Check Point software versions R77.20 and above. For more detailed information regarding software versions that support CU, refer to the Check Point Connectivity Upgrade Administration Guide. NOTE Cluster CU supports Dynamic Routing synchronization when upgrading to R80.10. Before upgrading with CU, it is important to make sure that the cluster has 2 or more members, with one member Active and all other members in Standby mode. The state of a cluster member can be checked by running the cphaprob state command. When the upgrade is complete, a message will display the upgrade status as ready for failover. At this point, the CCP will work in broadcast mode. To return it to multicast mode, on all cluster members, run the cphaconf set_ccp multicast command. If error messages are displayed in the connectivity upgrade script, discontinue the upgrade and contact Check Point Support. There are several features that do not survive after failover to an upgraded cluster member when using CU. These features include, but are not limited to the following: • General failover limitations such as Security servers, and connections handled by services marked as non-synced • Connections initiated by individual cluster members • TCP connections that are TCP streamed • VPN connections for Mobile Access, Remote Access, and Traditional VPN mode • FTP control connections with NAT • Sessions authenticated with Identity Awareness • DLP connections _____________________ _____________________ 332 Check Point Security Engineering In addition, Software Blade information is not synchronized during failover to an upgraded cluster member. If the blade is configured to maintain connectivity over security, the connection will be accepted without inspection and forwarded to the destination member. However if the destination member is not available, the connection will be dropped. For additional limitations related to a general failover, refer to the Check Point ClusterXL Administration Guide. A d d a M e m b e r to a n E x i s t i n g C l u s te r ClusterXL can support up to eight cluster members. To add a member to an existing cluster: 1. 2. 3. 4. 5. 6. Run cpconfig to enable ClusterXL on the cluster member. Change the IP address of the new cluster member to reflect the correct topology. Ensure that all Check Point products are installed on the new cluster member. All Check Point software components must be identical on each member of the cluster. In the Cluster Members page of the cluster object, create a new cluster member with the appropriate properties if the Security Gateway is new, or convert an existing gateway to a cluster member. If the member is a new Security Gateway, ensure that SIC is initialized and the topology is correctly defined. Ensure that the proper interfaces on the new cluster member are configured as cluster interfaces if the cluster mode is Load Sharing or New High Availability. Install the Security Policy on the cluster. The new member is now part of the cluster. Sticky Connections A connection is sticky when all of its packets are handled, in either direction, by a single cluster member. This is the case in High Availability mode, where all connections are routed through the same cluster member. In Load Sharing mode, there are cases where it is necessary to ensure that a connection that starts on a specific cluster member will continue to be processed by the same cluster member in both directions. To that end, certain connections can be made sticky by enabling the Sticky Decision Function (SDF). In a non-sticky connection, the reply packet returns via a different Security Gateway than the original packet. The synchronization mechanism knows how to properly handle these connections. In a non-sticky connection, a cluster member can receive an out-of-state packet, which the Security Gateway normally drops because it poses a security risk. In Load Sharing cluster configurations, Static NAT and encrypted connections may be non-sticky when the source and destination IP addresses change. Non-sticky connections will also occur if the System Administrator has configured asymmetric routing, where a reply packet returns through a different Security Gateway than the original packet. Asymmetric routing occurs when a packet is NAT’d or encrypted. _____________________ _____________________ 333 Check Point Security Engineering The Sticky Decision Function The SDF is required in cases of Asymmetric Routing. In these cases, the packet is modified by the cluster member, and since the packet entering the Firewall is not the same as the one leaving, the regular decision function will not be able to make sure that the packet will go back through the original member. The SDF will try to match each packet to numerous kernel tables in an attempt to decide which member should handle the packet. The SDF enables certain services to operate in a Load Sharing deployment. For example, it is required for Layer 2 Tunneling Protocol (L2TP) traffic, or when the cluster is a participant in a Site-to-Site VPN tunnel with a third-party peer. The following services and connection types are supported by enabling the SDF: • VPN deployments with third-party VPN peers • Endpoint Connect/SSL Network Extender encrypted connections The SDF is not supported when employing either acceleration technologies, such as SecureXL and CoreXL, or a hardware-based accelerator card. Enabling the SDF disables these acceleration products. M a n a g e m e n t H i g h Ava i l a b i l i t y The Security Management Server consists of several databases with information on different aspects of the system, such as objects, users, and policy information. This data changes each time the System Administrator makes modifications to the system. It is important to maintain a copy of this data so that crucial information is not permanently lost in the event of an Security Management Server failure. Moreover, if the management server fails or is down for administrative purposes, a secondary server must be in place to take over its activities. In the absence of the Security Management Server, essential operations performed by the gateways, such as the fetching of the Security Policy and the retrieval of the Certificate Retrieval List (CRL), cannot take place. Installing a secondary Security Management Server and deploying Management High Availability (HA) provides Security Management Server redundancy. In a Management High Availability environment, the Active Security Management Server, which is specified as the Primary, always has one or more standby management servers ready to take over in the event of a failure. The Standby Security Management Servers must all be of the same operating system and version. The existence of the Standby Security Management Server allows for crucial backups to be in place. When a Standby Security Management Server is installed, configure and specify it as Secondary. Initially, the Primary and Secondary Security Management Servers must be manually synchronized. If additional Standby servers are installed, configure automatic synchronization in the Global Properties. _____________________ _____________________ 334 Check Point Security Engineering Once the Secondary Security Management Server has been installed and manually synchronized, the Primary and Secondary are both prepared to function as the Active Security Management Server. Secondary and Standby Security Management Servers The Secondary Security Management Server is created with empty databases that are filled with information that it receives from the Active Security Management Server. The Secondary Security Management Server is ready when: • It is represented on the Primary Security Management Server as a network object. • SIC has been initialized between it and the Primary Security Management Server. • Synchronization has been completed with the Primary Security Management Server for the first time. In a situation where the Primary Security Management Server becomes permanently unavailable, it is not sufficient to do the failover procedure and change the Standby server to Active. The Secondary server must be promoted to Primary, or a new Primary must be established. The database can only be exported from a Primary server. All management operations, such as editing and installing the Security Policy and modifying users and objects, are done by the Active Security Management Server. If the Active server is down and any of these operations need to be performed, the Secondary or one of the Standby Security Management Servers should be made active by the System Administrator. This transition from Standby to Active must be initiated manually. The Standby servers are synchronized to the Active server so they are kept up-to-date with all changes in the databases and Security Policy. Security Gateways can fetch the Security Policy and retrieve a CRL from both the Active and the Standby servers. Security Management Server Failover Security Management Server failover is a manual procedure. If the Active Security Management Server fails or it is necessary to change the Active to Standby, the following steps must be taken to prevent data loss. If the Active Security Management Server is responsive: 1. 2. 3. Manually synchronize the Active and Standby Security Management Servers. Change the Active Security Management Server to Standby. Change the Standby Security Management Server to Active. _____________________ _____________________ 335 Check Point Security Engineering If the Active Security Management Server has failed and is unresponsive to changes, manually change the Standby Security Management Server to Active. Make sure that no peer server is Active before making the change. NOTE If two Security Management Servers are set to Active at the same time, unexpected behavior can occur. Before making changes to the High Availability environment, make sure that the status of each Security Management Server is known. Synchronizing Management HA Active and Standby Servers Synchronization can be performed manually or automatically. Manual synchronization is a process initialized by the System Administrator. It can be set to synchronize databases and the installed Security Policy. After Standby servers are installed, the first synchronization must be performed manually even if the system is configured for automatic synchronization. Automatic synchronization is configured by the System Administrator to allow the Standby Security Management Server to be synchronized with the Active Security Management Server at set intervals. This is the standard mode of synchronization because it keeps the Standby Security Management Server updated. The synchronization schedule is based on when the Security Policy is installed, which can be set to every time the policy is saved or on a set scheduled time, such as daily at 2:00 AM. It is always possible to synchronize manually, even when automatic synchronization has been selected. When synchronization is in progress, all databases are locked, and a snapshot of the databases are saved to a local disk. The system then compresses the snapshot data and copies the snapshot from the Active Security Management Server to all Standby management servers. The Standby servers will overwrite their databases with the snapshot and send a Restore status notification to the Active Security Management Server. For Management HA to function properly, the following data is backed up and synchronized: • Network Security Management Databases (such as the Network Objects, policy settings, and the Security Policy itself) • Configuration and Internal Certificate Authority (ICA) data (such as Objects and Users databases, certificate information, and the CRL, which is available to be fetched by the Check Point Security Gateways) • Endpoint Security databases, if applicable _____________________ _____________________ 336 Check Point Security Engineering Synchronization Status The synchronization status indicates the status of the peer Security Management Server in relation to that of the selected Security Management Server. This status can be viewed in the Management High Availability window or in SmartView Monitor, depending on whether you are connected to the Active or Standby Security Management Server. The following statuses may be displayed: • Never been synchronized — Immediately after the Secondary Security Management Server has been installed, it has not yet undergone the first manual synchronization that brings it up-to-date with the Primary Security Management Server. • Synchronized — The peer is properly synchronized and has the same database information and installed Security Policy. • Lagging — The peer Security Management Server has not been synchronized since the Active Security Management Server had changes applied to it. • Advanced — The peer Security Management Server is more up-to-date. • Collision — The Active Security Management Server and its peer have different installed policies and/or databases. The System Administrator must perform manual synchronization and decide which of the servers to overwrite. For example, when Security Management Server-A fails before a synchronization takes place, the changes made to databases or to the Security Policy cannot be synchronized with Security Management Server-B. When Security Management Server-B takes over from Security Management Server-A, the System Administrator may decide to modify the Security Policy. Synchronization Troubleshooting Synchronization can fail for technical reasons, such as when the Active Security Management Server does not connect with the Standby Security Management Server. To resolve issues such as this, perform one of the following actions: • Manually synchronize the Standby Security Management Server. • Install the Security Policy on the Active Security Management Server again. Use this option if automatic synchronization is configured. Once the policy is re-installed, the synchronization should occur automatically. _____________________ _____________________ 337 Check Point Security Engineering Synchronization can also fail if a collision occurs. In this case the System Administrator should manually synchronize the servers and choose which database is the dominant database. The CA is merged to prevent security issues. If a collision occurs between the servers, and one of the Security Management Servers is overwritten, use the Audit Logs to better understand the situation. Review the management operations which were recently performed on the overwritten server and perform them again, on the dominant server, if necessary. O P S E C C e r ti f i e d C l u s ter i n g P ro d u c t s Products that carry the OPSEC Certified seal have been tested to guarantee integration and interoperability with Check Point software and hardware platforms. There are a number of OPSEC Certified High Availability and Load Sharing products which are used to configure HA Security Gateway clusters and to distribute traffic evenly among the clustered gateways. These clustering applications vary in monitoring, management, and performance capabilities. Their role however, is the same in that they each: 1. 2. 3. Decide which cluster member will deal with each connection. Perform health checks, which involves checking cluster member status (Active, Standby or Down) and member interface status. Perform failover. As with ClusterXL, OPSEC Certified clustering products use Check Point State Synchronization to exchange and update connection data and other Security Gateway states between cluster members. L a b 3 .1 Deploying a Secondary Security Management Server _____________________ _____________________ 338 L A B Deploying a Secondary Security Management Server 3.1 You will now configure a secondary Security Management Server and install it at the Alpha site for full Management High-Availability. Ta sks : • Install a secondary Security Management Server at the Alpha site. • Configure Alpha’s secondary Security Management Server for High Availability. • Test Management High Availability. Pe r for ma n c e Ob j ec t ive s: • Install and Configure Management High Availability. _____________________ _____________________ 339 Check Point Security Engineering Installing the Secondary Management Server Configure the secondary Security Management Server for Alpha. 1. Verify that your instructor has pre-installed the secondary SMS at the Alpha site. NOTE If the instructor has not previously installed the secondary SMS, perform the installation and configure the new machine to match the hardware settings (Hard Disk size, RAM allotment, etc.) of the primary SMS. The log partition should be at least 30 GB. It’s IP address should be 10.1.1.102/24 and it’s default gateway should be 10.1.1.1. Only the default admin user is needed and should be configured with Chkp!234 as the password. A-GUI, connect to the newly installed server (10.1.1.102) through HTTPS. 3. Log into the Gaia Portal using the following credentials: 2. Username: admin Password: Chkp!234 4. Begin the First Time Configuration wizard for A-SMS-02. _____________________ _____________________ 340 Check Point Security Engineering 5. Use the following information to configure the Device Information page: Host Name: A-SMS-02 Domain Name: alpha.cp Primary DNS Server: 192.168.11.101 Figure 278 — Device Information 6. Configure the NTP server to be: 192.168.21.101 On the Products page, clear the Security Gateway option. 8. Select only the Security Management option. 7. _____________________ _____________________ 341 Check Point Security Engineering 9. In the Clustering section, select Secondary from the Define Security Management as drop-down list: Figure 279 — Products NOTE It is important to define this server as secondary prior to establishing SIC. 10. Click Next. 11. Enter and confirm sic123 as the Activation Key. 12. Click the Finish button, and begin the configuration process. _____________________ _____________________ 342 Check Point Security Engineering 13. In the Messages page, add the following text: A-SMS-02 Unauthorized access of this server is prohibited and punishable by law. Figure 280 — Messages Configured 14. Click Apply. 15. Sign out of the Gaia Portal. _____________________ _____________________ 343 Check Point Security Engineering Configuring Management High Availability Configure the secondary Security Management Server for Management High Availability functions. On A-GUI, launch SmartConsole and log into A-SMS (10.1.1.101). 2. In the Objects pane, click New > More > Network Object > Gateways and Servers > Check Point Host. 1. Figure 281 — Objects Pane Menu 3. Use the information below to configure the Check Point Host: Name: A-SMS-02 IPv4 Address: 10.1.1.102 Comment: Alpha Secondary Security Management Server _____________________ _____________________ 344 Check Point Security Engineering 4. In the Management tab of the Host object, select Network Policy Management. NOTE By default, the system selects the Secondary Server and Logging & Status options. 5. Verify that the A-SMS-02 object is configured as follows: Figure 282 — Check Point Host _____________________ _____________________ 345 Check Point Security Engineering 6. Click on the communication button and establish SIC with the server, using the following activation key: sic123 Select the option Don’t show this message again. 8. Click OK, to clear the message. 9. Click OK to close the object. 10. Publish the changes, and the system begins initialization of A-SMS-02: 7. Figure 283 — Peer Initialization _____________________ _____________________ 346 Check Point Security Engineering 11. After the secondary SMS is initialized, the system automatically beings the full synchronization process: Figure 284 — Full Sync Task Details _____________________ _____________________ 347 Check Point Security Engineering 12. Click the Menu icon to view the Application Menu: Figure 285 — Application Menu 13. Select Management High Availability, and the system displays the following window: Figure 286 — High Availability Status _____________________ _____________________ 348 Check Point Security Engineering 14. Confirm that the synchronization completed successfully. 15. Close the status window. 16. Install the Alpha Security Policy. 17. Install the Bravo Security Policy. _____________________ _____________________ 349 Check Point Security Engineering Testing Management High Availability View the Alpha Security Policy on the secondary SMS to verify High Availability functionality. 1. From SmartConsole, click Application Menu > Management High Availability to view the synchronization status: Figure 287 — Management High Availability status NOTE If you get a synchronization error, wait a minute, and try again. 2. Close all other SmartConsole applications that may be open at this time. NOTE The only application running should be the one initiating the synchronization. If other applications are open, the change action will fail. 3. In the Status window, click the Actions button associated with A-SMS. _____________________ _____________________ 350 Check Point Security Engineering 4. Click Set Standby, and the system displays the following message: Figure 288 — SmartConsole 5. Click OK, and the system displays the following warning: Figure 289 — SmartConsole Click OK to close SmartConsole. 7. Re-launch SmartConsole and use the information below to connect to the secondary Security Management Server: 6. Username: admin Password: Chkp!234 IP Address: 10.1.1.102 NOTE If you are unable to log into A-SMS-02 and receive an “Internal Error,” Reboot A-SMS and wait five minutes after the reboot completes before attempting to log into A-SMS-02. _____________________ _____________________ 351 Check Point Security Engineering 8. Click Login, and approve the fingerprint message to continue: Figure 290 — Fingerprint 9. Click Proceed, and SmartConsole displays the Gateways & Servers tab of A-SMS-02: Figure 291 — Gateways & Servers _____________________ _____________________ 352 Check Point Security Engineering 10. Click the Application Menu. 11. Select Management High Availability, and the system displays the status screen showing A-SMS-02 set to Standby: Figure 292 — High Availability Status 12. In the A-SMS-02 section, click Actions > Set Active, and the system displays the following message: Figure 293 — SmartConsole _____________________ _____________________ 353 Check Point Security Engineering 13. Click Yes, and the system displays the following window: Figure 294 — High Availability Status 14. After the change over completes, the system displays the following message: Figure 295 — SmartConsole 15. Click OK. 16. Verify that the High Availability Status window confirms a successful changeover: Figure 296 — High Availability Status _____________________ _____________________ 354 Check Point Security Engineering 17. Close SmartConsole. 18. Log into SmartConsole, connecting to A-SMS-02 (10.1.1.102): Figure 297 — Login Window _____________________ _____________________ 355 Check Point Security Engineering 19. Verify policy synchronization: Figure 298 — Full Sync Task Details NOTE Wait for the full sync to complete before proceeding to the next step. Check the synchronization status by viewing the Recent Tasks list in the lower left corner of SmartConsole. _____________________ _____________________ 356 Check Point Security Engineering 20. Next, use the information below to configure a new Host object: Name: Test Comment: Management HA Test Object Color: Pink IP Address: 192.168.0.201 Figure 299 — New Host Configured _____________________ _____________________ 357 Check Point Security Engineering 21. Publish and install the Alpha Security Policy. Figure 300 — Install Policy _____________________ _____________________ 358 Check Point Security Engineering 22. Verify successful policy installation from A-SMS-02: Figure 301 — Install Policy Details 23. From the application menu, select Management High Availability: Figure 302 — High Availability Status 24. In the A-SMS-02 section of the window, click the Actions button. _____________________ _____________________ 359 Check Point Security Engineering 25. Click Set Standby, and the system displays the following message: Figure 303 — SmartConsole 26. Click OK, and the system switches A-SMS-02 to standby. Figure 304 — SmartConsole 27. Click OK, to close SmartConsole. _____________________ _____________________ 360 Check Point Security Engineering 28. Next, log into A-SMS: Figure 305 — SmartConsole Login NOTE Verify that you are logging into A-SMS (10.1.1.101) before continuing. _____________________ _____________________ 361 Check Point Security Engineering 29. Once connected to A-SMS, view the list of Host objects to see the new Test object exists: Figure 306 — Test Object Confirmation 30. Click the Application Menu. 31. Select Management High Availability, and the system displays the status screen showing A-SMS set to Standby: Figure 307 — High Availability Status _____________________ _____________________ 362 Check Point Security Engineering 32. In the A-SMS section, click Actions > Set Active, and the system displays the following message: Figure 308 — SmartConsole 33. Click Yes, and the system displays the following window: Figure 309 — SmartConsole 34. Click OK. 35. Confirm that A-SMS shows a status of Active: Figure 310 — High Availability Status 36. Publish any changes to the database and close SmartConsole. 37. Open SmartConsole again, this time connecting to 10.1.1.101. The Management High Availability Status window shows A-SMS as Active and A-SMS-02 as Standby. _____________________ _____________________ 363 Check Point Security Engineering 38. Publish and install the Alpha_Standard Security Policy. NOTE If your environment is not fully functional, contact your instructor for assistance. Do not proceed if your configuration has problems. 39. Once the primary server is shown as active and synchronized, power off the secondary Security Management Server. NOTE Make sure that all synchronization and policy installation events are completed before powering off A-SMS-02. 40. Delete the A-SMS-02 object. 41. Publish and install the Alpha Security Policy. 42. Install the Bravo Security Policy. END OF LAB 3.1 _____________________ _____________________ 364 Check Point Security Engineering VRRP Clusters Virtual Routing Redundancy Protocol (VRRP) and ClusterXL are mutually exclusive. VRRP is a network management protocol that is used to increase the availability of default gateway servicing hosts on the same subnet. It improves the reliability and performance of the host network by enabling a virtual router to act as the default gateway for that network. VRRP enables you to set up a group of routers as a default gateway router for backup or redundancy. As a cluster solution, it makes the group of physical routers appear as a single virtual router, allowing hosts to configure the virtual router as their default gateway. The VRRP routing platforms share the IP address corresponding to the default route configured on the hosts. Similarly to ClusterXL, one of the VRRP routing platforms is the Master (active) and the others are backups (standby). If the Master fails, one of the backup routers becomes the new Master router, providing a virtual default gateway and enabling traffic to be routed without relying on the failed router. A priority algorithm is used to determine if failover to a backup is necessary, when the Master or its interfaces fails. VRRP increases redundancy, making it significantly beneficial in situations where the availability of the default path for network hosts is critical. It can be implemented in Ethernet, multi-protocol label switching, and token ring networks. As with ClusterXL, VRRP clusters can be configured for High Availability. Each VRRP cluster, known as a virtual router, has a unique Virtual Router Identifier (VRID).The VRID is a number used to group the routers. A virtual router can have one or more virtual IP (VIP) addresses to which other network nodes connect as a final destination or the next hop in a route. Only the Master is assigned a VIP. The backup is assigned a VIP upon failover when it becomes the Master. Check Point’s implementation of VRRP includes additional functionality called Monitored Circuit VRRP. Monitored Circuit VRRP prevents black holes caused by asymmetric routes created when only one interface on the Master router fails, as opposed to the Master itself. Gaia releases priority over all interfaces on a virtual router to let failover occur. NOTE You cannot have a standalone deployment in a Gaia VRRP cluster. _____________________ _____________________ 365 Check Point Security Engineering VRRP Features VRRP is specifically designed to enable data routing, forwarding, and switching among a pool of virtual routers. When using VRRP, a higher availability default path is gained without requiring the configuration of dynamic routing or router discovery protocols on every host. While there are methods such as Proxy ARP that can help clients find their default router, many security engineers simply configure a static route to a single router on each client because it is easier. However, if the single router goes down, the client will be unable to reach other networks. VRRP features include: • Minimized failover time and bandwidth overhead when a primary router becomes unavailable • Support of up to 255 virtual routers on a router physical interface, subject to the platform supporting multiple MAC addresses • Minimized service disruptions during failover • Provision for election of multiple virtual routers on a network for Load Sharing • No need to make configuration changes in the end nodes if a gateway router fails • Router discovery protocols to support failover operations is no longer required • Failover problems are addressed at the router level instead of on the network edge • Functionality over a wide variety of multi-access LAN technologies capable of supporting IP traffic V R R P Typ e s VRRP can be configured using one of these types: • Simple Monitored Circuit VRRP — This configuration contains all of the basic parameters and is applicable for most environments. Each virtual router is configured as one unit. • Advanced VRRP — This procedure requires users to manually configure a virtual router for each monitored interface. Use Advanced VRRP if you are working with: ◦ A system on which VRRP has already been configured using this method. ◦ An environment where it is necessary to monitor each interface individually. ◦ The preempt VMAC mode. Simple Monitored Circuit VRRP and Advanced VRRP cannot be used together on the same Security Gateway. _____________________ _____________________ 366 Check Point Security Engineering Monitored Circuit VRRP Monitored Circuit VRRP is a functionality included in the Check Point VRRP implementation. It eliminates connection issues caused by asymmetric routes when only one interface on the Master fails, as opposed to the entire platform. This problem occurs in environments where a gateway is a member of two or more virtual routers, typically one with internal interfaces and the other with external interfaces. For example, when an external interface fails or becomes unreachable, the Master fails over to the backup for the external virtual router while the internal virtual router stays on the Master. This can cause connectivity issues when the internal virtual router accepts traffic and is unable to connect to the new external Master. Simple Monitored Circuit VRRP monitors all VRRP interfaces on the Security Gateways. When using Advanced VRRP, each interface in a virtual router can be configured separately. If one interface fails, the Master releases its priority over all of its VRRP interfaces. This allows the Master to fail over on all virtual routers that include the failed Master. To release priority, Gaia subtracts the Priority Delta, a Check Point proprietary parameter which is defined when the virtual router is configured, from the Priority Value to calculate an Effective Priority. If configured properly, the Effective Priority will be lower than that of the backup routers in the other virtual routers and the VRRP election protocol is triggered to select a new Master. If the Effective Priority for the current Master and backup are the same, the gateway with the highest IP address becomes the Master. Security Policies Security policies must be configured to accept VRRP packets on the Gaia platform if it is a Firewall blade-enabled Security Gateway. The Multicast destination assigned by the Internet Assigned Numbers Authority (IANA) for VRRP is 224.0.0.18. If the policy does not accept packets to 224.0.0.18, Firewall platforms in one Virtual Router take on Master state. If your Security Gateways use dynamic routing protocols such as OSPRF or RIP, create new rules for each multicast destination IP address. _____________________ _____________________ 367 Check Point Security Engineering Advanced VRRP Advanced VRRP allows virtual routers to be configured at the interface level. Every virtual router must be configured to monitor every VRRP interface. Advanced VRRP can be changed to Simple Monitored Circuit VRRP by deleting all existing virtual routers and creating new ones. When changing, it is important to understand that a backup address cannot be moved from one interface to another while a Security Gateway is a Master. The following steps are performed to delete and add new interfaces with the necessary IP addresses: 1. 2. 3. 4. 5. Cause a failover to the backup. Reduce the priority or disconnect an interface. Delete the virtual router on the interface. Create a new virtual router using the new IP address. Configure the virtual router. Advanced VRRP can be configured via WebUI or CLI. Use set and show commands to configure global and advanced VRRP settings via CLI, such as: set vrrp interface VALUE show vrrp interface VALUE _____________________ _____________________ 368 Check Point Security Engineering VRRP Configuration Parameters Regardless of the type of VRRP method used, VRRP configuration parameters must be defined and configured on each node. The values for each parameter are described in the table below. Parameter Description VRID Range is 1- 255. Choose a numbering scheme for the virtual routers that will make sense to your organization. Priority Range is 1 - 254. The default value is 100. The priority value determines which router takes over in the event of a failure. The router with the higher priority becomes the new master. To provide a faster transition is the event of a failure, set the priority to 254 for at least one platform in each VRID, and choose values on the higher end of the scale for the backups. Effective Priority = Priority - the Priority Delta. Priority Delta This parameter applies only to Monitored Circuit VRRP. Check Point recommends using a standard priority delta, such as 10, to simplify configuration. Choose a value that will ensure that when an interface fails, the priority delta subtracted from the priority results in an effective priority that is lower than that of all of the backup routers. Hello Interval Range is 1 - 255 seconds. The default setting is 1 second. The Hello Interval is the time interval in seconds at which the master sends VRRP advertisements. Set the same value for all nodes in the VRID. Authentication Choose to require no authentication for VRRP advertisements or to require a simple password before a VRRP advertisement is accepted by the interface. Select the same authentication method for all nodes in the VRID. Backup Address This parameter applies only to Monitored Circuit VRRP. The backup (Virtual IP Address) address must be in the same network as the interface used for the VRID. When entered, the system will use the interface that is in that subnet for the VRID. Table 7: VRRP Configuration Parameters Lab 3.2 Enabling Check Point VRRP _____________________ _____________________ 369 Enabling Check Point VRRP L A B 3.2 In this lab, you will add Check Point VRRP to your ClusterXL deployment to add additional functionality and reliability. Ta sks : • Define a virtual router for the VRRP configuration. • Configure the Bravo Security Policy to allow VRRP traffic between cluster members. Pe r for ma n c e Ob j ec t ive s: • Demonstrate how to configure VRRP as the failover method for a Security Gateway Cluster. _____________________ _____________________ 370 Check Point Security Engineering Viewing ClusterXL Failover Before deploying VRRP, review the behavior of a Cluster deploying only ClusterXL. Log into B-GW-01. 2. Type the following command and press Enter, to identify the status of the Bravo cluster: 1. cphaprob stat Figure 311 — cphaprob stat 3. Identify the Active cluster member. _____________________ _____________________ 371 Check Point Security Engineering 4. Next, review the synchronization status of each interface configured in the Bravo cluster by executing the following command: cphaprob -a if Figure 312 — cphaprob -a if _____________________ _____________________ 372 Check Point Security Engineering 5. On the Active cluster member, force failover by clearing the following option on Network Adapter 2 (Internal Interface): Connected Figure 313 — Internal Interface Manipulated 6. Click OK. _____________________ _____________________ 373 Check Point Security Engineering 7. On the system disconnected in the steps above, review the state of the interfaces by executing the following command: cphaprob -a if Figure 314 — cphaprob -a if 8. Next, confirm that the member gateways have failed over: cphaprob stat Figure 315 — cphaprob stat 9. Reconnect Network Adapter 2 on the system that was disconnected in the steps above. _____________________ _____________________ 374 Check Point Security Engineering Defining a Virtual Router for VRRP Use the Gaia Portal to reconfigure both Security Gateways in preparation for switching to a VRRP failover solution. From A-GUI, use HTTPS to connect to B-GW-01 (203.0.113.102) 2. Log in using the following credentials and the system displays the Overview page: 1. Username: admin Password: Chkp!234 Figure 316 — Overview _____________________ _____________________ 375 Check Point Security Engineering 3. In the navigation pane, click Network Interfaces: Figure 317 — Network Interfaces 4. Make a note of the following IP addresses associated with the interfaces on this machine. eth1: ____________________ eth2: ____________________ eth3:_____________________ NOTE Remember, the synchronization network for our configuration is 192.168.20.0. That makes eth2 our sync interface. _____________________ _____________________ 376 Check Point Security Engineering In the navigation pane, locate the High Availability section. 6. Click VRRP, to view the following page: 5. Figure 318 — VRRP _____________________ _____________________ 377 Check Point Security Engineering 7. In the Virtual Routers section, click Add: Figure 319 — Add Virtual Router 8. In the Virtual Router ID field, type 1. _____________________ _____________________ 378 Check Point Security Engineering 9. Verify that the Virtual Router is configured with the following information: Virtual Router ID: 1 Priority: 100 Priority Delta: 10 Hello Interval: 1 Preempt Mode: Selected Auto-deactivation: Unchecked Authentication: None Figure 320 — Add Virtual Router Configured NOTE The Priority and Delta values determine how the system fails over. In this scenario, we have two gateways, the first with a priority of 100 and the second with a priority of 95. If the first gateway fails, it’s priority changes to 90 and the second gateway with the higher priority (95) takes over. _____________________ _____________________ 379 Check Point Security Engineering 10. In the Backup Address section of the window, click Add. 11. Enter the cluster IP address (203.0.113.100) and select VRRP for the mode: Figure 321 — Add Backup Address Configured 12. Click OK. 13. Next add the following backup address, with VMAC Mode of VRRP, for the internal interface: 192.168.21.1 14. Verify that the Add Virtual Router window is configured as follows: Figure 322 — Add Virtual Router Configured _____________________ _____________________ 380 Check Point Security Engineering 15. Click Save, and the system adds the Virtual Router to the configuration: Figure 323 — VRRP - Virtual Router Configured NOTE Since eth2 is the sync interface, it should not have a cluster IP address. 16. Log out of the Gaia Portal for B-GW-01. _____________________ _____________________ 381 Check Point Security Engineering 17. Use HTTPS to log into the Gaia Portal for B-GW-02 (203.0.113.103). 18. From the Overview page, make a note of the interfaces configured for B-GW-02: Figure 324 — Overview 19. Make a note of the IP addresses associated with the following interfaces on this machine. eth1: ____________________ eth2: ____________________ eth3: ____________________ NOTE Remember, the synchronization network for our configuration is 192.168.1.0. That makes eth3 our sync interface. 20. Navigate to the VRRP page and add a Virtual Router. _____________________ _____________________ 382 Check Point Security Engineering 21. Use the information below to configure the Virtual Router settings: Virtual Router ID: 1 Priority: 95 Priority Delta: 10 Hello Interval: 1 Preempt Mode: Selected Auto-deactivation: Unchecked Authentication: None Backup Addresses: 203.0.113.100 192.168.21.1 _____________________ _____________________ 383 Check Point Security Engineering 22. Verify that the new Virtual Router is configured as follows: Figure 325 — Add Virtual Router Configured NOTE To work, the priority of this gateway must be higher than the diminished priority of the gateway we just configured (100 - 90 < 95). _____________________ _____________________ 384 Check Point Security Engineering 23. Click Save, and the system displays the Virtual Router in the VRRP page: Figure 326 — VRRP NOTE The Virtual Router ID must be the same, 1 in our configuration, for all gateways in the cluster. 24. Sign out of this session. _____________________ _____________________ 385 Check Point Security Engineering 25. Log into the B-GW-01 virtual machine, and type the following command: cpconfig 26. View the configuration options: Figure 327 — cpconfig 27. Verify that item number six reads as follows: Disable cluster membership for this gateway NOTE If item six reads Enable cluster membership for this gateway, type 6 and press Enter. If not, this feature is already configured, so continue to the next step. 28. Exit cpconfig. 29. After exiting cpconfig, reboot the virtual machine and save the configuration. 30. Repeat steps 25-29 for B-GW-02. _____________________ _____________________ 386 Check Point Security Engineering Configuring the Security Policy for VRRP In a previous lab, you defined a cluster object for use in the Bravo ClusterXL configuration. Confirm the cluster configuration and modify the object to work with VRRP High Availability. In SmartConsole, edit the B-GW-Cluster object. 2. Select Network Management, and verify that the interfaces are configured as follows: 1. Figure 328 — Gateway Cluster Properties - Topology Configured _____________________ _____________________ 387 Check Point Security Engineering Select General Properties, and verify that the object’s OS is defined as “Gaia”. 4. In the Network Security tab, clear the ClusterXL option: 3. Figure 329 — Gateway Cluster Properties - General Properties Configured _____________________ _____________________ 388 Check Point Security Engineering In the navigation pane, click 3rd Party Configuration. 6. Select High Availability for the Cluster Mode. 7. In the 3rd Party Solution drop-down list, select Check Point IPSO VRRP: 5. Figure 330 — 3rd Party Configuration 8. Verify that the following options are selected: ◦ Hide Cluster Members’ outgoing traffic behind the Cluster IP Address ◦ Forward Cluster’s incoming traffic to Cluster Members’ IP Addresses Click OK. 10. View the Bravo Security Policy. 9. _____________________ _____________________ 389 Check Point Security Engineering 11. Create a new rule below the Noise rule. 12. Use the following information to configure the new rule to allow VRRP traffic between cluster members: Name: VRRP Source: B-GW-Cluster Destination: Any Service: VRRP Action: Accept Track: Log Figure 331 — VRRP Traffic Rule 13. Publish and install the Bravo Security Policy. _____________________ _____________________ 390 Check Point Security Engineering 14. In the Gateways & Servers tab of SmartConsole, view the B-GW-Cluster object: Figure 332 — Gateways & Servers _____________________ _____________________ 391 Check Point Security Engineering 15. Click the Device & License Information link for B-GW-01: Figure 333 — Device & License Information 16. Confirm that the ClusterXL section displays the following Working Mode status: Sync only (OPSEC) _____________________ _____________________ 392 Check Point Security Engineering 17. Click the ClusterXL arrow to view more specific information. 18. Confirm that both Security Gateways in the cluster show the Working Mode for ClusterXL as Sync only (OPSEC): Figure 334 — Device & License Information NOTE The Sync only status indicates that the VRRP Virtual Router is controlling failover. _____________________ _____________________ 393 Check Point Security Engineering 19. In Clish on each gateway, perform the cphaprob stat command. Both gateways should show as Active and the system should display a Cluster Mode of sync only (OPSEC): Figure 335 — cphaprob stat NOTE The status of both gateways show all interfaces as Active. This just means that the “heartbeat” between the interfaces indicates that both are servers are up and available. _____________________ _____________________ 394 Check Point Security Engineering 20. To check the status of the VRRP configuration, type the following command and press Enter: show vrrp Figure 336 — show vrrp NOTE Here, you’ll see the behavior of VRRP. For example, we see two interfaces configured. On this machine, all two are in the Master state. The other router should show two in the backup state. 21. Initiate an FTP session from A-GUI to B-Host and transfer an ISO or other large file. During the data transfer, force down one of the gateways to see the failover take place. NOTE You can also failover individual interfaces. Try this by initiating the FTP transfer again, but this time, change the LAN setting of the External interface to be LAN X. When you run the show vrrp command on the secondary machine, the status will show one master and one backup. END OF LAB 3.2 _____________________ _____________________ 395 Check Point Security Engineering Review Questions 1. What happens when the Sticky Decision Function (SDF) is enabled? 2. Describe what a cluster VMAC is and how it works. _____________________ _____________________ 396 C H A P T E R Check Point Security Engineering Acceleration 4 Check Point provides two software-based acceleration features to optimize performance: SecureXL and CoreXL. SecureXL is a software acceleration product installed on Security Gateways, to create a SecureXL device layer. The Check Point Security Gateway enables security decisions to be made at this lower application level to remove performance bottlenecks. CoreXL is a performance-enhancing technology for Security Gateways on multi-CPU-core processing platforms. When enabled, CoreXL empowers the processing CPU cores to simultaneously perform multiple tasks, which enhances Security Gateway performance without requiring changes to management or to network topology. This chapter also introduces Multi-Queue, which allows each network interface to use more than one CPU for acceleration. Learning Objectives • Understand how SecureXL acceleration technology enhances and optimizes Security Gateway performance. • Understand how CoreXL acceleration technology enhances and improves Security Gateway performance. _____________________ _____________________ 397 Check Point Security Engineering SecureXL: Security Acceleration SecureXL is a patented Check Point security acceleration technology that accelerates multiple, intensive security operations, including operations carried out by Check Point’s Stateful Inspection Firewall. When enabled on a Security Gateway, some CPU-intensive operations are processed by virtualized software instead of the Firewall kernel. Using SecureXL, the Firewall can inspect and process connections more efficiently by offloading operations to performanceoptimized software or hardware devices, dramatically increasing throughput without compromising security. SecureXL is included in Gaia and does not require an additional license. Figure 337 — Traffic Flow With and Without SecureXL Using SecureXL SecureXL accelerates packet processing performance by remembering certain attributes of packets and packet flows that have already been validated by the blades. Validation of related packets and connections is then delegated to the SecureXL API, which enables offloading of security processing to optimized processing units. This validation is done at the hardware interrupt level on x86 hardware, or supervises execution of further optimized code in IP security appliances that support them. Both of these approaches involve substantially less computing overhead than is required by the Security Gateway. _____________________ _____________________ 398 Check Point Security Engineering From SecureXL’s perspective, there are three paths of traffic flow: • Firewall Path — Packets and connections that are inspected by the Firewall. These packets and connections are not processed by SecureXL. This path is also referred to as the Slow Path. • Accelerated Path — Packets and connections that are offloaded from the Firewall to SecureXL. These packets and connections are quickly processed. • Medium Path — Packets that cannot use the accelerated path because they require deeper inspection. Although it is not necessary for the Firewall to inspect these packets, they can be offloaded by another feature. For example, packets that are examined by IPS cannot use the accelerated path and can be offloaded to the IPS Passive Streaming Library (PSL), which provides stream reassembly for TCP connections. As a result, SecureXL processes these packets quicker than packets on the slow path. SecureXL’s purpose is to minimize connections that are processed on a slow path and accelerate the connection rate. As a connection is being established, if a packet is examined using traditional security methods and is determined to be safe, the SecureXL device layer takes over responsibility for examining any remaining packets to reduce latency. SecureXL can be implemented at both a hardware layer, such Gaia-based appliances or at a virtual software layer on open servers. Pa c ket A c c e l e r a t i o n Packet acceleration, which is also referred to as throughput acceleration, identifies connections by five attributes: • • • • • Source address Destination address Source port Destination port Protocol When the packets in a connection match all five attributes, the traffic flow can be processed on the accelerated path. However, only packets during the specific TCP/UDP connection can be accelerated. Packets attempting to establish a new TCP connection, or a comparable UDP connection table entry in the Firewall, are handled in the slow path because they require more processing. Once the first packet is seen by the Firewall and suitable connection information is offloaded to an appliance operating system, further packets are handled at the operating system's interruptlevel code. SecureXL improves non-encrypted Firewall traffic throughput and encrypted (VPN) traffic throughput by a significant amount, particularly for small packets flowing in long duration connections. _____________________ _____________________ 399 Check Point Security Engineering There are several factors that preclude a packet from being accelerated, such as: The ClusterXL Sticky Decision Function (SDF) feature is enabled The first packet of any new TCP or UDP session, unless a template exists Connections destined to or originating from the Security Gateway Connections that require Security servers (Authentication, Antivirus, URL Filtering, Anti-Spam, DNS protocol enforcement) • Connections that have a Handler (ICMP, FTP, H.323, etc.) • Some IPS features (IP, ID, TTL) • Multicast packets • • • • S e s s i o n R a te A c c e l e r a t i o n SecureXL also reduces the overhead in establishing certain kinds of new connections, improving new connection rate (connections per second), connection setup/tear-down rate (sessions per second), and throughput in certain high-connection rate traffic environments. The principle involved is a simple extension of SecureXL’s approach to one-time validation of a Firewall flow. The one-time validation is extended from a particular 5-attributes to a range, or block, of one or more of these attributes. This means that to accelerate the rate of new connections, connections that do not match a specified 5-attributes are still processed by SecureXL. As an example, the source port of a packet flow may be masked off, effectively providing a global match for source port. Once a flow is validated and established, SecureXL creates and saves a template of that flow with the source port masked off. Any new connection setup packet that matches the other 4 attributes is processed on the accelerated path, thus avoiding Firewall inspection and additional computing overhead. Security is not impacted because the operating system continues to track the state of the new connection using Stateful Inspection. _____________________ _____________________ 400 Check Point Security Engineering Masking the Source Port To examine how ports are used in establishing TCP connections, consider the following scenario. A client requesting a connection to a server initiates the TCP three-way handshake. The client addresses the server, typically at a well-known port number depending on the service provided by the server, such as port 23 for Telnet or port 80 for HTTP. Together the server’s IP address and the well-known port number form a socket address. The client assigns and pairs an OS-selected port number with the client’s IP address to create a socket address for the reverse direction. Figure 338 — Port Connections Application Layer Protocol - An HTTP Example Consider higher-level application protocols that involve numerous TCP connections between the client and server, either simultaneously (in parallel), sequentially, or both. HTTP, which accounts for most Internet traffic, is one of these protocols. HTTP generates most of the new connection requests in enterprise and Internet traffic. Web pages consist of multiple HTTP components, text, and perhaps dozens of graphic elements. Using HTTP, each component is downloaded from server to client using a separate TCP connection. This action involves substantial overhead in connection setup and tear-down and in protective-Firewall connection tracking (Firewalls at both ends). _____________________ _____________________ 401 Check Point Security Engineering In all cases between a web client and a web server, TCP connection establishment is initiated by the web client, which then sends an HTTP request. The web server responds by sending the HTTP component: • HTTP Request (->) — Each of the packets from the web client that requests an HTTP component from the web server has the same source address, destination address, destination port (80), and protocol (HTTP). Only the source port, assigned (one per connection) by the web client's operation system, differs to create unique socket addresses at the client for each HTTP request/component (via separate TCP connections for each component). • HTTP Component (<-) — Going the other direction, each of the packets from the web server that build the web page components on the web client has the same source address, destination address, source port (80), and protocol (HTTP). Only the destination port differs (it's been assigned by the client operating system to that connection). Once a connection involving a flow to port 80 is approved by the Firewall for the web client (resulting from the first HTTP request), a template is created and stored. All subsequent connection setups carrying those additional requests can share that same template approval, because it’s okay that the source ports differ. Establishing those subsequent connections does not involve a round trip to the Firewall, resulting in faster processing through the server Firewall. Similarly, at the client Firewall, once a connection involving a flow to port 80 is approved by the Firewall (as above), all subsequent connections carrying these additional requests can share that same approval. Establishing those subsequent connections does not involve a round-trip to the Firewall. SecureXL accelerates subsequent connections through both Firewalls when multiple connections share the same source address, destination address, destination port, and protocol. S e c u r e X L C o n n e c t i o n Tem p l a tes SecureXL connection templates create the opportunity to generate extremely impressive connection rate performance. Given the benefit of connection templates in heavy HTTP environments, the significant performance increase can be reflected in real-world traffic settings, such as in web server farms and enterprises where there is a great deal of web traffic to a small, concentrated set of servers. _____________________ _____________________ 402 Check Point Security Engineering To accelerate the rate of connection establishment, SecureXL groups all connections that match a particular service and whose sole differentiating element is the source port. This type of grouping enables even the very first packets of a TCP handshake to be accelerated. The first packets of the first connection on the same service will be forwarded to the Firewall kernel, which will then create a template of the connection. SecureXL has three different templates: • Accept Templates — Created when a connection is established by matching a new connection to a particular set of tuple attributes. Subsequent connections are established without performing a rule match and are therefore accelerated. Accept templates are enabled by default and generated from active connections according to policy rules. Accept template acceleration is only on connections with the same destination port. • Drop Templates — Generated by policy rules to accelerate the speed at which a connection is dropped by matching a new connection to a set of tuple attributes. Subsequent connections are dropped without performing a rule match and are therefore accelerated. Drop template acceleration is also performed only on connections with the same destination port. These templates are disabled by default. Drop templates are discussed in greater detail in the CCSM course. • NAT Templates — Generated to achieve high session rate for NAT. These templates are supported in cluster HA/VRRP and Load Sharing modes. NAT templates are controlled by global kernel parameters and disabled by default. NAT templates are discussed in greater detail in the CCSM course. Factors that Preclude Templating There are factors that can preclude templating if all other parameters are met for packet acceleration, such as: • • • • Source port ranges IPS features not supported in Acceleration NAT’d traffic, unless NAT templates are enabled Encrypted connections Once templating is disabled in the Rule Base, all connections matching rules lower in the Rule Base cannot be templated. Use fwaccel stat to determine at which rule templating is disabled and move the most used rules above that rule to take advantage of session acceleration. _____________________ _____________________ 403 Check Point Security Engineering Pa c ket F l ow The figure below shows the decision logic for packets flowing through SecureXL accelerated IP security appliances. Figure 339 — Packet Flow Decision Logic A new packet arrives at the Inbound interface. The packet is checked against the Connections table, which mirrors the Firewall’s Connections table. If there is a 5-tuple match, the new packet is part of an existing flow and is forwarded to the Outbound interface for handling (forward, drop, or reject). This path involves the least amount of forwarding overhead and accelerates throughput for packets that are part of an existing flow. If the new packet does not match an entry in the Connections table, it represents a new flow and requires a new Connections table entry. However, if the packet matches an existing connection template, then the new Connections table entry can be created (based on information in the connection template table entry) without a round trip to the Firewall application. The packet is then forwarded to the Outbound interface for handling. This path reduces the overhead involved in creating a new connection table entry and accelerates the connection rate for new connections that match existing connection templates. If the new packet does not match an existing connection template, then a round trip to the Firewall application is required in order to apply the Security Policy. This path involves the greatest overhead. _____________________ _____________________ 404 Check Point Security Engineering VPN Capabilities SecureXL adds VPN routing capabilities and enhances connectivity to support VPN in dynamic routing environments. VPN Link Selection VPN Link Selection allows multiple external interfaces to be configured for tunneling the VPN packets. It allows the Firewall to create, maintain, and update a table of Link Selection entries. The Firewall can specify which link needs to be used for a given Security Association. If that link goes down, the Firewall can update the Link Selection entries to start using a different link for the same tunnel. Dynamic VPN Routing Dynamic VPN routing allows the VPN domain to be determined dynamically instead of configuring a static VPN domain. With Dynamic VPN routing enabled, connections can transition from clear text to encrypted or from encrypted to clear text, based on the route taken by the connection. The connection properties adapt to the route changes between an external interface (untrusted) and an internal (trusted) interface by communicating in encrypted or clear text respectively. Wire Mode Connections Wire Mode Connections allow trusted traffic to pass through without Stateful Inspection. If an internal interface and the VPN Community are configured as wired (trusted), then the traffic passing through the internal interface and getting encrypted using the VPN Community will skip any Stateful Inspection. This increases the connectivity speed at lower security for traffic between wired interfaces and a wired VPN Community. L a b 4 .1 Working with SecureXL _____________________ _____________________ 405 L A B Working with SecureXL 4.1 In this lab you will learn methods of troubleshooting SecureXL, Check Point’s method of accelerating traffic through a Security Gateway. Ta sks : • Use fwaccel to review the current configuration. • Use fwaccel to identify acceleration. Pe r for ma n c e Ob j ec t ive s: • Demonstrate how fwaccel affects traffic flow. • Review the status of traffic acceleration on a Check Point Security Gateway. _____________________ _____________________ 406 Check Point Security Engineering Identifying Status of Current Connections Use the fwaccel command to identify if acceleration is currently deployed for connections in your environment. Log into A-GW-01. 2. In Clish, type the following command and press Enter: 1. cpconfig 3. Verify that item number 9 shows the following: Disable Check Point SecureXL Exit cpconfig. 5. In Clish, type the following and press Enter: 4. fwaccel stat Figure 340 — fwaccel stat NOTE The fwaccel stat command shows you if acceleration is enabled or disabled. _____________________ _____________________ 407 Check Point Security Engineering 6. Verify that the Accelerator Status is displayed as On and that Accept Templates is Enabled. NOTE If acceleration is not enabled, execute the following command: fwaccel on 7. At the prompt, type the following and press Enter: fwaccel stats -s Figure 341 — fwaccel stats NOTE By adding the -s filter, the system displays a summary of connections accelerated versus those that are not. 8. From B-Host, use FTP to connect to A-DMZ (203.0.113.171). _____________________ _____________________ 408 Check Point Security Engineering 9. At the prompt, type the following and press Enter: fwaccel conns Figure 342 — fwaccel conns NOTE The fwaccel conns command identifies existing connections in SecureXL. By adding the -s filter, the system would display the number of connections handled by SecureXL. 10. Consider the following questions: ◦ What are the most frequent source and destination IP addresses? ◦ What flags to you see and what do they indicate? ◦ What does the C2S and S2C columns indicate? _____________________ _____________________ 409 Check Point Security Engineering 11. Press the Shift button and use the Page Up and Page Down buttons to navigate the data. Figure 343 — fwaccel conns 12. Consider the following questions: ◦ Can you identify the FTP connection from A-GUI to B-Client? ◦ Is the connection accelerated? _____________________ _____________________ 410 Check Point Security Engineering 13. Launch CPView to identify the numbers of current connections: Figure 344 — CPView 14. Exit CPView. 15. At the prompt, type the following and press Enter: fw tab -t cphwd_db -s Figure 345 — fw tab -t cphwd_db -s NOTE This command displays the kernel table for SecureXL. _____________________ _____________________ 411 Check Point Security Engineering 16. At the prompt, type the following and press Enter: fw tab -t connections -u -s 17. Consider the following questions: ◦ What information does the fw tab function provide? ◦ Can you identify the FTP connection from this information? ◦ Can you tell if it is accelerated? END OF LAB 4.1 _____________________ _____________________ 412 Check Point Security Engineering CoreXL: Multicore Acceleration As the first security technology to fully leverage general purpose multi-core processors, CoreXL introduces advanced, core-level load balancing that increases throughput for the deep inspection required to achieve intrusion prevention and high throughput. With CoreXL, high performance and high security can be achieved simultaneously. Like SecureXL, CoreXL is also included with the Gaia operating system and does not require additional licensing. Figure 346 — CoreXL Configuration for Machine with Eight CPU Cores Using CoreXL Multi-core CPU support enables Check Point Security Gateways to share traffic among cores of a single system, providing superior performance on a single server. The combination of multi-core CPUs and multi-threaded SecureXL security application technology is the foundation for the next generation of security acceleration: Application layer security. By joining a multi-core CPU with SecureXL security acceleration, Security Gateways can deliver more than 10 Gbps of Intrusion Prevention throughput. _____________________ _____________________ 413 Check Point Security Engineering Using CoreXL, the Firewall kernel is replicated multiple times. Each replicated copy, or instance, of the Firewall kernel runs on one processing core. The instances handle traffic concurrently, and each instance is a complete and independent inspection kernel. Regarding network topology, management configuration, and Security Policies, a CoreXL gateway functions as a regular Security Gateway. All of the kernel instances of a gateway handle traffic going through the same interfaces and apply the same Security Policy. Traffic entering Network Interface Cards (NIC) is directed to a processing CPU core running the Secure Network Distributor (SND), which will distribute non-accelerated packets among the Firewall kernel instances and securely accelerate packets authorized to be processed using SecureXL. CoreXL acts as a load balancer and improves Security Gateway performance in situations where much of the traffic cannot be accelerated by SecureXL or when the gateway has many IPS features enabled, which disables SecureXL functionality. It also improves performance for gateways with a large Rule Base and NAT rules. CoreXL does not benefit the gateway when the traffic consists mostly of VPN or VoIP traffic. CoreXL is not supported when one of the following features is enabled: • VPN Traditional mode • Overlapping NAT Configuring CoreXL CoreXL is enabled or disabled using cpconfig and requires a reboot to take effect. When enabled, enter the number of Firewall kernel instances for the gateway. The default number of kernel instances is derived from the total number of cores in the system, as described in the following table: Number of Cores Number of Kernel Instances 1 CoreXL is disabled 2 2 4 3 6 - 20 (Number of CPU cores) - 2 More than 20 (Number of CPU cores) - 4 No more than 40 total. Table 8: Kernel Instances Configuration _____________________ _____________________ 414 Check Point Security Engineering If using CoreXL with ClusterXL, the number of kernel instances must be identical on all members of the cluster. This is because State Synchronization between cluster members is performed per CoreXL Firewall kernel instance. For example, Instance #2 on cluster member A can only synchronize with Instance #2 on cluster member B. Figure 347 — CoreXL and ClusterXL Example P ro c e s s i n g C o r e A l l o c a t i o n The CoreXL software architecture includes the Secure Network Distributor. The SND is responsible for processing incoming traffic from the network interfaces, securely accelerating authorized packets (if SecureXL is running), and distributing non-accelerated packets among kernel instances. In other words, the SND is essentially a CPU core running both SecureXL and CoreXL. Traffic entering the NIC is directed to a processing core running the SND. The association of a particular interface with a processing core is called the interface's affinity with that core. Affinity is a general term used to describe binding NIC interrupts to processors. Affinity settings for all interfaces are set automatically by default when the CoreXL architecture includes processing incoming traffic from NICs. This affinity causes the interface's traffic to be directed to that core and the SND to run on that core. Setting a kernel instance or a process to run on a particular core is called the instance's, or process's, affinity with that core. Traffic from all NICs is directed to the core running the SND. _____________________ _____________________ 415 Check Point Security Engineering The default affinity setting for all interfaces is automatic. If SecureXL is running, the affinity for each interface is automatically reset every 60 seconds and balanced between available cores. If SecureXL is not running, the default affinities of all interfaces are with one available core. In both cases, any processing core running a kernel instance, or defined as the affinity for another process, is considered unavailable and will not be set as the affinity for any interface. In some cases, SND cores can be overloaded due to high traffic on multiple interfaces assigned to the same SND core. Manual sim affinity can alleviate this symptom. Use the sim affinity -l command to see affinity distribution. Each busy interface should be assigned its own Interrupt ReQuest (IRQ) value and distributed among SND cores. The assignment of interfaces to IRQs can be verified in the /proc/interrupts file. In some cases, it may be advisable to change the distribution of kernel instances, the SND, and other processes among the processing cores. This is done by changing the affinities of different NICs and/or processes. However, to ensure CoreXL’s efficiency, all interface traffic must be directed to cores not running kernel instances. Therefore, changing affinities of interfaces or other processes will require resetting the number of kernel instances and ensuring that the instances run on other processing cores. Under normal circumstances, it is not recommended for the SND and an instance to share a core. However, it is necessary for the SND and an instance to share a core when using a machine with exactly two cores. Adding Processing Cores to the Hardware Increasing the number of processing cores on the hardware platform does not automatically increase the number of kernel instances. If the number of kernel instances is not increased, CoreXL does not utilize some of the processing cores. After upgrading the hardware, increase the number of kernel instances using cpconfig. Reinstalling the Security Gateway will change the number of kernel instances if you have upgraded the hardware to an increased number of processing cores, or if the number of processing cores stays the same but the number of kernel instances was manually changed from the default. In a clustered deployment, changing the number of kernel instances, such as by reinstalling CoreXL, should be treated as a version upgrade. Follow the instructions in the Upgrade Guide and perform either a Minimal Effort Upgrade using network downtime or a Zero Downtime Upgrade, substituting the instance number change for the version upgrade in the procedure. A Full Connectivity Upgrade cannot be performed when changing the number of kernel instances in a clustered environment. _____________________ _____________________ 416 Check Point Security Engineering Allocating an Additional Core to the SND In some cases, the default configuration of instances and the SND will not be optimal. If the SND is slowing the traffic and your platform contains enough cores that you can afford to reduce the number of kernel instances, you may want to allocate an additional core to the SND. This is likely to occur, especially if much of the traffic is accelerated by SecureXL, in a ClusterXL Load Sharing deployment or if IPS features are disabled. In any of these cases, the task load of the SND may be disproportionate to that of the kernel instances. NOTE Check Point recommends that your platform have at least 8 CPU cores to allocate an additional core to the SND. Allocating a Core for Heavy Logging If the Security Gateway is performing heavy logging, it may be advisable to allocate a processing core to the fwd daemon, which performs the logging. Like adding a core for the SND, this too will reduce the number of cores available for kernel instances. Dynamic Dispatcher Dynamic Dispatcher is a CoreXL feature which helps to improve load distribution and mitigates connectivity issues during traffic peaks. Without Dynamic Dispatcher, new connections to a CoreXL Firewall instance are fixed or statically assigned, based on packet IP addresses and IP protocol type. This static assignment may result in situations where one or more instances would handle more connections or perform more processing on the packets forwarded to them than the others, which may cause the load to become unbalanced across the CPU cores. In addition, during peak times and policy installation, an overloaded core may cause traffic to be delayed or dropped. When Dynamic Dispatcher is enabled, connections to CoreXL instances are dynamically assigned, based on utilization of the CPU cores. Dynamic Dispatcher will distribute the load equally between the CPU cores. Connections opened at a higher rate that would have been assigned to the same instance by a static decision are now distributed to several instances. The Dynamic Dispatcher feature is enabled by default in R80.10. When enabled, the dynamic assignment decision is made for the first packets of connections by assigning a rank to each of the instances and selecting the instance with the lowest rank. The ranking of each instance is calculated according to the CPU utilization of the instance. If the CPU utilization of an instance is high, the ranking for that instance will be high as well. Higher ranked instances are less likely to be selected by the SND. _____________________ _____________________ 417 Check Point Security Engineering When to Enable Dynamic Dispatcher Dynamic Dispatcher is most beneficial in environments with a large number of CPU cores and when the CPU load is not properly balanced. Enable Dynamic Dispatcher if the following thresholds or situations occur: • A CoreXL instance consumes its CPU core at ≥ 85%, even for one second. • Other CoreXL instances consume their CPU cores at 75% and below. The difference in CPU consumption between overloaded and normally loaded instances is 10% or more. • Traffic is dropped or delayed due to an overloaded core during traffic peaks or during policy installation. When Dynamic Dispatcher is enabled, connections are always assigned dynamically, even in cases where there is no significant differences in CPU load, with the exception of VoIP and VPN encrypted packets. These two types of traffic will always be handled by the same Firewall instance. The distribution of connections across all CoreXL Firewall instances can be checked using the fw ctl multik stat command. Checking the connections will allow you to monitor the current connections and ultimately decide whether or not to enable the Dynamic Dispatcher feature. To fully enable Dynamic Dispatcher on a Security Gateway, run the following command in Expert mode and then reboot: fw ctl multik dynamic_dispatching on Firewall Priority Queues Firewall Priority Queues prioritize traffic when the CPU cores on the Firewall are 100% utilized and packets need to be dropped. This feature is disabled by default in R80.10. When enabled, the priority queues are only active when the CPU is overloaded. When the Firewall is fully utilized, packet loss can occur regardless of the connection’s type (for example, SSH and DHCP connections). _____________________ _____________________ 418 Check Point Security Engineering Priority Queues prioritize the packets based on the type of connection, and each connection of the same priority will get an equal share of the CPU resources. There are 8 priority queues by default, and up to 8 additional queues can be manually configured. When a new packet arrives, the connection is classified in order to know which queue it is assigned to. For example, packets of a SSH connection will go to the Control queue. Queue Priority (0 - highest) Queue Name Type of Connections Can Connections Migrate? 0 Routing DHCP, VRRP, OSPF, BGP, IGMP, PIM No 1 Control GUI/SSH/Ports 18xxx/ Management services Yes 2 Cluster Sync Local/Full sync No 3 High Priority User Defined Yes 4 Light Data Queue Light connections Yes 5 Default Data Queue Medium weight connection or new connection Yes 6 Log Notification Log and Drop notifications No 7 Heavy Data Queue Heavy connections Yes Table 9: Default Priority Queues Some connection types can be migrated between priority queues to be assigned a lower or higher priority with respect to other connections. For example, a new connection begins its life in the Default Data queue (Queue #5). If this connection gets lighter, it will migrate to a higher priority queue, such as the Light Data queue (Queue #4). If the connection becomes heavier, it can migrate to a lower priority queue, such as the Heavy Data queue (Queue #7). The Firewall will decide whether or not the connection should be migrated, based on the load time of an average connection of that type. It knows to how many possible queues the connection was assigned to and the CPU load caused by this connection. To enable Dynamic Dispatcher on a Security Gateway without the Firewall Priority Queues, run the following command in Expert mode and reboot: fw ctl multik prioq 2 _____________________ _____________________ 419 Check Point Security Engineering Pa c ket F l ow w i t h C o r e X L a n d S e c u r e X L E n a b l e d The following image depicts packet flow through the Security Gateway with CoreXL and SecureXL is enabled: Figure 348 — Packet Flow through Security Gateway Acceleration Path The packet is completely handled by the SecureXL device. It is processed and sent back to the network. Medium Path The packet is handled by the SecureXL device, except for IPS, Application Control, Antivirus, and Anti-Bot processing. The CoreXL layer passes the packet to one of the Firewall instances to perform processing. This path is only available when CoreXL is enabled. Firewall Path The SecureXL device is unable to process the packet. It is passed to the CoreXL layer and then to one of the instances for full processing on the slow path. _____________________ _____________________ 420 Check Point Security Engineering Multiple Traffic Queues As mentioned before, the SND is a processing core which accelerates traffic from network interfaces using SecureXL and distributes non-accelerated packets among instances using CoreXL. The number of CPUs allocated to the SND is limited by the number of network interfaces handling the traffic. By default, each NIC has one traffic queue that is handled by one CPU. Therefore, users cannot use more CPU cores for acceleration than the number of interfaces handling traffic. Multi-Queue is an acceleration feature that will allow you to configure more than one traffic queue for each NIC, to use more CPU cores for acceleration. U s i n g M ul t i - Q u e u e When most network traffic is being accelerated, the CPU load for SND can be very high, while the CPU load for CoreXL Firewall instances are very low. This results in an inefficient utilization of CPU capacity. Using Multi-Queue to configure more than one traffic queue for each supported network interface helps balance the load efficiently between SND CPUs and CoreXL instance CPUs. Check Point does not recommend assigning both a SND and a CoreXL instance to the same CPU core. Multi-Queue does not enhance Firewall performance in situations such as when all Firewall instances are highly loaded and most of the traffic is being processed in CoreXL’s slow or medium paths, or in cases where all CPU cores that are used by SecureXL are congested. In addition, Multi-Queue does not help when IPS, or other deep inspection Software Blades are heavily used. Configuring Multi-Queue Check Point recommends configuring Multi-Queue when the following conditions are presented: • The CPU load for SND is high (idle is < 20%). • The CPU load for CoreXL instances is low (idle is > 50%). • There are no CPU cores left to be assigned to the SND by changing interface affinity. NOTE The Interrupt ReQuest (IRQ) affinity of the queues is set automatically when the operating system boots. Manually changing the IRQ affinity of the queues can adversely affect performance. _____________________ _____________________ 421 Check Point Security Engineering Use the following guidelines to help determine if your network can benefit from configuring Multi-Queues: • Make sure that both SecureXL and CoreXL are enabled. • Make sure that the network interfaces support Multi-Queue. • Examine the CPU affinity to see how the CPU roles are allocated for interfaces (SND) and for CoreXL instances. To see the CPU roles allocation, run the following command: fw ctl affinity -l Figure 349 — fw ctl affinity -1 • Examine the CPU utilization for usage and idle percentages. On the Security Gateway run top and then press 1 to toggle to the SMP view. Figure 350 — CPU Utilization Example • Determine if more CPU cores can be allocated to the SND. If there are more network interfaces handling traffic than CPUs assigned to the SND, more CPUs can be allocated for SND. _____________________ _____________________ 422 Check Point Security Engineering Use the following command to configure Multi-Queue on supported interfaces: cpmq set The command will display all supported interfaces that are active and allow changes to be made to the Multi-Queue configuration for each interface. It is important to reboot the gateway after changing the Multi-Queue configuration. A maximum of five interfaces can be configured. The following command shows the Multi-Queue status of supported interfaces: cpmq get Lab 4.2 Working with CoreXL _____________________ _____________________ 423 L A B Working with CoreXL 4.2 Check Point CoreXL accelerates traffic through the Firewall by assigning each of the system’s cores to specific kernels. In this lab, you will learn how to enable and configure CoreXL. Ta sks : • Enable CoreXL. • Configure CoreXL. Pe r for ma n c e Ob j ec t ive s: • Demonstrate how multiple system cores can be used by CoreXL to accelerate traffic. • Identify how to review the status of CoreXL on a Security Gateway. _____________________ _____________________ 424 Check Point Security Engineering Enabling CoreXL Configure CoreXL so that the system can accelerate traffic though the firewall by assigning specific kernels to each of the system’s cores. 1. From A-GW-01, type the following and press Enter: cphaprob stat Figure 351 — cphaprob stat NOTE One of the cluster members should show a status of “Active” and the other should show “Standby.” _____________________ _____________________ 425 Check Point Security Engineering 2. Check the status of CoreXL. Type the following and press Enter: fw ctl multik stat Figure 352 — fw ctl multik stat 3. From Expert Mode, shutdown the A-GW-01 Virtual Machine: shutdown -P now Figure 353 — shutdown -P now _____________________ _____________________ 426 Check Point Security Engineering 4. Modify the A-GW-01 virtual machine so that it is configured with at least four cores. Figure 354 — Virtual Machine Settings - Processors NOTE The labs environment shown in this document is based on VWware Workstation. Your classroom environment may be different. If it is, ask your instructor for assistance. _____________________ _____________________ 427 Check Point Security Engineering Reboot the modified cluster member. 6. At the prompt, type the following and press Enter: 5. top 7. Press 1 to see the CPU distribution. Figure 355 — top Identify the number of cores listed at the top of the screen. 9. Press q to exit the file. 8. _____________________ _____________________ 428 Check Point Security Engineering 10. At the prompt, type the following and press Enter: cpview Figure 356 — cpview 11. Compare the number of cores listed on the CPView Overview page to the number displayed in top. 12. Click q, to exit CPView. _____________________ _____________________ 429 Check Point Security Engineering 13. On A-GW-01, type the following and press Enter: cpconfig Figure 357 — cpconfig NOTE If the Check Point CoreXL option does not appear in the list of Configuration Options, your virtual machine is not configured with multiple cores. 14. Enable Check Point CoreXL, if it is not already enabled. _____________________ _____________________ 430 Check Point Security Engineering 15. At the prompt, type the following and press Enter: fw ctl affinity -l Figure 358 — fw ctl affinity -l NOTE Though there are four cores configured for this machine, only three are kernel instances. This chart explains the core to kernel instance ratio: Number of Cores Number of Kernel Instances 1 1 2 2 4 3 6-20 Number of cores -2 More than 20 Number of cores -4 but no more than 40 _____________________ _____________________ 431 Check Point Security Engineering 16. At the prompt, type the following and press Enter: fw ctl affinity -l -a -v Figure 359 — fw ctl affinity -l -a -v _____________________ _____________________ 432 Check Point Security Engineering Reviewing CoreXL Settings Review the CoreXL settings in your environment. 1. At the prompt, type the following and press Enter: top 1 Type q to quit. 3. In Expert mode, type the following and press Enter: 2. ps -ef | grep fw_worker Figure 360 — ps -ef | grep fw_worker _____________________ _____________________ 433 Check Point Security Engineering 4. At the prompt, type the following: cat /proc/interrupts Figure 361 — cat /proc/interrupts END OF LAB 4.2 _____________________ _____________________ 434 Check Point Security Engineering Review Questions 1. Describe the three paths of traffic flow for SecureXL. 2. How does CoreXL improve network performance? 3. When should you consider using Multi-Queue? _____________________ _____________________ 435 C H A P T E R Check Point Security Engineering SmartEvent 5 Check Point’s SmartEvent Software Blade turns log entries into meaningful security information. It correlates log events, aggregates data, and identifies potential attack patterns from various devices. It prioritizes security events among a multitude of logging activities in the network, making it easy for Cyber Security Administrators to remediate and prevent critical events. With its customizable graphical reports and intuitive GUI, administrators can readily monitor patterns and events as they unfold and provide reporting to key stakeholders in the organization. Learning Objectives • Identify SmartEvent components used to store network activity logs and identify events. • Discuss the SmartEvent process that determines which network activities may lead to critical security issues. • Understand how SmartEvent can assist in detecting, remediating, and preventing security threats targeting organizations. _____________________ _____________________ 436 Check Point Security Engineering The SmartEvent Solution Check Point SmartEvent Software Blade is a unified security event management and analysis solution that delivers graphical threat management information. It allows Security Administrators to view real-time network activities in customized views or reports. Customized views allow you to monitor activities relevant to protecting your organization. Personalized reports enable you to report on security activities to key stakeholders in your organization. SmartEvent provides both a high level view and detailed forensic analysis of incidents to aid in monitoring, fixing, and remediating security incidents. It also helps you efficiently run data analysis and identify critical security events from the vast number of logs in the network. With SmartEvent, you can collect, process, and search from billions of log entries in seconds. Logs and Events A log is a record of an action performed by a Software Blade. Log entries show the traffic patterns that are relevant to the overall security of the organization. An event is a record of a security or network incident that is based on one or more logs and on a customizable set of rules that are defined in the Event policy. The Event policy is a set of rules that define the behavior of SmartEvent. A log entry (or multiple log entries) becomes an event when it matches any rules defined in the Event policy. An example of a single log entry becoming an event is a High Severity Anti-Bot event, because of the rules defined in the Event policy. Multiple log entries can also become an event, such as in the case of a Certificate Sharing event, wherein two logins were found with the same certificate but different users. SmartEvent automatically defines logs that are not Firewall, VPN, or HTTPS Inspection logs, as events. These events are created by the Correlation Unit when there is a suspicious pattern of two or more logs. Correlated events are defined in the Policy tab of the SmartEvent GUI. Since most logs are Firewall, VPN, and HTTPS logs, SmartEvent will not automatically define them as events. This is to avoid performance issues with the SmartEvent Server. However, enabling consolidated events for Firewall saves disk space and makes it possible to keep a longer event history. To create events for Firewall, navigate to the SmartEvent Policy tab and enable Consolidated Sessions > Firewall Session. _____________________ _____________________ 437 Check Point Security Engineering S m a r t E ven t C o m p o n e n t s SmartEvent utilizes several key components to aggregate logs, identify critical security events, and provide efficient event query. The three main components are the Log Server, the Correlation Unit, and the SmartEvent Server. Log Server The Log Server is responsible for storing logs collected from Check Point Security Gateways and Third-Party devices. The Correlation Unit connects to the Log Server to read the logs using the LEA (Log Export API) protocol. The Log Server uses port 18184 for this connection by default. NOTE When configuring the Log Server to use a different LEA port, you must manually configure the new port on the SmartEvent Server and on the Correlation Unit. Correlation Unit The Correlation Unit evaluates logs from the Log Server to identify events. Each log consists of data from Check Point products and third-party devices. It looks for threat patterns in this data that match the installed Event policy. When analyzing a log, the Correlation Unit performs one of the following actions: • Marks logs that individually are not events, but may be part of a larger pattern to be identified later • Generates an event based on the Event policy • Takes a new log entry that is part of a group of items that together make up an event, and adds it to an ongoing event • Discards logs that do not meet event criteria Once a threat pattern is detected, the Correlation Unit forwards the event to the SmartEvent Server. SmartEvent Correlation Units can analyze logs for more than one Log Server. Check Point recommends installing a Correlation Unit on each Log Server if your organization produces high volume log activity. With a small network, it is best practice to store a Correlation Unit on the SmartEvent Server. _____________________ _____________________ 438 Check Point Security Engineering SmartEvent Server The SmartEvent server houses the Events database. It receives all logs identified as events by the Correlation Unit. The SmartEvent server performs another analysis to determine the severity of the event and what action to take. The event is then stored in the Events Database. This database runs on Apache Solr, an open source search platform written in Java. The main advantage of Solr is that it manages the logs with their indexes, which in turn allows for a more efficient way to generate search results. S m a r t E ven t C l i e n t s SmartEvent clients manage the SmartEvent server and provide an overview of security information for an organization’s environment. They consolidate billions of logs and display them as prioritized security events. Administrators can use the information displayed to monitor network activity, identify and investigate critical events, and immediately respond to security incidents to prevent further attacks. SmartEvent clients are: • SmartConsole — installed as an external application • SmartEvent GUI — requires client installation • SmartView Web application — does not require client installation. It has the same realtime event monitoring and analysis views as SmartConsole. To log in to SmartEvent using SmartView Web application, browse to https://<Security Management Server IP Address>/smartview/ or https://<Security Management Server host name>/smartview/ NOTE The SmartView Web application URL is case sensitive. The “/” at the end is required. SmartEvent must be enabled to view Smartview. _____________________ _____________________ 439 Check Point Security Engineering S m a r t E ven t Wo rk fl ow The workflow below provides a high-level view on how the different SmartEvent components interact: Figure 362 — SmartEvent Workflow 1. 2. 3. Check Point products and other supported third-party devices forward logs to the Log Server for storage. The Correlation Unit reads all logs from the Log Server and makes the correlation analysis based on the SmartEvent policy. The Events policy resides on the Correlation Unit. Once the Correlation Unit identifies a threat pattern, it identifies the associated log entries as an event and sends it to the SmartEvent Server. The SmartEvent server assigns a severity level to the event, invokes any defined automatic reactions, and adds the event to the Events Database that resides on the server. The severity levels and automatic reactions are defined in the Events Policy. An automatic reaction is the defined immediate course of action to a detected event. For example, an automatic email notice is sent to System Administrators once an event has occurred. This will be discussed further in the Remediating Security Event section of this chapter. The SmartEvent client displays the received events. It presents all of the information needed for real-time monitoring of security events, event investigations, and remediation. Administrators can also utilize the SmartEvent client to generate reports, fine-tune and install the Events Policy. _____________________ _____________________ 440 Check Point Security Engineering S m a r t E ven t D e p l oym e n t SmartEvent components can be installed on a single machine (a standalone deployment), or spread out over multiple machines and sites (a distributed deployment). Implementing a distributed deployment is highly recommended if your organization anticipates a high volume of logging activity. Enable SmartEvent on the Security Management Server or deploy it on a dedicated server. You can also install more than one SmartEvent Correlation Unit. Each SmartEvent Correlation Unit can analyze logs from multiple Log Servers or Domain Log servers. Dedicated SmartEvent appliances from Check Point are also available as an option when deploying SmartEvent in your organization. A valid license or contract is required to deploy SmartEvent. Before installation, make sure to perform the following actions: • Use a dedicated server for SmartEvent that is connected to a management server. • Do a clean installation. • Uninstall the old SmartEvent client installed on computers, before installing the new client. • Connect to a management server (Security Management Server or Multi-Domain Server), version R77.xx or higher. NOTE Check Point recommends configuring Disk Space Management parameters to delete old log entries when available disk space is 45% or less. This configuration only applies to the raw log files and has no effect on the events database since it uses an internal disk space management policy. _____________________ _____________________ 441 Check Point Security Engineering D e fi n i n g t h e I n te r n a l N et wo r k To help SmartEvent determine whether events originated internally or externally, the internal network must be defined in the initial settings. There are four options to calculate the traffic direction: • • • • Incoming — All the sources are outside the network and all destinations are inside. Outgoing — All sources are inside the network and all destinations are outside. Internal — Sources and destinations are all inside the network. Other — A mixture of and internal and external values makes the result indeterminate. NOTE It is recommended to add all internal network objects, not host objects. Adding Network and Host Objects Certain objects from the Management server are added during the initial sync with the SmartEvent server and updated at a set interval. However, it may be necessary or useful to add other network or host objects to the internal network, such as: • If there are devices or networks not represented on the management server that are important for defining the internal network • When adding sources or destinations to exclusions or exceptions in event definitions • When selecting sources or destinations in a filter _____________________ _____________________ 442 Check Point Security Engineering Identifying an Event One of SmartEvent’s key features is its ability to identify a potential security incident or event from the multitude of logs that can be generated in an organization. As previously mentioned, events are detected by the Correlation Unit. SmartEvent is constantly retrieving logs from Log servers and searching for patterns. The Correlation Unit scans logs for criteria that match an event definition. SmartEvent uses the following procedures to identify events: • • • • Matching a log against global exclusions Matching a log against each event definition Creating an event candidate Updating an event Matching a Log Against Global Exclusions When the Correlation Unit reads a log, it first checks whether the log matches any defined Global Exclusions. When Global Exclusions are defined, they direct SmartEvent to ignore logs that are not expected to contribute to an event. If a log matches a Global Exclusion, it is discarded by the system. If it does not match, the Correlation Unit begins matching the log against each event definition. Matching a Log Against Each Event Definition Each event definition contains a filter which is comprised of multiple criteria that must be found in any matching log. In turn, the criteria are divided by product. This means an event definition may include a number of different products, but each product has its own criteria (set of values). Figure 363 — Event Definition A _____________________ _____________________ 443 Check Point Security Engineering For example, for a log from URL Filtering to match Event Definition A, it must match the Action, Event Type, Port, and Protocol values listed in the URL Filtering category. A log from a Security Gateway must match the values listed in its respective column. SmartEvent divides this process into two steps: 1. 2. The Correlation Unit first checks whether or not the product value in the log matches one of the acceptable product values of an Event Definition. For example, in the figure below, if Log 1 did not contain an acceptable product value, the Correlation Unit would then compare the log against the next Event Definition, and so on. If the log does not match any Event Definition, it is discarded. Next, the Correlation Unit checks whether the log matches the product-specific criteria in an event definition. For instance, URL Filtering generates logs that involve the Firewall, spyware, malicious code protection, and others, which is populated in the Event Type field. If an event matches URL Filtering logs involving the Firewall, then the URL Filtering log involving spyware will fail against the Event Definition. Other criteria may be specific to the Product as well, such as action, port, and protocol. Figure 364 — Event Definition Matching Log _____________________ _____________________ 444 Check Point Security Engineering Returning to the example, the Correlation Unit now examines whether the log contains the necessary criteria for a URL Filtering log to match. If the criteria did not match, the Correlation Unit would continue comparing the log criteria to other Event Definitions. Figure 365 — Event Definition Matching Other Product Criteria Creating an Event Candidate Once a log matches the criteria, it is added to an Event Candidate. Event Candidates allow SmartEvent to track logs until an event threshold is crossed, at which point an event is generated. An event threshold allows System Administrators to set the limits for logs to become an event. The limits typically are the number of connections, logs, or failures, and the period of time in which they occurred. An example of an event threshold would be: Detect the event when more than “x” (number value) connections/logs/failures were detected over a period of “y” (time value) seconds. _____________________ _____________________ 445 Check Point Security Engineering Note: • The Event Candidate can track logs from multiple Check Point and non-Check Point products. • Logs must originate from the same source IP address. • The Event Candidate tracks logs before all of the criteria have been matched. Figure 366 — Sample Event Candidate Each event definition may have multiple Event Candidates existing simultaneously to keep track of logs grouped by similar properties, such as by host, service, destination, or any combination of these or others. In our example, the logs that form Event Candidate 10.1.1.5 all have a common source value and were dropped, blocked, or rejected by a Firewall. They are grouped together because the event definition is designed to detect activity originating from source address 10.1.1.5. _____________________ _____________________ 446 Check Point Security Engineering Whenever a log matches the event definition but has properties different than those of the existing event candidates, a new Event Candidate is created and added to an Event Candidate Pool. SmartEvent creates a new Event Candidate for a log with a different source. Figure 367 — Sample Event Candidate Pool The Event Candidate pool is a dynamic environment, with new logs being added and older logs being discarded when they have exceeded an event definition threshold. To illustrate further, consider the event defined to detect a high rate of blocked connections. SmartEvent tracks the number of blocked connections for each Firewall and the logs of the blocked traffic at each Firewall form an Event Candidate. When the threshold of blocked connection logs from any Firewall is surpassed, that Event Candidate becomes an event. _____________________ _____________________ 447 Check Point Security Engineering While this event definition creates one Event Candidate for each Firewall monitored, other event definitions may create many more. Figure 368 — Sample Event Candidate Pool with Multiple Candidates Updating an Event Discovering an event does not mean SmartEvent stops tracking logs related to the event. When a candidate becomes an event, the Correlation Unit forwards the event to the Event Database. The Correlation Unit will keep adding matching logs to the event as long as they continue to arrive, even if an event threshold has been reached. Keeping the event open condenses what might otherwise appear as many instances of the same event to one, and provides accurate, upto-date information as to the start and end time of the event. _____________________ _____________________ 448 Check Point Security Engineering Monitoring the Network Administrators can use SmartConsole and SmartView Monitor to monitor network activity and identify, analyze, and manage security events. Using SmartConsole Logs & Monitor SmartConsole includes a catalog of views and reports in the Logs & Monitor section of the GUI. Views and reports are customizable, allowing you to display and report the events and data that are most important to your network. For example, it may be important to monitor network traffic based on geography. With a few clicks, you can easily move from a high-level view to a detailed forensic analysis of network activity. The free-text search option lets you quickly run data analysis and identify critical security events. Figure 369 — SmartConsole > Logs & Monitor _____________________ _____________________ 449 Check Point Security Engineering Using SmartView Monitor Use SmartView Monitor to respond quickly to changes in gateways, tunnels, remote users and traffic flow patterns and security activities. For example, remote employees of an organization report trouble connecting to the network. Using the SmartView Monitor Counter view, the administrator can assess that there are more failures to connect than successes. A report can be created to determine what is preventing the employees from connecting to the network. SmartView Monitor provides real-time and historical graphical views of: • • • • • • Gateway status Remote users System counters VPN tunnels Cooperative enforcement (for Endpoint Security Servers) Traffic Figure 370 — Sample System Counter View _____________________ _____________________ 450 Check Point Security Engineering E ve n t Q u e r i e s A view is an interactive dashboard made up of widgets. A widget can display information in different formats such as a chart, or a table. Each widget is the output of a query. To review more about an event, double-click the widget to drill down to a more specific view or the raw log files. Figure 371 — Sample View Queries are used to define the events to see. These queries filter and organize the event data for display. SmartConsole provides a predefined set of queries which are organized by combinations of event properties. For example, a set of Threat Prevention queries will include Threat Prevention events as well as IPS events. Event queries can be customized to display specific related events and treads as defined by the organization. Customized event queries can be created from scratch or based on an existing query. Events are easily monitored using custom and predefined queries. To help identify suspicious patterns, use the following features to search and filter events: • • • • Filters Free-text search using Boolean operators, wildcards, fields, and ranges Suggested and recent searches Time Period _____________________ _____________________ 451 Check Point Security Engineering Investigating Security Events To further investigate an event, double-click the event to open the Log Details window. The Log Details window will provide important information regarding the event. Figure 372 — Log Details Window Packet Capture When activated, packet capture files are sent from the Security Gateway to the log server, along with the log. Packet capture contents provide more insight into the traffic which generated the log. If any logs have related packet captures, open a packet viewer to see the contents of the captured packet. Packet capture is activated by default. To see a packet capture, navigate to the Logs & Monitor view and open the log. Click the link in the packet capture field and the Packet Capture Viewer Output window will open. The packet capture may be saved to a file for further investigation. _____________________ _____________________ 452 Check Point Security Engineering Custom Commands SmartEvent provides a convenient way to run common command line executables that can assist in investigating events. Right-clicking the IP address, source or destination, in an event provides a list of default and customized commands. They appear only on cells that refer to IP addresses, because the IP address of the active cell is used as the destination of the command when run. The default commands are ping, whois, nslookup, and Telnet. Figure 373 — Ping Output Importing Offline Log Files System Administrators can import and examine logs from a previously generated log file. This makes it possible to review security threats and pattern anomalies that occurred before SmartEvent was installed. It enables the investigation of threats, such as unauthorized scans targeting vulnerable hosts, unauthorized legions, denial of service attacks, network anomalies, and other host-based activity. The administrator can review logs from a specific time period and focus on deploying resources on threats that have been active for a period of time but may have been missed. For example, new events may have been dynamically updated and can now be processed over the previous period. _____________________ _____________________ 453 Check Point Security Engineering Remediating Security Events Once a security event is identified, investigated, and found to be a threat, remediate the issue by: • Configuring Event policy • Configuring IPS policy C o n fi g u r i n g E ve n t Pol i c y Use the Policy tab of the SmartEvent GUI client to configure and customize the events that define the Event policy. All events detectable by SmartEvent are organized by category under the Event Policy branch. Each event is enabled or disabled using the accompanying checkbox. Clearing the checkbox next to an event removes this event type from the Event policy the next time the Event policy is installed. Figure 374 — SmartEvent > Event Policy Depending on the thresholds defined in each Event, the number of events detected can be quite high. Yet, only a portion of those events may be meaningful. _____________________ _____________________ 454 Check Point Security Engineering Selecting an event displays its configurable properties in the Detail pane and a description of the event in the Description pane. To remediate a security event, it may be necessary to adjust or configure: • • • • • Threshold Severity Automatic reactions Exceptions Working hours Not all of these elements appear for every event. After installing and running SmartEvent for a short time, you will discover which of these elements needs to be fine-tuned per event. Threshold The Threshold setting sets the limits that, when exceeded, indicate an event has occurred. The limits typically consist of the number of connections, logs, or failures, and the period of time in which they occurred. Severity An event severity determines in which queries, among those that filter for severity, this type of event will appear. The levels of severity are: • • • • • Informational Low Medium High Critical _____________________ _____________________ 455 Check Point Security Engineering Automatic Reactions To jump start remediation, an event upon detection can trigger an automatic reaction. Multiple automatic reactions may be configured, depending on the needs of the system. For example, a single mail automatic reaction can be defined to inform the administrator of any event, or multiple mail automatic reactions can be configured to inform a different responsible party for each type of event. Automatic reactions may be created under General Settings. There are five types of automatic reactions: • Mail — Alert a System Administrator by email that the event has occurred. • Block Source — Instruct the Security Gateway to block the source IP address(es) from which this event was detected for a configurable period of time. • Block Event Activity — Instruct the Security Gateway to block a distributed attack that originates from multiple sources, or attacks multiple destinations for a configurable period of time. • External Script — Run a provided script. • SNMP Trap — Generate an SNMP Trap. Exceptions Exceptions allow an event to be independently configured for the sources or destinations that appear. For example, if the event Port Scan from Internal Network is set to detect an event when 30 connections have occurred within 60 seconds, define that two port scans detected from host A within 10 seconds of each other is also an event. Working Hours Working hours are used to detect unauthorized attempts to access protected systems and other forbidden operations after-hours. To set the Regular Working Hours for an event, select a Time object from the drop-down menu. Time objects are configured under General Settings. _____________________ _____________________ 456 Check Point Security Engineering C o n fi g u r i n g I P S Pol i c y IPS protections and profiles should be reviewed to understand why an event was generated. Administrators may also review the events to investigate how traffic is handled by IPS. Any event generated by the IPS Software Blade is easily investigated and remediated through the Event Details window. From the Event Details window, you can: • Go to the Check Point Advisory article which provides background information about the IPS protection. • Review a detailed IPS protection description. • Fine-tune the IPS protection. • Add an exception to the IPS protection. _____________________ _____________________ 457 Check Point Security Engineering Reporting Security Events Reports make it easy to quickly generate, review, and share security data using graphs and data tables. They provide more detailed information than a view. Predefined and customized reports can be generated to provide security information on a schedule (daily, weekly, or monthly), or as needed. For example, an executive may request a monthly security brief on the most recent security trends to evaluate company policy and procedure, such as allowing employees to access particular sites and applications during work hours. Figure 375 — Sample Report _____________________ _____________________ 458 Check Point Security Engineering U s i n g P r e d e fi n e d Rep o r ts Use predefined graphical report templates for the most frequently seen security issues. To open the catalog of predefined and customized reports, click the [+] tab. Double-click a report to open it. SmartEvent automatically downloads new predefined reports, and updates existing reports. Figure 376 — List of Reports Importing and Exporting Reports The Export to PDF and Export to Excel options allow you to save the current report as a PDF or Excel file, based on the defined filters and time period. Report layout and widget definition templates can also be exported. Similarly, the Import Template option allows you to import these template files from another server, or from another administrator. Adding a Logo to Reports By default, the Check Point logo shows on the cover pages of the report. System Administrators can configure reports to show their company logo instead. Save the image file of the logo as a PNG file with the name cover-company-logo.png then copy the image to the $RTDIR/smartview/conf directory on the SmartEvent server. _____________________ _____________________ 459 Check Point Security Engineering D e fi n i n g C u s to m Rep o r t s Because each company is different, SmartEvent helps System Administrators to create custommade reports that fit their respective organization. To customize a report, select a predefined or custom report, then click Edit to define the new report. Defining the Report Outline and Filters The workspace shows Views on the left when you edit a report. A view is an interactive dashboard made up of widgets. It is also a section of the report shown in one page or multiple pages, if it includes a table. The Views pane has management controls that help you add, remove, change the sequence of views, and even add filters for the data included in the report. Changes to views is only applied to the custom report that you are working on. Defining Views When you click a particular View thumbnail, it shows the widgets included in that view. A widget is a representation of the collected data. Each widget is contained in a panel with management options that allow you to add, remove, move, or resize a widget. Note that moving or resizing the widget out of the page borders is not possible. For table layouts that expand to multiple pages, select Show all table rows from the Split table across multiple pages window on the View Settings option. NOTE The desired graphical view of your organization’s security posture can be quickly customized by adding a widget to a view. Before adding a widget, make sure that the view has enough space; otherwise an error message will appear. Filtering Reports by User Groups System Administrators may need to generate several reports for different key stakeholders. A report meant for a C-level executive may contain information not relevant to a department head. Reports, views and widgets can be filtered for one or more Active Directory user groups. Prior to enabling this feature, an Access Role object that includes the AD groups to use in the query for the report must be defined. To filter reports for specific user groups, look at the Identity Awareness login logs, and copy the names of the relevant groups. Add a filter for the User Group field and enter the name of the group to be included in the filter. For multiple groups, use a comma-separated list. _____________________ _____________________ 460 Check Point Security Engineering Preventative Measures After remediating security events, preventative measures can be put in place to ensure the event is addressed as soon as possible and prevented from repeat occurrence. C r e a t i n g a N ew E ve n t D e fin i t i o n Once a new threat is discovered and remediated, take preventative action by creating a new event definition. The next time this threat pattern is detected, it will create an event in the Events database, allowing it to be addressed and remediated more quickly. The Event Definition Wizard makes it easy to configure a new event definition from scratch or based on an existing event. Figure 377 — Event Definition Wizard When creating a new definition, the Event Definition Wizard allows you to choose if an event will be generated when an event definition is matched by a single log or multiple logs. It also gives you options to choose which of the product(s) can trigger an event. All user defined event definitions are automatically saved in the User Defined Events folder in the Selector Tree. _____________________ _____________________ 461 Check Point Security Engineering Rep o r t i n g a n E ve n t to C h e c k Po i n t Reporting event data to Check Point can help Check Point improve the IPS technology to detect new threats. Only the event information will be sent to Check Point over a secure SSL connection. The data is kept confidential and Check Point only uses the information to improve IPS. Figure 378 — Report Event to Check Point E l i m i n a t i n g Fa l s e Po s i t i ve s To eliminate false positives, it is important to understand how a false positive might be generated. Certain types of services are characterized by a high amount of traffic that could be misidentified as events. The following are examples of services and protocols that could potentially generate events. • Software that performs a routine scan of the network to make sure that everything is running properly. • A high connection rate on a web server. SmartEvent should be set to allow a higher connection rate per minute on a busy web server, or to exclude this source from a scan event. Refer to the Check Point Logging and Monitoring Administration Guide for a list of server types where high activity is common. Modify the Event policy by adjusting event thresholds and adding Exclusions for servers and services, to further reduce the amount of false positives detected. To eliminate false positives, change the thresholds and other criteria of an event. For example, increase the number of connections, logs, or failures and/or the period of time for them to occur. _____________________ _____________________ 462 Check Point Security Engineering SmartEvent Example While monitoring the network, you notice the network is flooded with connections. This merits an investigation. Using the filters, queries, and search bar features, you browse the event database and determine that the gateway is stable. However, it is the interface that has received lots of connections. To start the investigation process, navigate to the Policy tab and activate all port scan events in the Event policy to generate logs. After installing Event policy and additional traffic flowing into the interface, many port scan events are created. Upon reviewing the details of multiple events, it is evident that there is only one source and one destination. This is unusual as legitimate port scans will have multiple source or destination IP addresses. One source and one destination IP address indicates that this may be a targeted attack. After investigating the source IP addresses and narrowing down the type of device they are originating from, the conclusion is that the traffic is not legitimate. To begin remediation, in SmartConsole, create a new rule that blocks traffic from the illegitimate sources. If the traffic was legitimate, navigate to the Policy tab to configure the settings for the Port scan from external network event. Add the IP address as an exception to prevent port scans from this IP address from generating an event. Another option is to edit threshold settings to increase the number of connections, or expand the time period in which the connections occur. The next step is prevention. Navigate to the Port scan from external network event. Create an automatic reaction that will email the entire IT team when at least 20 connections are detected within sixty seconds (one minute). By doing this, the next time there is a flood of traffic on an interface, the entire IT team is notified and can quickly address and remediate the event. With SmartEvent, it was easy to quickly search and filter through events to discover the problem, enable the appropriate event policy, review specific threat information, and institute preventative measures. By creating automated alerts and rules, you will ensure that the network is able to perform without being bogged down by unnecessary traffic. _____________________ _____________________ 463 Check Point Security Engineering High Availability Environment The SmartEvent database maintains a synchronized copy of management objects locally on the SmartEvent server. This process, also known as dbsync, allows SmartEvent to work independently from different management versions and different management servers in a High Availability environment. Management High Availability exists for Security Management Servers and in a MultiDomain Security Management environment. The dbsync process supports High Availability for the Multi-Domain servers and the Domain servers. The dbsync process initially connects to the management server with which SIC is established. It retrieves all the objects and, after the initial synchronization, it gets updates whenever an object is saved. At this point, dbsync registers all the High Availability management machines and periodically tests the connectivity with the current management server. If connectivity is lost, it attempts to connect to the other High Availability management servers until it finds an active one and connects to it. If two management servers are active concurrently, dbsync will remain connected to one and it will not receive any changes made on the other management server until a synchronization operation is performed. Log Server High Availability In SmartConsole, it is possible to configure a Security Gateway such that when it fails to send its logs to one Log server, it will send its logs to a secondary Log server. To support this configuration, it is possible to add both Log servers to a single Correlation Unit. In this way, the Correlation Unit will get an uninterrupted stream of logs from both servers and will continue to correlate all Firewall logs. SmartEvent Correlation Unit High Availability Multiple Correlation Units can read logs from the same Log servers, providing redundancy if one of them fails. The events detected by the Correlation Units will be duplicated in the SmartEvent database. These events can be ascertained by filtering with the Detected By field in the Event Query definition. The Detected By field specifies which Correlation Unit detected the event. The SmartEvent server becomes unavailable, the Correlation Units retain the events until they can reconnect with the SmartEvent server and forward the events. _____________________ _____________________ 464 Check Point Security Engineering Security CheckUp With Check Point Security Checkup tools, administrators can generate a comprehensive security analysis report that summarizes security events, their risks, and remediation. These reports are mainly used for Proof of Concept (PoC) purposes. The Security CheckUp Advanced and Anonymizer Reports are threat analysis reports that generate charts and organize security data to display key findings on malware, attacks, data loss, and high risk web access. SmartEvent must be activated before running the Security CheckUp reports and the tool is installed as a supplement. The difference between SmartEvent reports and the Security CheckUp reports is that the Anonymizer report does not use IP addresses or usernames. Each report can be localized into any language and customized to display information from a specific time period or filter preferences. Like other reports, Security CheckUp reports can be generated on a schedule or as-needed basis and saved as a PDF or Excel file for the purpose of information sharing and security event investigation. Figure 379 — Security CheckUp Report L a b 5 .1 Evaluating Threats with SmartEvent _____________________ _____________________ 465 L A B Evaluating Threats with SmartEvent 5.1 Set up SmartEvent to generate alerts and reports. These applications are valuable for use in executive level meetings, as well as for record keeping and compliance auditing. Ta sks : • Configure the SmartEvent Suite. • Generate Reports based on available data. Pe r for ma n c e Ob j ec t ive s: • Configure a SmartEvent Server to monitor relevant patterns and events. • Demonstrate how to configure event Alerts in SmartEvent. • Demonstrate how to run specific SmartEvent reports. _____________________ _____________________ 466 Check Point Security Engineering Configure the Network Object in SmartConsole Active the SmartEvent for the A-SMS and A-GW-Cluster objects. 1. In the SmartConsole on A-GUI, open the following object: A-SMS 2. Use the following information to configure the object: Name: A-SMS IP Address: 10.1.1.101 Management Blade SmartEvent Server Selections: Smart Correlation Unit 3. If the system displays an information message, click OK to dismiss it. _____________________ _____________________ 467 Check Point Security Engineering 4. Verify that the object is configured as follows: Figure 380 — A-SMS Configured 5. Click OK. _____________________ _____________________ 468 Check Point Security Engineering 6. Edit the Alpha gateway cluster object, and select the Monitoring option in the Network Security tab: Figure 381 — Gateway Cluster Properties Configured _____________________ _____________________ 469 Check Point Security Engineering 7. Select the Monitoring Software Blade branch, and select the following options: Traffic Connections Traffic Throughput (Bytes per second) Figure 382 — Monitoring Software Blade Page 8. Select the Logs branch. _____________________ _____________________ 470 Check Point Security Engineering 9. Under the section Send logs and alerts to these log servers, Verify that A-SMS is listed: Figure 383 — Log Servers branch 10. Click OK. 11. Publish and install the Alpha Security Policy. _____________________ _____________________ 471 Check Point Security Engineering 12. In SmartConsole, select the Logs and Monitor tab: Figure 384 — Select Server _____________________ _____________________ 472 Check Point Security Engineering 13. Click the + tab, and the system displays a new default tab: Figure 385 — New Tab _____________________ _____________________ 473 Check Point Security Engineering 14. In the left pane, click the following link and the system displays SmartEvent: SmartEvent Settings & Policy Figure 386 — SmartEvent NOTE It may take a little longer for SmartEvent to start up and display information the first time it is launched. 15. In the navigation pane, select General Settings > Objects > Network Objects. _____________________ _____________________ 474 Check Point Security Engineering 16. Verify that the Alpha-Nets object appears in the General Settings > Objects > Network Objects page: Figure 387 — Network Objects _____________________ _____________________ 475 Check Point Security Engineering Monitoring Events with SmartEvent In this section, you’ll define a new event that will be triggered later in the lab. 1. Expand the Unauthorized Entry branch, and select the Check Point administrator credential guessing: Figure 388 — Policy Tab > Unauthorized Entry > Check Point Administrator 2. Change the Failure Detection setting from the default of 3 failures every 600 seconds to 2 failures every 300 seconds. _____________________ _____________________ 476 Check Point Security Engineering 3. From the Actions menu, select Install Event Policy, and the system displays the following message: Figure 389 — SmartEvent Dialog 4. 5. 6. 7. 8. Click Yes. After the policy is installed, minimize SmartEvent. Publish and install the Alpha Security Policy. Then, log out of SmartConsole. Attempt to log in to SmartConsole, using the wrong password at least five times. Launch SmartConsole using the correct login. _____________________ _____________________ 477 Check Point Security Engineering 9. Select the Logs & Monitor view, and create a new tab: Figure 390 — Logs & Monitor - New Tab _____________________ _____________________ 478 Check Point Security Engineering 10. Click the Open Audit Log View button, and the system displays the following: Figure 391 — Audit Log View _____________________ _____________________ 479 Check Point Security Engineering 11. View the record for the blocked login attempts: Figure 392 — Log Details 12. Close the record details. _____________________ _____________________ 480 Check Point Security Engineering 13. Open a new tab in Logs and Monitor. 14. Select Reports. 15. In the reports list, click the star icon for the following items: Correlated Events Network Activity Network Security Figure 393 — Reports _____________________ _____________________ 481 Check Point Security Engineering 16. Open a new tab, and confirm the availability of new reports: Figure 394 — New Tab Configured _____________________ _____________________ 482 Check Point Security Engineering 17. Click the Correlated Events report icon: Figure 395 — Correlated Events _____________________ _____________________ 483 Check Point Security Engineering 18. View the incident report on page two of the report showing the following Event: Check Point Administrator Credential Guessing Figure 396 — Check Point Administrator Credential Guessing - Event Reported END OF LAB 5.1 _____________________ _____________________ 484 Check Point Security Engineering Review Questions 1. What are the main components of the SmartEvent Architecture? 2. Explain how SmartEvent identifies an event. 3. How would a System Administrator reduce the number of false positives? _____________________ _____________________ 485 Check Point Security Engineering Remote and Mobile Access C H A P T E R 6 In today’s business environment, employees need to connect to company applications and data from off-site locations. Remotely connecting to corporate resources has security issues that System Administrators need to address. This chapter discusses Check Point Remote and Mobile Access solutions that protect an organization’s confidential communications and data in the age of workforce mobility. Learning Objectives • Recognize Check Point Remote Access solutions and how they differ. • Discuss Check Point Capsule components and how they work to protect mobile devices and business documents. • Discuss the Mobile Access Software Blade and how it secures communication and data exchange during remote connections. • Understand Mobile Access deployment options. _____________________ _____________________ 486 Check Point Security Engineering Choosing Remote Access Solutions All Check Point Remote Access solutions provide secure connectivity to corporate resources. Strong user authentication methods and granular access control reinforce network security. Check Point Remote Access solutions use IPSec and Secure Socket Layer (SSL) encryption protocols to create secure connections. All Check Point clients can work through NAT devices, hotspots, and proxies in situations with complex topologies, such as airports or hotels. There are a few factors to consider when choosing remote access solutions for your organization: • Client-Based or Clientless: Does the solution require a Check Point client to be installed on the endpoint computer or is it clientless, for which only a web browser is required? Multiple solutions may be required within your organization to meet different needs. • Secure Connectivity or Endpoint Security: Does the solution just require secure connectivity, whereas traffic is encrypted between the client and the VPN gateway, or endpoint security that provides protection even when there is no connectivity to the network? • SSL VPN versus IPSec VPN: Does your organization need a full VPN tunnel to protect the access from any installed application to the business or does it need a simpler business portal for secure access? I n s t a l l a t i o n Typ e s There are three types of installations for remote access solutions: • Client-based — In this solution, the client application is installed on endpoint computers and devices. Clients are usually installed on a managed device, such as a company-owned computer or device. The client supplies access to most types of corporate resources according to the access privileges of the user. • Clientless — In this solution, users connect through a web browser and use HTTPS connections instead of connecting through a managed device. Clientless solutions usually supply access to web-based corporate resources. • On Demand Client — This remote access solution blends the first two options. A user connects with a web browser and installs a client when necessary. The client supplies access privileges to most types of corporate resources according to the access privileges of the user. _____________________ _____________________ 487 Check Point Security Engineering Secure Connectivity and Endpoint Security Secure connectivity can be combined with additional features to protect the network or endpoint computers. With secure connectivity, traffic is encrypted between the client and VPN gateway and strong user authentication is supported. After users authenticate, they can access the corporate resources that are permitted to them in the access policy. All Check Point remote access solutions supply secure connectivity and require licenses. Security verification for endpoint computers makes sure that devices connecting to the gateway meet security requirements. Endpoint machines that are not compliant with the Security Policy have limited or no connectivity to corporate resources. Some Check Point solutions supply this. In terms of Endpoint Security, endpoint computers are protected at all times, even when there is no connectivity to the corporate network. An integrated desktop Firewall protects endpoint computers at all times with a centrally-managed Security Policy. This is important because remote clients are not in the protected network and traffic to clients is only inspected if a desktop Firewall is present. Some Check Point solutions supply this. These solutions require licenses based on the number of clients installed. NOTE Check Point solutions can include more Endpoint Security capabilities, such as Anti-Malware and disk encryption. _____________________ _____________________ 488 Check Point Security Engineering S S L V P N ve r s u s I P S e c ( L aye r 3 ) V P N Check Point solutions provide enterprise-grade access via both Layer 3 (IPSec) and SSL VPN. There is a fundamental difference in how an SSL VPN Portal and a Layer 3 VPN tunnel connect to the corporate network. In a Layer 3 VPN solution, a resident VPN client is needed, which creates the Layer 3 virtual interface that any application can use. SSL VPN solutions only require a browser on the client side and allow mobile devices with a dedicated application to access corporate resources without establishing a VPN tunnel. Figure 397 — Layer 3 VPN versus SSL VPN In an SSL VPN solution, users can connect securely to business web-based applications through a web portal. This solution does not require users to install a VPN client. SSL VPN is the recommended solution for unmanaged and personal devices used for business purposes. Layer 3 VPN solutions require remote workers to install a VPN client before gaining access to corporate resources. Once a user installs the client, the Layer 3 VPN tunnel provides a secured connection to both web-based and native business applications. This is recommended for corporations with employees using managed or unmanaged devices. Both solutions can be configured to enforce two-factor authentication. _____________________ _____________________ 489 Check Point Security Engineering Clients All Check Point Remote Access options provide secure remote access to corporate resources. Each has different features and meets different organizational requirements. M o b i l e Ac c e s s Po r ta l The Mobile Access Portal, a clientless SSL VPN solution, is recommended for users who want to access corporate resources from any unmanaged computer or device. This solution does not require users to install a VPN agent or client. The Mobile Access Portal provides secure connectivity and security verification. It requires a Mobile Access Software Blade license on the Security Gateway. Remote users log in to the portal using an authentication scheme configured for that Security Gateway. The Mobile Access policy applies to the Mobile Access Portal. The portal can also be used with managed devices. The Mobile Access Portal supplies access to web-based corporate resources. The on-demand client, SSL Network Extender, can be used to access all types of corporate resources. NOTE Each Security Gateway enabled with Mobile Access leads to its own Mobile Access User Portal. Set up the URL in the Mobile Access First Time Wizard. For portal customization, System Administrators can go to Portal Customization under Mobile Access in the SmartConsole. S S L N e t wo rk E x te n d e r SSL Network Extender (SNX) is a thin SSL VPN on-demand client that is automatically installed on the remote user's machine through a web browser. This VPN client is installed as a browser plug-in. Once installed, it enables a secured connection using the SSL VPN tunnel to link users to the corporate resources. SSL Network Extender requires Mobile Access and IPSec VPN Software Blade licenses on the Security Gateway. SSL Network Extender has two modes: • Network — Users can access all native IP-based and web-based applications in the internal network. For users to gain access to these applications, System Administrators must first define these as native applications in Mobile Access. The user can access the resources by launching the client either from the desktop or the Mobile Access portal. To work in Network mode, users must have installation privileges. • Application — Users can access most native IP-based and web-based application types in the internal network, including most TCP applications. Users can only launch the client in the Mobile Access portal. Once installed, users can access internal resources defined as native applications in Mobile Access. Working in Application mode does not require installation privileges. _____________________ _____________________ 490 Check Point Security Engineering C h e c k Poi n t M o b i l e Check Point Mobile offers an remote access option for several different platforms. • Check Point Mobile for Windows — An IPSec VPN client solution for medium to large enterprises that do not require an Endpoint Security Policy. It provides both secure connectivity and security verification. This option requires both IPSec VPN and Mobile Access Software Blade licenses. • Check Point Mobile for iPhone and iPad — An SSL VPN client which supplies secure connectivity and access to web-based corporate resources and Exchange ActiveSync. This option is best used for mobile workers who have iOS mobile devices. A Mobile Access Software Blade license is required for this option. • Check Point Mobile for Android — An SSL VPN client for Android device users. It supplies secure connectivity and access to web-based corporate resources and Exchange ActiveSync. A Mobile Access Software Blade license is required for this option. C h e c k Poi n t C a p s u l e Wor k s p a c e Capsule Workspace is an SSL VPN client for mobile devices that provides remote users seamless access to a separate, secure business environment. A Check Point Capsule license is required on the Security Gateway. This solution is further discussed in the Check Point Capsule Solution section. S e c u Rem ote SecuRemote is a limited-function IPsec VPN client that only provides secure connectivity. SecuRemote is a free client and only requires an IPSec VPN Software Blade license on the Security Gateway. Ad d i t i o n a l Rem ote Ac c e s s O p t i o n s Check Point offers additional Remote Access options, including options specifically for Endpoint Security. For more detail information regarding Remote Access solutions and options, refer to sk67820. _____________________ _____________________ 491 Check Point Security Engineering Check Point Capsule Check Point Capsule addresses mobile access needs by securely protecting devices from threats and protecting business documents wherever they go, all while providing a secure business environment for mobile devices. Mobile Threat Prevention is further discussed in the Threat Prevention chapter. Check Point Capsule secures remote communication and data exchange using three components: Capsule Workspace, Capsule Docs and Capsule Cloud. C a p s u l e Wo rk s p a c e Using Capsule Workspace, mobile users are provided a secure login with easy access to business applications, exchange applications, and documents. This solution allows employees working remotely to securely connect to the network and easily use and store business data and documents within the application’s security container. Users have access to corporate email, files, directories, corporate contacts, and calendars. Capsule Workspace allows company employees to use their personal devices for work-related tasks yet place only business data under control of the corporate IT team. With Capsule Docs integration and an application-level passcode, business data is protected everywhere. Capsule Workspace also features offline data encryption, policy and remote wipe, and sharing control. With Capsule Workspace, organizations can enhance the productivity of employees while securing the use of personal devices and protecting business data. Key benefits include: • One application is used to access business information, providing segregation between personal and professional on the device. • Provides a great end-user experience with push notifications, document editor, HTML5, and more. • Provides an end-to-end solution with no compromise on security, from Microsoft Exchange to the mobile device. _____________________ _____________________ 492 Check Point Security Engineering Capsule Workspace also has a remote data wiping feature, to delete the stored offline data after each session. This may be useful when a user certification has been revoked, when a device is lost, or an employee leaves the company. Figure 398 — Capsule Workspace _____________________ _____________________ 493 Check Point Security Engineering Capsule Connect Capsule Connect complements Capsule Workspace to provide access to native applications. Key features include: • • • • • Full Layer 3 VPN client Works in the background On Demand (iOS) / Always On (Android) Supports all VPN authentication methods Infrastructure for Capsule Cloud Typical user scenarios include: • Corporate applications using native applications • Non HTML5 Remote Desktop Solutions • Corporate mail using Native Clients _____________________ _____________________ 494 Check Point Security Engineering How Capsule Connect and Capsule Workspace Differ Capsule Connect and Capsule Workspace both offer secured connection for remote users who are using their mobile devices. However, there are differences between the two. Connect Workspace VPN type IPSec VPN (Layer 3) SSL VPN Applications Any application • Secure browser, including remote terminal viewing • ActiveSync provisioning • Exchange applications and push notifications • Document viewing and editing • Roadmap: Chat, SharePoint • Roadmap: Third-party applications Operating system iOS, Android, WP8 iOS, Android Business data isolation None • • • • • Credential protection • One-Time Password (OTP) login support • No SSO support • OTP login support • SSO for Workspace apps Compliance/ host checking MDM cooperative enforcement • Jailbreak/root detection • MDM cooperative enforcement Application-level passcode In-app encryption Remote wipe Offline data policy Document sharing control (allow/block/ encrypt on-the-fly) Table 10: Comparison of Capsule Connect and Capsule Workspace _____________________ _____________________ 495 Check Point Security Engineering Capsule Docs The rise of user collaboration and file sharing platforms may lead to security issues, such as information theft and data leakage. Capsule Docs avoids these issues by securing the actual document with the following capabilities: • Classify — Define a set of permissions, which may include markings such as headers, footers, and watermarks. • Share — Decide with whom to share the document. • Encrypt — Apply encryption (AES256 + RSA2048) to the document so that it is protected and accessed only by the authorized users and groups. Figure 399 — Capsule Docs Document Classification Once files are protected, users can store the document anywhere and share them on different platforms. Capsule Docs secures the document contents regardless of where it is kept or with whom it is shared. In the event an attacker obtains the document, the content of the document is encrypted and not accessible to unauthorized users. Capsule Docs does not require users to have an additional password because it uses Active Directory credentials for authentication. Users and System Administrators can share a document with an external user by adding the recipient’s email address to the list of authorized users. On the first attempt to access the document, the external user will be asked to install either a viewer or editor client and register in the system. This registration is fast and required only once. Capsule Docs also logs any action performed by end users, such as when they add a new user to the authorized list or when they remove the document’s protection. This can be helpful for you when auditing and monitoring proprietary documents. _____________________ _____________________ 496 Check Point Security Engineering Content Encryption Document content is encrypted with a symmetric key. AES 256 is used for an On-Premise deployment, and AES 128 is used for a Cloud deployment. The Content Encryption Key is generated by the client and encrypted with asymmetric keys generated by the management server. The Content Encryption Key can be accessed with one of the following: • The Master Key (RSA 2048) • The Classification Key (RSA 2048) and the User / Group Key (RSA 2048) Cloud Deployment Capsule Docs in the Cloud is the best option for organizations that prefer not to deploy an additional server. In this setup, the Cloud stores community encryption keys, users, policy settings, and audit logs. LDAP is used to manage users in a Cloud deployment. User registration is done through the Capsule Web Portal and authentication is done against LDAP. Figure 400 — Cloud Deployment _____________________ _____________________ 497 Check Point Security Engineering Capsule Cloud Capsule Cloud utilizes Check Point Software Blade solutions as a cloud-based service. Capsule Cloud enforces the organization’s in-network Security Policy to both on- and offpremise devices. It helps the enterprise to protect employees using laptops and mobile device when they are outside the secured office environment. This is the best option for organizations with multiple satellite offices and remote branches. For smaller companies and individual users, the Capsule Connect client can be installed on their devices to connect to Capsule Cloud for security. To protect communication between locations, any network traffic coming from and going to remote devices are directed to the Capsule Cloud through a secure tunnel. Capsule Cloud then inspects the traffic based on the Security Policies implemented by the corporate office. Capsule Cloud employs Check Point Security solutions, such as Anti-Bot, Antivirus, Application Control, IPS, and URL Filter. Connecting a gateway to Capsule Cloud is more efficient compared to installing the policies locally, as this set up requires lower machine resources. Security Gateways with limited capabilities can also access and employ more software blades in Check Point Capsule Cloud. Cloud Portal Administrators can manage and apply policies for both on-premise or off-premise devices using SmartConsole or the Capsule Cloud web user interface. Cloud Portal is the Capsule Cloud WebUI. Use Cloud Portal to: • • • • • • • Set up policies for URL Filtering, Threat Prevention, and HTTPS Inspection View user traffic and audit logs Manage users and offices Download Capsule Cloud applications and utilities Change client and device settings Access Capsule Cloud utilities Determine location of roaming clients (via the Location Awareness feature) Network administrators with access to the Cloud Portal can have either Administrator or Help Desk access privileges. Administrators with Administrator privileges can view all tabs and perform all operations in the Cloud Portal, while those with Help Desk rights are only allowed to manage users and devices. Offices are corporate gateways that connect to Capsule Cloud through a VPN. The gateway forwards traffic to Capsule Cloud where traffic is inspected based on the Security Policies enforced. _____________________ _____________________ 498 Check Point Security Engineering To connect a device to Capsule Cloud, you must create a VPN Site-to-Site community between the two. The New Office Wizard will help you to set up this community in the Cloud Portal and the local gateway management. The Location Awareness feature gives administrators the option to limit access to Capsule Cloud to external users. In this option, users with IP addresses or domains and ports within the internal network will not be allowed to connect to Capsule Cloud. Figure 401 — Capsule Cloud - Location Awareness _____________________ _____________________ 499 Check Point Security Engineering Mobile Access Software Blade Today’s business environment may require employees, contractors, and other knowledge workers to access corporate resources from remote locations. Without the proper security measures, you risk credential loss, unauthorized access, data loss and leakage, malware breakin and propagation, and more. The Check Point Mobile Access Software Blade is a comprehensive remote access solution that allows mobile and remote workers to easily and securely connect to the corporate network from any location, with any supported device, while protecting the network, remote users and mobile devices, from threats. This Software Blade integrates into an existing Check Point gateway, enabling a more secure and operationally efficient remote access for your users. The data transmitted by remote access is decrypted, filtered, and inspected in real-time by Check Point’s gateway security services. It applies Secure Socket Layer (SSL) and IPSec (also known as Layer 3) VPN protocols to remote connections to ensure that the communication and data are encrypted. The Mobile Access Software Blade also provides user authentication and the ability to check the security posture of the remote device. This further strengthens the security for remote access. The Mobile Access solution also guarantees authenticity by using standard authentication methods such as Certificates, RADIUS, SecurID, and Dynamic ID to transfer information and data. M o b i l e Ac c e s s W i z a r d When enabling the Mobile Access Software Blade on a gateway, the Mobile Access Wizard will guide you through the different configuration settings. It also quickly allows authorized remote users to access internal web or mail applications through a web browser, mobile device, or remote access client. The Mobile Access Wizard helps to configure such settings as the mobile access methods, the primary URL for the Mobile Access Portal, and the applications that will be available to web or mobile device users. NOTE Once Mobile Access is enabled, it uses HTTPS 443. This is the same SSL port as the Gaia Web portal. To prevent conflict, change the Gaia Web portal port to a different port, for example TCP port 4434, and add an access rule to the Firewall policy to allow the new port. _____________________ _____________________ 500 Check Point Security Engineering Mobile Access Methods The Mobile Access Methods section of the wizard allows you to select from where users can access the Mobile Access applications: • Web — Through a browser on any computer. SSL Network Extender can be downloaded by users when necessary to access native applications. • Mobile Devices — Through an iOS or Android Mobile device. Devices must have a Check Point application installed. ◦ Capsule Workspace — Through a secure container on the mobile device to give users access to internal websites, file shares, and Exchange servers. ◦ Capsule Connect/VPN — Through a full Layer 3 tunnel application that gives users network access to all mobile applications. • Desktops/Laptops — Check Point clients for PCs and Macs that use a Layer 3 tunnel to provide access to internal network resources. Web Portal The primary URL for the Mobile Access Portal will need to be specified. The default is https:/ /<IP address of the gateway>/sslvpn. It is possible to use the same IP address for all portals on the gateway with a variation in the path. A PFX (.p12) file can be imported to obtain a trusted certificate. A PFX file is the combined format that holds the private key and certificate. All portals on the same IP address will use the same certificate. _____________________ _____________________ 501 Check Point Security Engineering Applications Mobile Access provides the remote user with access to various corporate applications. The wizard allows you to select the applications that will be available to web or mobile device users: • Web Applications — Select the web applications that users can access. The applications will show on the Mobile Access portal. Web application options include: ◦ Demo Web Application (World Clock) — While testing Mobile Access, select this option to have a web application show as it will when in production. ◦ Custom Web Application — Specify a custom URL as the landing page for users when they connect with Mobile Access. For example, the URL can be the home page of your company’s intranet site. ◦ Mail/Calendar/Contacts — Specify the details of your Exchange Server and existing mail/calendar/contacts applications that your mobile users can access. Options include Capsule Workspace Mail, ActiveSync applications and Outlook Web applications. • File Shares — Create and configure file sharing applications using Windows Common Internet File System (CIFS) protocol. • Citrix Services — Select to include native applications supported by Citrix Services. Mobile Access supports Citrix client connectivity to internal XenApp servers. • Native Apps — Native applications are IP-based applications that are hosted on servers within the organization. Select to specify the path to an existing executable, such as MS Remote Desktop, Telnet, and FTP. Active Directory Integration If choosing to use Active Directory (AD) when you enable the Mobile Access Software Blade, select the AD domain, enter your credentials, and test connectivity. Otherwise, select I don't want to use active directory now. _____________________ _____________________ 502 Check Point Security Engineering M o b i l e Ac c e s s Wo rk fl ow Mobile Access allows users to securely connect to company applications and data. Below is an example of a high-level workflow to configure access to internal applications. 1. 2. 3. 4. 5. 6. Enable the Mobile Access Software Blade on the Security Gateway using SmartConsole. Follow the steps in the Mobile Access Wizard to configure settings. Add Firewall rules to allow mobile device connections. Create and distribute certificates for mobile user authentication using the Certificate Creation and Distribution Wizard. You can skip this step if you are not using certificates as an authentication method. End user downloads an endpoint solution, such as the Capsule Workspace application. User opens the application (in this example, Capsule Workspace) and enters the Mobile Access site name and the required user authentication. Figure 402 — Sample Mobile Access Workflow _____________________ _____________________ 503 Check Point Security Engineering User Authentication The following authentication methods are used for Mobile Access: • • • • • Certificate (Internal or External Certificate Authority) RADIUS server SecurID Username and password (internal, LDAP) Dynamic ID One-Time Password (OTP) Figure 403 — Authentication Factor Window NOTE A certificate can only be used as a first time authentication method. Dynamic ID cannot be used as a first authentication method. _____________________ _____________________ 504 Check Point Security Engineering Authentication can be configured for pre-R80 Security Gateways in one of two places: • In the Gateway Properties window of a gateway in Mobile Access > Authentication: Select the method that all users must use to authenticate to Mobile Access. The default authentication method is Username and Password. Settings for Two-Factor Authentication with a DynamicID OTP can be configured here as well. • In the Gateway Properties window of a gateway in Legacy Authentication: The default authentication method is Certificates from the ICA. With R80.10 and higher Security Gateways, administrators can configure multiple login options. The log in options can be different for each gateway and each Software Blade with a supported client. For more information regarding which Mobile Access clients support multiple log in options, refer to sk111583. _____________________ _____________________ 505 Check Point Security Engineering G a teway S ec u ri t y Fea t u r e s Once activated on the Security Gateway, the Mobile Access Software Blade offers a secured connection by providing security measures on both the server and client side. Server Side Mobile Access uses IPS Web Intelligence to protect the network from web-related threats and attacks, including malicious codes hiding in web-based applications and suspicious SQL injection. It also scans files, such as documents and executables, using the Antivirus Software Blade. With Mobile Access enabled, administrators select the web-based and native applications that can be accessed by remote users and define the actions that users can perform within the applications. Mobile Access encrypts all traffic using HTTPS for web-based applications and 3DES or RC4 algorithm for native applications. For end users to access the native applications, they need to install the SSL Network Extender. Client Side On the client side of the connection, Mobile Access can scan endpoint devices to verify their security compliance and make sure that their protections are up-to-date. Mobile Access can be configured to refuse a connection if the device is found to be non-compliant. Mobile Access will only allow connections to devices that were able to authenticate, using one of the supported authentication methods, including Dynamic ID, which is Check Point’s twofactor authentication method for machines. In addition, security can be enhanced by preventing browsers from caching certain content, such as a PDF, that attackers may steal. Organizations can also require remote users to utilize Capsule Workspace, Check Point’s proprietary virtual desktop. This virtual workspace provides a secured environment, in which files are encrypted and gives users the option to wipe all the data after each session. _____________________ _____________________ 506 Check Point Security Engineering Mobile Access Deployment Mobile Access can be deployed in several ways, depending on which is appropriate for the organization’s needs: • Simple Deployment • Cluster Deployment Simple Deployment This deployment is the easiest to configure. In this deployment, a single Security Gateway enabled with the Mobile Access Software Blade inspects all network traffic, including those coming from endpoint devices. Your existing gateway acts as your Mobile Access gateway. Figure 404 — Simple Deployment Cluster Deployment A Cluster deployment works best for organizations with a large number of concurrent remote access users. Each cluster can be deployed in either of the deployments mentioned above. In this deployment, however, it is recommended that each cluster member has three interfaces: one interface leading to the organization, a second leading to the Internet, and a third for synchronization. Each interface is on a different subnet. _____________________ _____________________ 507 Check Point Security Engineering Mobile Access Policy Check Point Mobile Access extends the functionality of a Firewall for remote users. The Mobile Access Policy defines how remote users can securely access internal company applications and resources using mobile devices. Mobile Access Policy rules are defined and unified in the Access Control Policy. This includes all rules related to the Mobile Access Portal, Capsule Workspace, and on-demand clients. In the Access Control Rule Base, rules can be configured to apply to all Mobile Access gateways, or just selected gateways. Rules can also be configured to apply to one or more clients, such as the Mobile Access Portal or Capsule Workspace. M o b i l e Ac c e s s R u l e B a s e Mobile Access rules for R80.10 and above Security Gateways can be configured as a part of the unified Access Control Policy in SmartConsole or in the legacy shared Mobile Access policy in SmartDashboard. Rules for pre-R80 gateways can only be configured via SmartDashboard. Mobile Access rules for both policy options must include users and user groups, the applications to be accessed, and the gateways that the rule applies to. Figure 405 — Mobile Access Configuration _____________________ _____________________ 508 Check Point Security Engineering All Mobile Access gateways in an environment must use the same source for the Mobile Access policy. You cannot configure the environment to have some gateways that use the unified Access Policy and some that use the legacy policy option. NOTE When using the Unified Access Policy, some Mobile Access features and settings are still configured in SmartDashboard. To configure an R80.10 gateway to use the unified Access Control Policy: 1. 2. 3. 4. In SmartConsole, navigate to the Gateways & Servers tab, and open a Mobile Access gateway object. Select Mobile Access. In the Policy Source section, select Unified Access Policy. Install policy. Mobile Access in the Access Control Policy To configure mobile access authorization in the Access Control policy, the Mobile Access Software Blade must be enabled. The Mobile Access blade only understands rules with a Mobile Access Blade application defined, and with or without an access role defined in the Source column. Security Gateways with Mobile Access enabled, are automatically added to the Remote Access VPN Community. To configure rules for the Mobile Access portal or client, include the community or a Remote Access community that includes the Mobile Access gateway in the VPN column. By default, the Remote Access VPN community contains a user group that contains all users. To use a Mobile Access application in the Access Control policy, it must be defined as a Mobile Application in SmartConsole or SmartDashboard. Other application objects, such as Content Awareness and URL Filtering objects, cannot be used in rules with Mobile Access. For example, a URL Filtering Facebook application cannot be used for Mobile Access. A new Facebook web application must be created and authorized as a web application for Mobile Access. Mobile application objects can be created in the Services & Applications column of a rule. To give access to resources through specified remote access clients, create access roles for the clients and include them in the Source column of a rule. If an access role is defined in the Source column of a rule, the Identity Awareness Software Blade must be enabled on all installation targets that the rule applies to. Access roles for remote access will apply to Mobile Access and IPSec VPN clients. When an access role for a client is in the Source column of a rule, the rule will apply to traffic that originates from that client. _____________________ _____________________ 509 Check Point Security Engineering Mobile Access Policy Layers and Inline Layers Mobile Access rules can be included in policy layers and inline layers. Mobile Access must be enabled for each layer that contains rules with Mobile Access applications. In a policy with Ordered policy layers, the order of rules in the Rule Base is important because the first rule that matches the traffic is enforced. Matching is continued in each subsequent layer until the Mobile Access traffic is matched with a Drop rule or accepted in all layers. In this case, the matched application for Mobile Access is taken from the last rule matched with a Mobile Access application. A Mobile Access inline layer can be configured in any Ordered layer. A bypass rule to accept Mobile Access traffic must be created in all layers that are placed above the Mobile Access layer. The bypass rule will match the Mobile Access traffic in the layer and allow the traffic to move to the next layer until it reaches the Mobile Access Inline layer. Use the access role for all Mobile Access users in the Source column and Accept in the Action column to create the bypass rule. As an inline or sub-policy layer, Mobile Access is matched on the parent rule and then on the inline layer rule. The matched application for Mobile Access is taken from the last rule matched with a Mobile Access application. If the matched rule in the inline layer does not contain a Mobile Access application, the policy will look for a Mobile Access application in the inline layer’s parent rule. Best Practices It is best practice to place Mobile Access rules that authorize applications above rules that contain a related service. For example, a rule that allows access to a Mobile Access web application, such as Outlook Web Access (OWA) on HTTPS, should be placed above a rule that allows or blocks HTTPS. If the HTTPS rule is first, the web application will match that rule and the policy will not reach the rule that contains the Mobile Access application. Check Point recommends creating an inline layer for Mobile Access rules. To use the inline layer effectively, define a parent rule in the main policy layer. The parent rule will match all Mobile Access traffic and send the traffic to the inline layer. An access role that includes all Mobile Access users in the Source column is required. _____________________ _____________________ 510 Check Point Security Engineering When creating rules, do not use a Security Gateway as the destination. Use Any or the internal hosts of relevant applications in the Destination column. This is because Mobile Access applications are defined in the Services & Applications column. In turn, do not use Any in the Services & Applications column. To make an application show in the Mobile Access Portal or Capsule Workspace, it must be a Mobile Access application object that is used explicitly in the Rule Base. L a b 6 .1 Managing Mobile Access _____________________ _____________________ 511 Managing Mobile Access L A B 6.1 Define access rights and functions that can be securely operated by remote users within the Check Point Capsule application. Ta sks : • Enable Mobile Access Blade. • Configure the Check Point Capsule Policy. • Test Check Point Capsule. Pe r for ma n c e Ob j ec t ive s: • Demonstrate how to enable Mobile Access for remote users. • Configure LDAP integration for remote user authentication of Mobile applications. _____________________ _____________________ 512 Check Point Security Engineering Enable Mobile Access Blade Enable the Mobile Access blade and configure the Security Gateway cluster to allow encrypted remote Check Point Capsule traffic. 1. Edit the Alpha cluster object (A-GW-Cluster): Figure 406 — Gateway Cluster Properties - General Properties _____________________ _____________________ 513 Check Point Security Engineering 2. In the Network Security tab, select the Mobile Access option. The system displays the Mobile Access Configuration wizard: Figure 407 — Mobile Access Configuration 3. Verify that the following categories and sub-categories are all checked: ◦ Web ◦ Mobile Devices ◦ Desktops/Laptops 4. Click Next. _____________________ _____________________ 514 Check Point Security Engineering 5. In the Portal URL section, set the Main URL to: https://203.0.113.1/sslvpn Figure 408 — Web Portal 6. Click Next. _____________________ _____________________ 515 Check Point Security Engineering 7. In the Mail/Calendar/Contacts section of the Applications page, clear the following option: Mobile Mail (including push mail notifications) Figure 409 — Applications 8. Click Next, and the system displays the Active Directory Integration page. _____________________ _____________________ 516 Check Point Security Engineering 9. Use the following information to create a new domain: Domain Name: alpha.cp Username: Administrator Password: Chkp!234 Domain Controller: 192.168.11.101 Figure 410 — Active Directory Integration 10. Click Connect, and the system uses the predefined credentials to connect to the alpha.cp AD. NOTE The connection to the AD server may take a few minutes. _____________________ _____________________ 517 Check Point Security Engineering 11. Click Next, and the system displays the following: Figure 411 — Users 12. Click Add. _____________________ _____________________ 518 Check Point Security Engineering 13. Search for and select the Even group: Figure 412 — Users _____________________ _____________________ 519 Check Point Security Engineering 14. Click Next, and the system displays the summary page: Figure 413 — Mobile Access Configuration Summary 15. Click Finish, to exit the wizard and return to the General Properties page of the cluster object. 16. Click OK, and the system displays the following warning: Figure 414 — Check Point SmartConsole 17. Click No. _____________________ _____________________ 520 Check Point Security Engineering 18. In the navigation pane of the cluster object, select Platform Portal. 19. In the Platform Portal page, modify the Main URL to: https://203.0.113.1:4434 Figure 415 — Platform Portal 20. Click OK. _____________________ _____________________ 521 Check Point Security Engineering Configure the Check Point Capsule Policy Define the available applications and access rights of remote Capsule users connecting to your network. In SmartConsole, navigate to the Security Policies tab. 2. In the Shared Policies section, select Mobile Access: 1. Figure 416 — Shared Policies - Mobile Access 3. Click the following link: Open Mobile Access Policy in SmartDashboard _____________________ _____________________ 522 Check Point Security Engineering 4. The system displays the SmartDashboard Mobile Access Overview page: Figure 417 — Mobile Access Overview _____________________ _____________________ 523 Check Point Security Engineering 5. In the Policy page, use the following information to create a Mobile Access rule: Users: Even Application: World_Clock Install On: A-GW-Cluster Figure 418 — Mobile Access - Policy _____________________ _____________________ 524 Check Point Security Engineering 6. In the navigation pane, expand Applications, and select Web Applications: Figure 419 — Mobile Access - Web Applications _____________________ _____________________ 525 Check Point Security Engineering 7. In the Web Applications page, click the New button. The system displays the following: Figure 420 — Web Application - General Properties _____________________ _____________________ 526 Check Point Security Engineering 8. Name the new web application TestApp: Figure 421 — Web Application _____________________ _____________________ 527 Check Point Security Engineering In the navigation pane, select Authorized Locations. 10. In the Servers section of the page, select A-DMZ from the Host or DNS name drop-down list: 9. Figure 422 — Web Application - Authorized Locations _____________________ _____________________ 528 Check Point Security Engineering 11. In the navigation pane, select Link in Portal. 12. In the Link in Portal page, Use the following information to populate the General tab: Add Link: Selected Link Text: TestApp URL: http://192.168.12.101 Figure 423 — Web Applications - Link in Portal _____________________ _____________________ 529 Check Point Security Engineering 13. In the navigation pane, select Additional Settings > Periodic Test. 14. In the Periodic Test page, select the option to run the test every 30 minutes: Figure 424 — Web Application - Periodic Test _____________________ _____________________ 530 Check Point Security Engineering 15. Click OK, and the system adds the newly configured application to the Web Applications list: Figure 425 — Mobile Access - Web Applications _____________________ _____________________ 531 Check Point Security Engineering 16. In the navigation pane, select Applications > File Shares: Figure 426 — Mobile Access - Applications - File Shares _____________________ _____________________ 532 Check Point Security Engineering 17. In the Files Shares page, click New. 18. Name the new application FileShare: Figure 427 — File Share Application - General Properties _____________________ _____________________ 533 Check Point Security Engineering 19. In the navigation pane, select Authorized Locations. 20. In the Servers section of the page, select A-DMZ from the Host or DNS name drop-down list: Figure 428 — File Share Application - Authorized Locations _____________________ _____________________ 534 Check Point Security Engineering 21. In the navigation pane, select Link in Portal. 22. Use the following information to configure the link: Add Link: Selected Link Text: Alpha File Share Path: \\192.168.12.101\Share Figure 429 — File Share Application - Link in Portal NOTE Your instructor may provide a different path, based on your classroom configuration. Verify that the shared drive on A-GUI allows everyone full access. _____________________ _____________________ 535 Check Point Security Engineering 23. Click OK, and the system adds the new application to the list of File Shares: Figure 430 — Mobile Access - File Shares _____________________ _____________________ 536 Check Point Security Engineering 24. In the navigation pane, select Policy. 25. Add the following applications to Rule 1: TestApp FileShare Figure 431 — Mobile Access - Policy 26. Update the policy. 27. Close SmartDashboard. 28. In SmartConsole, publish and install the Alpha Security Policy. _____________________ _____________________ 537 Check Point Security Engineering Testing Check Point Mobile Access Reconfigure B-GUI to function as a remote client using Check Point Mobile Access and connect to the Alpha domain to test the newly configured applications. From B-Host, launch a web browser. 2. Use https to authenticate with Check Point Mobile at the following address: 1. 203.0.113.1/sslvpn Figure 432 — Check Point Mobile Authentication 3. Use the following information to log into Check Point Capsule: Username: user2 Password: Chkp!234 _____________________ _____________________ 538 Check Point Security Engineering 4. Click Sign In, and the system displays the applications defined in the Check Point Capsule policy, which are now available to remote users: Figure 433 — Check Point Mobile _____________________ _____________________ 539 Check Point Security Engineering 5. In the Web section of the page, click the World Clock link. The system displays the following: Figure 434 — World Clock Application 6. Click the Back button on the browser, to return to the Check Point Mobile page. _____________________ _____________________ 540 Check Point Security Engineering 7. In the File Shares section of the page, click the Alpha File Share link. The system displays the following: Figure 435 — File Access Settings _____________________ _____________________ 541 Check Point Security Engineering 8. Select the following option: Access files using the following username and password 9. Use the information below to enter the login information: Username: user2 Password: Chkp!234 10. Click OK, and browse the file share. END OF LAB 6.1 _____________________ _____________________ 542 Check Point Security Engineering Review Questions 1. What is the difference between an SSL VPN and an IPSec VPN? 2. How do Capsule Docs and Capsule Workspace work together? _____________________ _____________________ 543 C H A P T E R Check Point Security Engineering Threat Prevention 7 Protecting an organization from security threats such as zero-day or Advanced Persistent Threats (APT) is an important aspect of cyber security administration. The ability to prevent these and other threats help organizations avoid serious and costly damages. This chapter provides an overview of Check Point Threat Prevention solutions that protect an organization from malware and threats targeting company-issued devices, including smartphones and tablets. Learning Objectives • Discuss different Check Point Threat Prevention solutions for dangerous attacks such as zero-day and Advanced Persistent Threats. • Understand how SandBlast, Threat Emulation, and Threat Extraction helps to prevent security incidents. • Identify how Check Point SandBlast Mobile helps protect an organization from threats targeting company-issued smartphones and tablets. _____________________ _____________________ 544 Check Point Security Engineering The Threat Landscape Today’s Threat Landscape continues to evolve at a rapid pace. As a result, Threat Prevention has become more complex than ever before. Many organizations are challenged to keep up with the dynamically expanding landscape of threats as well as new trends, such as consumerization, regulatory compliance, and cloud-based services. Organizations and individuals alike continue to be victimized and beleaguered by sophisticated cyber attacks at an increasing rate. Businesses not only need to be concerned about network attacks, but also attacks directed at end user’s computers, such as viruses and bots. In addition, new malware is created nearly every second. Zero-day attacks and Advanced Persistent Threats (APTs) are different kinds of threats that attackers employ to target businesses. Both use evasion techniques that undermine an organization’s defenses. Thus, it is important for organizations to implement a multi-faceted security strategy to expose and combat these and other threats. Z e r o - D ay At t a c k s Zero-day attacks target unknown software flaws or vulnerabilities to deliver new variants of existing malware. They are known to elude the most up-to-date Anti-Malware and Antivirus solutions. Because there is no security patch yet available for these vulnerabilities, zero-day attacks give attackers an opportunity to perform their malicious activities within the targeted company’s network. Ad va n c e d Pe r s i s te n t T h r e a t s APTs are designed to infiltrate an organization’s systems over a period of time while evading detection. These attacks use multiple techniques in several stages and typically appear as small unrelated events, which, if taken individually, may seem harmless. In some cases, APTs may employ zero-day threats as an infection vector, but they also exploit existing vulnerabilities. APTs are known to be launched and funded by nation-states and certain organizations. They have targeted both large and small organizations. The damage of a successful APT can have a severe impact on affected companies. The impact can include data breaches, system downtime, damaged brand reputation, and various costly fees. _____________________ _____________________ 545 Check Point Security Engineering Intrusion Prevention System The Intrusion Prevention System (IPS) is a component of the Threat Prevention solution. Whereas the Firewall blocks traffic based on source, destination, and port information, IPS adds another line of defense by analyzing traffic contents to check if it is a risk to the network. IPS protects users from malware on legitimate websites, controls network usage of selected applications, and more. IPS Profile Setting s a n d P rote c t i o ns The IPS Software Blade delivers complete and proactive intrusion prevention. It features thousands of signatures, and behavioral and preemptive protections to deliver complete intrusion prevention for clients, servers, operating system and other vulnerabilities. Its detection engine combines multiple defense layers to detect and prevent threats. In R80.10, the IPS Software Blade is managed by the Threat Prevention policy. As part of the unified Threat Prevention policy, IPS allows more granularity with multiple protection profiles per gateway. IPS protections are immediately enforced on network traffic when a Threat Prevention policy is installed on the Security Gateways. Threat Prevention profiles determine which protections are activated. IPS profiles can be imported and exported using the ips_export_import command from the CLI. Using this command, profile configurations can be copied between management servers of the same version. Each IPS profile contains a set of activated protections and instructions for what IPS will do when traffic inspection matches an activated protection. The IPS library of protections is constantly updated to stay ahead of emerging threats. Security Gateways with IPS enabled will get the updates when the policy is installed. To view the latest protections, navigate to the Threat Tools sections and select IPS Protections. All IPS protections have dynamic tags which will allow Threat Prevention profiles to automatically activate or deactivate protections tagged by relevant aspects such as protocols, affected software, and file types. _____________________ _____________________ 546 Check Point Security Engineering Security Gateways from previous software versions that have IPS and other Threat Prevention Software Blades enabled, will have their Threat Prevention policy split into two different layers. In turn, the IPS layer will include the ThreatCloud IPS protections and all other core IPS protections will remain a part of the Access Control policy installation. NOTE Settings for protocol violations, such as “aggressive aging” and “noncompliant HTTP” are accessed from the Inspection Settings section. To view this section, navigate to Manage & Settings > Blades. IPS Tu ning a nd Ma inte na nce IPS is not a static solution and requires regular tuning and maintenance to make it effective against evolving threats. Below is an overview on how to properly maintain IPS: • Verify that there are enough CPU resources to enable IPS. • Update the IPS package, to ensure that the Security Gateway is updated with the latest protection signatures. • Set the default IPS action to Prevent, to enable maximum network protection. • Set the default IPS action for newly downloaded protections to Prevent. • Clone the Recommended Profile to create a backup copy. Make sure all changes are done on the cloned profile. Security requirements for different segments in the network often depend on the specified traffic types and network objects for each segment. For deployments with a Multi-Domain Server or several gateways, consider creating separate IPS policies and perform these steps for each segment. • During the initial process, enable Troubleshooting mode. In this mode, IPS inspects but does not block a network's unique traffic. Even if all protections are set to Prevent, the gateway only detects possible threats and generates logs for the traffic. • Use the Follow Up option to help the analysis and tuning of new protections in the future. • Assign the active profile to applicable gateways and set the gateway to bypass IPS inspection when it is under heavy load. This is to ensure that IPS analysis does not affect on-network traffic. • Install policy on the gateways, because policies are not automatically deployed. • After installing the policy, IPS will begin inspecting the traffic and generating logs. Collect logs for at least a week or two and then review the logs to decide which protections to run in Protect or Detect mode, and which ones require further fine-tuning and analysis. • Disable Troubleshooting mode for IPS Software Blade to protect the network. • Change the settings for Updates policy. Configure updates for Newly downloaded protections and then set to Detect. When new IPS protections are deployed, they are set to Detect mode. _____________________ _____________________ 547 Check Point Security Engineering • Clear the follow up and newly downloaded flags for all protections that are reviewed during the tuning process. • Tune the new IPS protections that are downloaded twice a month and look for changes in the behavior of the ones already tuned. • Monitor Security Gateway performance and configure the applicable settings to provide the best network security and performance. NOTE If a specific IPS profile is in Detect Only Mode for troubleshooting, it will not block malicious traffic. L a b 7.1 Understanding IPS Protections _____________________ _____________________ 548 Understanding IPS Protections L A B 7.1 The next step is to modify IPS protections so that you can configure your IPS policy to meet the specific challenges of the network, such as SQL Injections. Remember, IPS is considered a pre-infection blade, and is deployed to combat threats at the perimeter. Ta sks : • Configure a new default Protection profile. • Configure the IPS Demo Tool. • Test IPS enforcement. • Modify Profile settings. • Modify the cloned Protection profile. Pe r for ma n c e Ob j ec t ive s: • Demonstrate how Threat Prevention profiles affect IPS inspection on a Check Point Security Gateway. • Demonstrate how to modify IPS protections and customize enforcement profiles. _____________________ _____________________ 549 Check Point Security Engineering Configuring the Protection Profile Before you can determine how specific traffic is handled by the two pre-configured IPS profiles, reconfigure the settings to protect all interfaces on the gateway. 1. Edit the Alpha Policy and change the DMZ rule to be Any service. Figure 436 — Alpha Policy - DMZ Rule _____________________ _____________________ 550 Check Point Security Engineering 2. From the Firewall tab, edit the Alpha Security Gateway Cluster object: Figure 437 — Check Point Gateway - General Properties 3. Select the IPS option, and the system displays the following message: Figure 438 — IPS First Time Activation _____________________ _____________________ 551 Check Point Security Engineering 4. Verify that the following option is selected: According to the Threat Prevention policy Click OK. 6. In the navigation tab, select the IPS branch: 5. Figure 439 — Check Point Gateway - IPS _____________________ _____________________ 552 Check Point Security Engineering 7. In the Bypass Under Load section, select the following option: Bypass IPS inspection when gateway is under heavy load Figure 440 — Check Point Gateway - IPS Configured Click OK, and the system displays a message regarding Office Mode pool definition. 9. Click OK to clear the message. 8. _____________________ _____________________ 553 Check Point Security Engineering 10. In the navigation pane, select Mobile Access > Office Mode. 11. In the Office Mode page, select the following option: Do not offer Office Mode Figure 441 — Mobile Access - Office Mode Configured 12. Click OK. _____________________ _____________________ 554 Check Point Security Engineering 13. In the navigation pane of the Security Policies view, right-click Access Control > Policy. 14. Click Edit Policy, and the system displays the following window: Figure 442 — Policy _____________________ _____________________ 555 Check Point Security Engineering 15. Clear the following options: ◦ QOS ◦ Desktop Security 16. Confirm that only the following options are selected: ◦ Access Control ◦ Threat Prevention Figure 443 — Policy Configured 17. Click OK. _____________________ _____________________ 556 Check Point Security Engineering 18. In the navigation pane, select Threat Prevention > Policy: Figure 444 — Threat Prevention Policy _____________________ _____________________ 557 Check Point Security Engineering 19. In the navigation pane, select Profiles: Figure 445 — IPS - Profiles 20. In the profiles page, select the Basic profile. 21. Next, click the Clone icon. The system clones the Basic profile: Figure 446 — Clone Object _____________________ _____________________ 558 Check Point Security Engineering 22. Name the clone Alpha_Basic. NOTE it is best practice to modify clones of the default profiles, rather than edit the originals, in case you need to revert back to them at some point. 23. Select the Alpha_Basic profile. 24. Click Edit, and the system displays the cloned profile. 25. In the Activation Mode section of the page, select Detect for each mode: Figure 447 — Profiles NOTE By setting the Activation Mode to Detect, rather than Prevent, the Security Gateway will monitor and log malicious activity but will not block the traffic. 26. Click OK. _____________________ _____________________ 559 Check Point Security Engineering 27. In the navigation pane, select the Threat Prevention > Policy branch: Figure 448 — Profile Properties - IPS Policy 28. Review the policy settings. 29. Notice that the IPS protections are not included in the default Recommended_Profile. 30. Right-click the Action column of Rule 1. _____________________ _____________________ 560 Check Point Security Engineering 31. Select Alpha_Basic from the drop-down list. Figure 449 — Action Menu _____________________ _____________________ 561 Check Point Security Engineering 32. Publish and install the Alpha Threat Prevention and Access Control policies: Figure 450 — Install Policy _____________________ _____________________ 562 Check Point Security Engineering Configuring the IPS Demonstration Tool Configure the IPS Demo Tool to test the Check Point IPS software blade. 1. Power on the Attacker virtual machine: Figure 451 — IPS Demo Tool 2. In the Virtual Machine Settings, verify that the only network interface configured for the Attacker is connected to the External network (vmnet8). _____________________ _____________________ 563 Check Point Security Engineering 3. To start the IPS demonstration tool on the newly configured Attacker virtual machine, click the IPS icon from the toolbar at the bottom of the screen. The system displays the following: Figure 452 — IPS Demo Tool Launched NOTE The default network configuration for the tool must be changed to match our environment. Do this, after configuring eth0. 4. Type 0, and press Enter. The system displays the following: Figure 453 — Demo Tool Network Settings Configuration 5. Type the following at the prompt: 203.0.113.37 _____________________ _____________________ 564 Check Point Security Engineering 6. Press Enter, and the system displays the following: Figure 454 — Demo Tool Network Settings Configuration 7. Type the following at the prompt: 203.0.113.254 8. Press Enter, and the system displays the following: Figure 455 — Demo Tool Network Settings Configuration 9. Type the following at the prompt: 203.0.113.171 _____________________ _____________________ 565 Check Point Security Engineering 10. Press Enter, and the system displays the following: Figure 456 — Demo Tool Network Settings Configuration 11. Type the following at the prompt: 203.0.113.254 12. Press Enter, and the system displays the following: Figure 457 — IPS Tool - Main Menu 13. Use the table below to verify that the network configuration information displayed by the tool is correct: Attacker IP Address: 203.0.113.37 Attacker Default Gateway: 203.0.113.254 Target IP Address: 203.0.113.171 Target Default Gateway: 203.0.113.254 14. While keeping the IPS Demo Tool open, open a terminal window. _____________________ _____________________ 566 Check Point Security Engineering 15. Type the following command, and press Enter: ifconfig -a Figure 458 — Terminal Window 16. The system should show eth0 as configured with an incorrectly defined IP address or subnet mask. 17. To configure the Attacker virtual machine interface, type the following and press Enter: ifconfig eth0 203.0.113.37 netmask 255.255.255.0 _____________________ _____________________ 567 Check Point Security Engineering 18. To configure the default route for the Attacker virtual machine, type the following, and press Enter: route add default gw 203.0.113.254 eth0 Figure 459 — Terminal 19. To help identify network issues that may arise, initiate a constant ping from the Attacker to A-DMZ: Figure 460 — Ping NOTE If the ping fails, you can quickly re-IP the interface and add the default route back to the Attacker’s configuration. _____________________ _____________________ 568 Check Point Security Engineering Testing the Default Protections Test the current protection settings for the Check Point IPS software blade. 1. In the IPS Demo Tool, type 2, and press Enter. The system displays the Attacker menu: Figure 461 — Attacker Menu NOTE Do not run the Run all option 0, as it will change the IP address. Type 1, to select the Network Security category. 3. Press Enter. 4. Type 0, and press Enter. The system asks you to select an execution mode. 2. Type 2, and press Enter. The system asks you to define the number of attacks in this sequence. 6. Type 100, and press Enter. The system runs the attacks in the selected category, and presents the Attacker menu when the attack sequence is completed. 5. _____________________ _____________________ 569 Check Point Security Engineering From the Logs & Monitor tab, verify that the traffic is being detected. 8. Search field, click Blade > IPS to view the IPS related traffic logs: 7. Figure 462 — IPS Traffic Logs 9. Confirm that you see IPS traffic as Detected. _____________________ _____________________ 570 Check Point Security Engineering Modifying the Protection Profile Settings Now, configure IPS to protect the network from attacks, rather than simply detect them. 1. In the navigation pane of the Security Policies view, select Threat Prevention > Policy: Figure 463 — Threat Prevention - Policy 2. Edit the Alpha_Basic profile, and the system displays the Profiles window. _____________________ _____________________ 571 Check Point Security Engineering 3. In the Activation Mode section of the page, select Prevent for all Activation Modes: Figure 464 — Profiles - General Policy Click OK, to approve the change and clear the window. 5. Publish and install the Alpha Threat Prevention Policy. 6. From the Attacker virtual machine, return to the Attacker main menu. 7. Type 1, and press Enter. The system displays the Network Security category: 4. Figure 465 — Network Security Category _____________________ _____________________ 572 Check Point Security Engineering 8. Type 1, and press Enter. The system displays the IP and ICMP category: Figure 466 — IP and ICMP Category 9. Type 5, and press Enter. The system displays the Packet Sanity feature: Figure 467 — Execute Packet Sanity Attack 10. Press Enter, and the system executes the selected packet sanity attack on the A-GUI virtual machine: Figure 468 — Trailing Data Attack _____________________ _____________________ 573 Check Point Security Engineering 11. From the A-GUI virtual machine, view the IPS logs in the Logs & Monitor tab: Figure 469 — Logs & Monitor - IPS Logs _____________________ _____________________ 574 Check Point Security Engineering 12. Open an IPS record: Figure 470 — Log Detail 13. Review the record and consider the following questions: ◦ What is the threat severity level? ◦ What is the performance impact of this inspection and action? ◦ What is the protection name? 14. Close the record. _____________________ _____________________ 575 Check Point Security Engineering 15. Next, navigate to the Security Policies view. 16. Select Threat Prevention > Policy. 17. Now, enforce the Recommended_Profile: Figure 471 — Recommended_Profile Enforced 18. In the navigation pane, select Profiles. _____________________ _____________________ 576 Check Point Security Engineering 19. View the Recommended_Profile. 20. Select the following Blade Activation option: IPS 21. Clear the following Blade Activation option: Threat Extraction Figure 472 — Profiles NOTE In a production environment, it’s best practice to clone a profile and make any changes in the clone. This allows you to revert back to the default profile settings, if necessary. 22. Publish and install the Alpha Security Policy. _____________________ _____________________ 577 Check Point Security Engineering 23. From the Attacker virtual machine, return to the Attacker menu: 24. Type 2, and press Enter. The system displays the Application Intelligence category. Figure 473 — Application Intelligence Menu 25. Type 2, and press Enter. The system displays the MS-RPC category. 26. Type 1, and press Enter. The system displays the MS-RPC Over CIFS category. 27. In the MS-RPC Over CIFS sub category, select 1, and press Enter. The system displays the following: Figure 474 — Non-Compliant CIFS Attack _____________________ _____________________ 578 Check Point Security Engineering 28. Press Enter, and the system executes the non-compliant CIFS attack: Figure 475 — Non-Compliant CIFS Attack Executed 29. Press Ctrl + C to stop the attack. 30. In the Logs & Monitor view of SmartConsole, locate the most recent blocked traffic. NOTE If you are not susceptible to a specific attack, for instance, if you did not have CIFS files on your network, you could allow it because it cannot be successful. 31. Notice that the traffic is not inspected or blocked by IPS. NOTE The related protection is inactive in the Recommended profile, so the traffic is dropped by the Cleanup Rule on the firewall. By leaving some protections inactive in the profile, especially for low-risk threats, the firewall load is reduced. _____________________ _____________________ 579 Check Point Security Engineering Working with Logs & Monitor to Investigate Threats Use the Logs & Monitor tab in SmartConsole to investigate unusual IPS related threat traffic. In the navigation pane of Logs & Monitor view, review the IPS logs. 2. Double-click a record, to view it’s details: 1. Figure 476 — Log Details Review the options listed in the Actions section of the page. 4. Consider the following questions: ◦ Could these actions be used to attempt to identify the source of the attack? 3. ◦ In what situations would you consider using any of these actions? _____________________ _____________________ 580 Check Point Security Engineering Modifying an Existing Protection Profile Make changes to the protections to prevent and detect specific traffic that you may be concerned about infiltrating your network. In SmartConsole, select the Security Policies view. 2. Select Threat Prevention > Policy: 1. Figure 477 — Threat Prevention Policy _____________________ _____________________ 581 Check Point Security Engineering In the navigation pane of the IPS tab, select IPS Protections. 4. Click the View button: 3. Figure 478 — IPS Protections 5. Click Show Profiles, and the system displays the Show Profiles window. _____________________ _____________________ 582 Check Point Security Engineering 6. Select the following option: Specific IPS enabled profiles 7. Select both of the following options: Alpha_Basic Strict Figure 479 — Show Profiles Configured _____________________ _____________________ 583 Check Point Security Engineering 8. Click OK, and the system displays the modes of the two selected profiles: Figure 480 — IPS Protections Modified 9. Review the first few protections on the page, and consider the following: ◦ Are there protections that are not active on any profile? ◦ Can you see differences between the Default and Recommended profiles? ◦ Which profile is more strictly enforced (more active protections)? ◦ How would you expect the different profiles to affect the performance of the gateway? 10. Sort the protections by descending, alphabetical order. _____________________ _____________________ 584 Check Point Security Engineering 11. Select the following protection. It is Active in the Default Profile but Inactive on the Recommended profile: CVE-2009-1761 Figure 481 — IPS - Protections _____________________ _____________________ 585 Check Point Security Engineering 12. Double-click the Selected protection, and the system displays a list of associated IPS profiles: Figure 482 — Associated IPS Profiles 13. Select the Strict profile. 14. Click the Edit button, and the system displays the following: Figure 483 — Protection Details _____________________ _____________________ 586 Check Point Security Engineering 15. Use the information below to configure the Protection Details window: Main Action: Override IPS Policy with Prevent Track: Log Capture Packets: Selected Figure 484 — Protection Settings Configured 16. Click OK. 17. Click Close, and the protection now shows Prevent in the Strict: _____________________ _____________________ 587 Check Point Security Engineering Figure 485 — Protection Details - General 18. In the search field of the Protections page, enter the following: sql injection _____________________ _____________________ 588 Check Point Security Engineering 19. Press Enter, and the system displays all projections relating to SQL Injections: Figure 486 — IPS - Protections - Search Results 20. Select the following protection: Oracle Database Server Multiple Procedures 21. Double-click the Inactive icon in the Strict column. _____________________ _____________________ 589 Check Point Security Engineering 22. Use the information below to configure the protection: Main Action: Override IPS Policy with Detect Track: Log Capture Packets: Cleared Figure 487 — Protection Settings Configured 23. Click OK, and the system displays the following message: Figure 488 — Check Point SmartConsole 24. Click OK, to clear the message. _____________________ _____________________ 590 Check Point Security Engineering 25. Click Close, and the system now displays Detect, rather than Inactive for the modified protection: Figure 489 — IPS - Protections Modified NOTE You can also right-click the profile field and select Detect or Prevent, without having to edit the protection directly. 26. Publish and install the Alpha Security Policy. _____________________ _____________________ 591 Check Point Security Engineering END OF LAB 7.1 _____________________ _____________________ 592 Check Point Security Engineering Geo-Protection Geo-Protection enforces or monitors traffic based on the source or destination country. Country information is determined by comparing the IP address in the packet against the IP-tocountry database. Private IP addresses are always allowed unless explicitly specified as blocked on the other side of the connection. Check Point control connections, for example those between Security Gateways and Security Management Server, are always allowed regardless of the Geo-Protection policy. You must have a valid IPS contract and a Software Blade license for each Security Gateway that enforces Geo-Protection. Figure 490 — Geo Policy The IP Address to Country Database The IP-To-Country database is downloaded to the Security Gateway from a Check Point data center. To make sure that the database is up-to-date, the Security Gateway should be connected to the Internet. If the Security Gateway requires a proxy to access the Internet, the proxy must be defined in SmartDashboard. _____________________ _____________________ 593 Check Point Security Engineering Log Aggregation by Country By default, Geo-Protection logs are aggregated, which means that a single log entry is generated per aggregation interval, for every country that is part of the Policy for Specific Countries. Logs related to other countries are aggregated to a single log entry. It is possible to turn off log aggregation by country. In that case, a log is created for every connection tracked. Turning off log aggregation by country may significantly increase the number of generated logs and increase CPU usage on the Security Gateway. You can create a Geo Protection policy with exceptions to allow legitimate traffic through while blocking or monitoring traffic from untrusted sources or by country. Users can monitor activity using SmartEvent. L a b 7. 2 Deploying IPS Geo Policy _____________________ _____________________ 594 Deploying IPS Geo Protection L A B 7.2 Spoof a source address to test the Geo Protection feature of IPS. Ta sks : • Modify Anti-Spoofing settings. • Configure IPS Geo Protection. • Test IPS Geo Protection features. Pe r for ma n c e Ob j ec t ive : • Demonstrate how geographic location can be used to define a security posture. _____________________ _____________________ 595 Check Point Security Engineering Modifying Anti-Spoofing Settings Disable anti-spoofing measures on the Security Gateway so that you can spoof addresses to make them appear to be coming from a country from which you want to block traffic. 1. From SmartConsole, edit A-GW-Cluster: Figure 491 — Check Point Gateway - General Properties 2. Select the following Network Security options: ◦ Application Control ◦ URL Filtering _____________________ _____________________ 596 Check Point Security Engineering 3. In the navigation pane, select Network Management: Figure 492 — Check Point Gateway - Topology Edit the external interface (eth3). 5. In the Topology section, click Modify. 4. _____________________ _____________________ 597 Check Point Security Engineering 6. Use the information below to configure the Anti-Spoofing section of the tab: Anti-Spoofing Action: Detect Spoof Tracking: None Figure 493 — Interface Properties - Topology NOTE Do not disable anti-spoofing measures in a production environment. In this lab, antispoofing is disabled here to spoof traffic needed to demonstrate IPS features. _____________________ _____________________ 598 Check Point Security Engineering 7. Click OK, to change the new Anti-spoofing setting: Figure 494 — Network eth3 Click OK, to close the Security Gateway object. 9. Repeat the previous step for every interface configured on the Alpha Security Gateway Cluster. 8. _____________________ _____________________ 599 Check Point Security Engineering Configuring IPS Geo Protection Configure Geo Protection measures to block traffic emanating from and traveling to specific countries. From SmartConsole, select the Security Policies view. 2. In the navigation pane, select Geo Policy: 1. Figure 495 — Geo Policy In the navigation pane, expand the Geo Policy option. 4. Click Gateways. 3. _____________________ _____________________ 600 Check Point Security Engineering 5. Double-click the A-GW-Cluster object, to view the name of the Geo Policy being enforced: Figure 496 — Geo Policy Note the name of the enforced policy. 7. In the navigation pane, select Policy. 8. In the Geo Policy pane, verify that the Edited Policy is the same as the enforced policy that you just noted in the steps above. 9. Set the Activation Mode to Active. 6. _____________________ _____________________ 601 Check Point Security Engineering 10. Click the Add button, and the system displays the following: Figure 497 — Geo Protection 11. Use the following information to configure the Geo Protection window: Country: Iran Action: Drop Direction: From and To Country Track: Log Figure 498 — Geo Protection Configured _____________________ _____________________ 602 Check Point Security Engineering 12. Click OK, and the system adds Iran to the list of policy specific countries: Figure 499 — Geo Policy _____________________ _____________________ 603 Check Point Security Engineering 13. Add other countries to the list with specific policy settings, such as Allowing traffic to and from Israel and the United States but blocking traffic from China: Figure 500 — Geo Policy 14. Publish the changes to the database. 15. Install the Alpha Access Control and Threat Prevention policies. 16. From the Attacker virtual machine, open a terminal session type the following command at the prompt: nmap -sS -S 195.170.163.4 -e eth0 -P0 203.0.113.171 17. Press Enter, to generate traffic to A-DMZ from a spoofed address. _____________________ _____________________ 604 Check Point Security Engineering 18. From the Logs & Monitor tab view the Geo Policy logs: Figure 501 — SmartConsole - Logs & Monitor _____________________ _____________________ 605 Check Point Security Engineering 19. View the details of a Geo-Protection item in the logs: Figure 502 — Log Detail 20. Reconfigure anti-spoofing on all A-GW-Cluster interfaces. END OF LAB 7.2 _____________________ _____________________ 606 Check Point Security Engineering Antivirus The Check Point Antivirus Software Blade protects the network from malware attacks, such as worms, backdoors, viruses, and trojans. Using threat intelligence from ThreatCloud, Antivirus generally deals with threats coming into the organization’s network. It scans incoming files like PowerPoint, Word, or Excel files for malicious signatures. It then updates the ThreatCloud repository for any newly detected malware found in the system. Aside from monitoring and classifying files, Antivirus also blocks access to websites with known connections to malware. The Security Gateway uses its caching mechanisms to verify URLs. If the Security Gateway is unable to verify the URL, the Antivirus blade sends the URL to ThreatCloud for verification. If found malicious, Antivirus blocks access to the URL before any damage can take place. _____________________ _____________________ 607 Check Point Security Engineering Anti-Bot A bot is malware which uses stealth mechanisms to remain hidden from Antivirus solutions. They can arrive into a computer as an infected email attachment or as the result of a drive-by download from a malicious website. Once infection occurs, the bot takes control of the computer by connecting to a Command & Control (C&C) server and awaits instructions from attackers who can remotely execute routines. These routines include data theft, spam distribution, and other activities that consume significant computer resource and bandwidth. Attackers also use the bot-controlled computer to target and infect other computers, in effect creating a botnet. An anti-bot tries to prevent damages by blocking communications from the C&C server. The Anti-Bot Software Blade identifies bot-infected machines using the multi-tier ThreatSpect engine to analyze network traffic. ThreatSpect is a discovery technology that has up-to-minute update feeds from ThreatCloud. The engine is installed on the gateway and performs three important tasks: • Performs a reputation check to verify the IP addresses and drop zones of known C&C sites with real-time updates of an address list. Security Gateways are constantly updated with the latest list. However, the ThreatSpect engine may query ThreatCloud to get more updates. ThreatSpect engine also caches this information to minimize time to deploy updates. • Reviews the network signatures of over 2,000 bot families that were detected previously. It matches the traffic’s behavior with known bot behavioral patterns and blocks communication to C&C sites. This ensures no sensitive information is stolen or leaked. • Searches for suspicious activity by monitoring outgoing mail traffic and communication patterns. For example, it analyzes outgoing mail to identify spam sent from the organization. It also monitors if a computer participates in Denial of Service (DoS) attacks. Once a bot-infected machine is identified, the ThreatSpect engine blocks outbound communication to C&C sites to protect sensitive data. However, you will still need remediation to remove the bot from the network. L a b 7. 3 Reviewing Threat Prevention Settings and Protections _____________________ _____________________ 608 L A B Reviewing Threat Prevention Settings and Protections 7.3 Configure your environment to connect to the Internet. Then, review specific threats and protection details. Once you have done that, test the enabled Anti-Bot and Antivirus settings by attempting to download a test file. Ta sks : • Review Threat Prevention settings and protections. • Test EICAR file access. Pe r for ma n c e Ob j ec t ive s: • Identify specific threat protections used by Check Point Threat Prevention. • Demonstrate the Anti-bot and Antivirus features of R80.10. _____________________ _____________________ 609 Check Point Security Engineering Review Threat Prevention Settings and Protections Verify that you have enabled Anti-Bot and Anti-Virus software blades, then investigate the protections. 1. On A-GUI, edit the A-GW-Cluster object: Figure 503 — Check Point Gateway - General Properties Configured _____________________ _____________________ 610 Check Point Security Engineering 2. In the Network Security tab, select the Anti-Bot option, and the system displays the following: Figure 504 — Anti-Bot and Anti-Virus 3. Verify that the following option is selected by default: According to the Anti-Bot and Anti-Virus policy Click OK. 5. Next, select Anti-Virus. 4. _____________________ _____________________ 611 Check Point Security Engineering 6. Verify that the General Properties page of the cluster object appears as follows: Figure 505 — Gateway Cluster Properties - General Properties _____________________ _____________________ 612 Check Point Security Engineering 7. In the navigation pane, select Anti-Bot and Anti-Virus: Figure 506 — Check Point Gateway - Anti-Bot and Anti-Virus Configured 8. In the Check Point ThreatCloud Information section, verify that the following option is selected: Share anonymous attack information with Check Point ThreatCloud. 9. Click OK. _____________________ _____________________ 613 Check Point Security Engineering 10. In the navigation pane, select Threat Prevention > Policy: Figure 507 — Threat Prevention - Overview _____________________ _____________________ 614 Check Point Security Engineering 11. In the navigation pane, click Protections: Figure 508 — Threat Prevention - Protections _____________________ _____________________ 615 Check Point Security Engineering 12. In the list of protection categories, select Malicious Activity. 13. In the Protections pane, select the Activations tab: Figure 509 — Protections - Activations 14. Note the default actions for Threat Prevention profile enforcement. _____________________ _____________________ 616 Check Point Security Engineering 15. Right-click and select Prevent for all profiles: Figure 510 — Malicious Activity Category Edited 16. Note how the enforcement for all profiles changed to Prevent. 17. In the navigation pane, select Policy. 18. Identify which protection profile is being implemented. _____________________ _____________________ 617 Check Point Security Engineering 19. Right-click Alpha_Basic and select Edit, to view its details: Figure 511 — Profiles 20. Click Close. 21. Publish the changes to the database. _____________________ _____________________ 618 Check Point Security Engineering 22. In the Policy page, click the Install Policy button. The system displays the Install Policy window: Figure 512 — Install Policy 23. Verify that both the Access Control and Threat Prevention policies are selected for install. 24. Click Install, and the system installs the Threat Prevention policy on the Security Gateway cluster members. _____________________ _____________________ 619 Check Point Security Engineering Testing EICAR Access Now that you have basic protections in place, test your gateway’s current Threat Prevention settings. On A-Host, launch a web browser, enter “eicar file download” into the search field, and press Enter. 2. Navigate to the EICAR file download page: 1. Figure 513 — EICAR Download Page NOTE The EICAR file is a harmless file used to test anti-virus software. _____________________ _____________________ 620 Check Point Security Engineering 3. Use HTTP to attempt to download and save the zip versions of the EICAR file to the desktop of AHost. Your attempts should be blocked: Figure 514 — Page Blocked _____________________ _____________________ 621 Check Point Security Engineering Once the download attempts are complete, identify the Threat Prevention traffic in the Logs & Monitor tab of SmartConsole. 5. Consider the following questions: ◦ Why didn’t both EICAR downloads show up as the same type of traffic? 4. ◦ Accept or Detect or Drop? ◦ Why was one of the downloads successful, if the EICAR file simulates a virus? ◦ Did the gateway identify the “virus” even when it was zipped? ◦ Why was the traffic allowed, if the Security Gateway identified the file as a virus? ◦ Did the Security Policy function as designed? END OF LAB 7.3 _____________________ _____________________ 622 Check Point Security Engineering Sandboxing Sandboxing is a pre-eminent solution which is used to catch zero-day attacks and APTs. It allows a file to be hosted and executed in a secured environment, separate from the network. The file is then observed for suspicious routines. If the file displays any type of malicious behavior, it is prevented from being released into the network. If found safe, the file will be released to the network. There are currently two types of sandboxing: OS-level and CPU-level. O S - L eve l S a n d b ox i n g Also known as traditional sandboxing, OS-level sandboxing emulates a standard operating system in an isolated environment to execute and screen files. This ensures that suspicious files are safely isolated from the company’s production network. The sandbox simulates the files as if the actual user opened it and monitors it for malicious routines. If the file shows any suspicious behavior, the sandbox updates Threat Cloud for threat intelligence sharing and deleting the file. Traditional Sandboxing Evasion Methods Attackers have created several tactics to avoid sandbox detection. Some of these known techniques include: • Delaying launch of a payload, wherein malicious code executes minutes, hours, days, or even years after the file has been opened. • Searching for virtual machine indicators, such as scanning registry keys, running processes, or disk size to identify a sandbox environment. • Checking for human interaction activities that are difficult to replicate in a virtual environment, including page scrolling and mouse clicks. • Operating system fingerprinting to identify systems, services, and hardware and software configurations that may be available for exploitation. C P U - L eve l S a n d b ox i n g CPU-level sandboxing addresses the limitations of traditional sandboxing by performing CPUlevel inspection to monitor any indication of an exploit method executed in CPU instruction codes (sets). This solution takes advantage of the fact that although attackers have plenty of vulnerabilities and malware to choose from, they can only use a handful of exploit methods. _____________________ _____________________ 623 Check Point Security Engineering The image below shows a typical CPU-Level attack scenario: Figure 515 — Four Stages of a CPU-Level Attack 1. 2. 3. 4. Finding Vulnerability — One or more vulnerabilities are discovered in the operating system code or widely used applications like Internet browsers and PDF readers. Potentially, there can be thousands of software vulnerabilities in a system. By exploiting any of these vulnerabilities, attackers will inject their logic into the system and trigger an attack. Using an Exploit Method — Exploits allow the injected logic to manipulate the target system and run the malicious code. This requires overcoming built-in security controls implemented by the operating system and the CPU, such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR). This is the stage where CPUlevel sandboxing examines files for an exploit method and catches it before the shellcode is executed. Running a Shellcode — A shellcode is a small payload, typically embedded into a file or web page. After leveraging one or more exploit methods, the attacker then plants the shellcode into executable memory to trick the system to run it. Retrieving the actual malware, the shellcode then places it on the infected system. Running the Malware — Executing the malware completes the infection. This is the stage where traditional sandboxing discovers if a file shows any suspicious routines. However, it is at this stage where evasion techniques usually manifest, such as when a file delays execution of its routines in an attempt to hide from the sandbox. _____________________ _____________________ 624 Check Point Security Engineering Check Point SandBlast Zero-Day Protection SandBlast Zero-Day Protection is Check Point’s solution for zero-day attacks, APT and similar threats. It is complemented with a suite of attack visibility tools, such as the Logging and Monitoring view of SmartConsole and SmartEvent. These tools aid in forensics and help to reveal how detected malware would have behaved, had it been allowed to run. Check Point offers SandBlast technology solutions for private network and public cloud settings. To protect end user systems, Check Point expands SandBlast protection with the SandBlast Agent. SandBlast Components SandBlast has several functional components that work together to ensure that attacks are prevented in real-time. These components include: • • • • Threat Emulation Threat Extraction Threat Cloud Mail Transfer Agent SandBlast Threat Emulation The Threat Emulation engine is the sandbox component of SandBlast. It protects the network against advanced and zero-day attacks by performing both CPU-level and OS-level inspection of files. Threat Emulation hosts the file in a sandbox environment and examines it on a CPUlevel for any indication of exploit activity. This inspection stops the file from executing any of its routines, particularly those that attempt to evade detection. SandBlast Threat Extraction The SandBlast Threat Extraction engine examines document files and removes any active contents from the document, while Threat Emulation runs the file in its secured environment. Active contents include objects such as JavaScript, macros, and links, which cyber criminals may use to insert their malicious code. While Threat Emulation runs and inspects files, Threat Extraction provides users with a sanitized, reconstructed document using only safe elements. This ensures business continuity and end-user productivity without compromising security. Threat Extraction is typically used for incoming emails only; however, it can be used for outgoing emails as well. It supports widely used document file types, such as PDF and MS Word documents. _____________________ _____________________ 625 Check Point Security Engineering Threat Extraction and Threat Emulation both work together to secure production networks while ensuring that business will proceed as usual. However, each component works differently. The following table details the differences between Threat Extraction and Threat Emulation: Threat Extraction Threat Emulation Preemptively removes possible malicious content Proactively detects threats Always delivers a file Delivers file if no threats are detected Works on MS Office and PDF files Works on MS Office, PDF, executables, and archive files Delivers PDF version of original file or original format with active content remove Delivers file with original content Takes less than a second to complete Takes minutes to complete (less than 3 minutes) Assumes that all active content is potentially malicious Detects threats and provides a detailed report of discovered threats Disables any active functionality in documents regardless of its intent Delivers full functionality if no threats are detected Table 11: Comparison of SandBlast Threat Extraction and Emulation Threat Cloud Check Point Threat Cloud is the back-end platform for intelligence sharing for all Check Point products and services. This platform consolidates big data, external feeds, and shared learning from various sources, such as: • Signature and reputation data from different Check Point systems • External intelligence sources, along with consumer and endpoint data SandBlast agents • Data and research from Check Point’s Vulnerability Research and Incident Response teams Threat Cloud ensures that SandBlast is up-to-date with information to help protect an organization’s network against the latest threats. _____________________ _____________________ 626 Check Point Security Engineering Mail Transfer Agent Mail Transfer Agent (MTA) functionality in Check Point Security Gateways ensures that full emulation occurs without any disruption to the business, particularly in the flow of email. Enabling MTA prevents the possibility of email server timeout during file emulation and manages the emulation of SMTP traffic. MTA completes and closes the connection with the source email server and then sends the file for emulation. With MTA enabled, the gateway manages SMTP traffic via port 25 and holds external emails with potentially malicious attachments. After emulation is complete, MTA sends the email to the server in the internal network. The detailed process is shown below: Figure 516 — MTA Functionality Work Flow 1. 2. 3. 4. 5. 6. MTA acts as an SMTP server by receiving email from the sender and closing the connection after the complete email and the attachment is received. MTA holds the email until Threat Extraction reconstructs a clean copy of the attachment. MTA sends the attachment to the Threat Emulation sandbox environment for inspection. MTA stores the original attachment in the Security Gateway and modifies the email by attaching the clean copy of the attachment, along with a link to the original attachment. MTA then forwards the modified email to the mail server, which then sends it to the intended recipient. If the attachment is found to be malicious after inspection, Threat Emulation deletes the file, logs the event, notifies the administrator, and updates Threat Cloud. NOTE To enable MTA functionality in the Security Gateway, activate the Threat Prevention Software Blade package which includes Antivirus, Anti-Bot, and either Threat Extraction or Threat Emulation. _____________________ _____________________ 627 Check Point Security Engineering SandBlast Appliances SandBlast appliances can be deployed in two modes: • Inline or Prevent — As a Mail Transfer Agent (MTA) and as part of the web traffic flow. • Detect Only — A SPAN port to receive a copy of traffic. A SandBlast appliance includes the Anti-Bot, Antivirus, Threat Emulation and Threat Extraction Software Blades. However, it is recommended to use the appliance exclusively for OS-level sandboxing and CPU-level detection. Organizations that prefer not to allow files to be sent outside of the corporate network or those that have a large centralized network architecture requiring high performance and low latency, may opt for deploying a SandBlast private cloud option. Solution architectures vary depending in cases such as: • Customers with Check Point Security Gateways running R77 and above, and with the Next Generation Threat Prevention (NGTP) package activated. • Customers with Check Point gateways below R77 or no NGTP package, or with third party gateways. • Customers that are evaluating SandBlast prior to installing it. _____________________ _____________________ 628 Check Point Security Engineering Prevent Mode When a SandBlast appliance is deployed in Prevent mode, traffic (or an attached file) is sent to the appliance before it is allowed to enter the internal network. This deployment requires that the MTA feature in the Security Gateway is enabled. Prevent mode is also recommended for Proof-of-Concept (POC) scenarios where the customer is using either a third-party Firewall or an older version of Check Point software. Customers with no Next Generation Threat Prevention (NGTP) package would also benefit from this type of deployment. Figure 517 — SandBlast Appliance in Prevent Mode _____________________ _____________________ 629 Check Point Security Engineering The detailed workflow of the SandBlast appliance in Prevent mode architecture is: 1. 2. 3. 4. 5. 6. The attacker sends an email with an attached file. The Check Point Security Gateway with MTA enabled holds the email. Threat Extraction reconstructs a safe copy of attachment, and forwards it to the mail server. The recipient receives the email and safe copy without any delay. Threat Emulation forwards the attachment to OS-level sandboxing and CPU-level detection within the SandBlast Appliance. The SandBlast appliance inspects the file. If the file is found malicious, SandBlast updates ThreatCloud with the information. The file is marked infected and deleted from the MTA holding area of the Check Point Security Gateway. If the SandBlast appliance determines the file is harmless, the original file is released to mail server. _____________________ _____________________ 630 Check Point Security Engineering Detect Only Mode For users who want to perform an evaluation first, the SandBlast appliance can be configured to Detect Only mode or SPAN port deployment to monitor zero-day attacks. In this scenario, duplicate traffic is sent to the SandBlast appliance while real traffic enters the internal network, passing through the Security Gateway. Using the MTA feature is not required in this deployment. Figure 518 — SandBlast Appliance in Detect Only Mode The SandBlast appliance Detect Only mode architecture works as follows: 1. 2. 3. 4. 5. An attacker sends the email with an attachment. The Check Point Security Gateway or a third-party gateway uses a mirror or TAP port to duplicate network traffic, sending it to the SandBlast appliance. The gateway performs a traditional security inspection and permits traffic to enter the network. The user receives the original email without any delay. Threat Emulation forwards the attached file to the SandBlast appliance for OS-level sandboxing and CPU-level detection. If the file is found malicious, SandBlast updates ThreatCloud with the new malware and the system administrator is notified of the infection. _____________________ _____________________ 631 Check Point Security Engineering SandBlast Cloud SandBlast Cloud performs OS-level sandboxing and CPU-level detection in a Check Point controlled, public cloud infrastructure. This solution requires no new hardware and is ideal for users who want to use their existing gateways, have a globally distributed network, or have high usage of cloud-based or Software-as-a-Service (SaaS) applications. The detailed workflow of the SandBlast Cloud architecture is as follows: 1. 2. 3. 4. 5. 6. An email is sent with a malicious attachment. Check Point Security Gateway with enabled MTA holds the email. Threat Extraction constructs a clean copy of the attachment in PDF format and forwards it to the mail server. The recipient receives the email with the PDF copy without delay. Using the MTA service, Threat Emulation forwards the email to SandBlast Cloud for OSlevel sandboxing and CPU-level detection. If the file is identified as zero-day malware, SandBlast Cloud updates ThreatCloud with the new information. The file is marked as infected and deleted from the MTA holding area in the Security Gateway. If SandBlast Cloud determines the file to be harmless, it is then released to the mail server. Figure 519 — SandBlast Cloud Architecture _____________________ _____________________ 632 Check Point Security Engineering Check Point SandBlast Cloud provides zero-day protection for organizations transitioning to cloud-based applications. The SandBlast Cloud includes the following security elements: • Antivirus — Proactively leverages Antivirus signatures to protect against malware in attached files. • URL Reputation — Detects and blocks malicious URLs within email body. • Threat Extraction — Delivers safe, reconstructed copies of documents to users while inspecting the original files for potential threats. • Threat Emulation — Forwards inbound email file attachments, including files originating from URLs within emails, to the sandbox for emulation. It detects and blocks the file if verified to be malicious or a component of a zero-day attack. SandBlast Cloud can be deployed in Detect mode, Prevent mode or as a Hybrid. SandBlast Cloud in Detect Mode In Detect mode, incoming emails go straight to the inbox without interference, while attachments are sent to SandBlast Cloud for inspection. This is the ideal mode for introducing visibility into threats while gradually deploying solution. SandBlast Cloud in Prevent Mode In Prevent mode, incoming emails are directed to a temporary quarantine folder within Office 365 to isolate incoming emails from the user inbox. This ensures emails containing malicious attachments, contents, and URLs will not reach end users. In the case of a false positive, in which a user determines that the email is from a trusted source, the email and content can be retrieved from the quarantine folder. _____________________ _____________________ 633 Check Point Security Engineering Hybrid Deployment Organizations with an on-premise Exchange server and Cloud Office 365 can use the following options for a hybrid deployment: • Exchange mail – Use the Check Point Security Gateway with a Next Generation Threat Extraction Software Blade license, and use either SandBlast Cloud or appliance for Threat Emulation. • Microsoft Office 365 – Subscribe to Check Point SandBlast Cloud security as a service. To consolidate logging and have both solutions send logs to the same on-premise SmartLog or SmartEvent server, users can configure the Log Transfer Agent (LTA) in the Check Point SandBlast Cloud dashboard. Exchange Server as MTA Agent Using an exchange server agent as an MTA agent is the best option for administrators who want to simplify the mail-holding design during SandBlast implementation. This allows them to use their existing Exchange agent to hold all corporate email, while Check Point SandBlast certifies it as safe. _____________________ _____________________ 634 Check Point Security Engineering SandBlast Agent SandBlast Agent extends SandBlast protection to end-user systems, such as desktops and laptops. It is designed to defend endpoint devices and web browsers. If malware enters an end user’s system, the SandBlast Agent uses its local version of Anti-Bot to detect and contain these infections. It searches for any Command and Control (C&C) communication sent over the network. To prevent the malware from spreading within the network, SandBlast Agent blocks any communication from the affected computer and quarantines the infected files. Forensics Analysis The SandBlast Agent features automated forensic analysis that generates extensive reporting and diagnostics of security events for faster response against attacks. It shows threat details, such as arrival method, attack flow, business impact, and infected hosts. Figure 520 — SandBlast Agent Work Flow _____________________ _____________________ 635 Check Point Security Engineering To create this report, the SandBlast Agent performs the following: 1. 2. 3. 4. The SandBlast Agent collects forensics data continuously on the endpoint in a tamperresistant area. This provides full visibility into activity throughout the attack lifecycle, and requires minimal overhead. The data is stored for a 30-day window by default, but can be adjusted. Because the agent only records events, it requires less than 1% of CPU resources and 1 GB of storage. An Incident report can be triggered by a number of events, including input from SandBlast Agent, Threat Emulation, Threat Extraction, and other enabled Software Blades. Raw forensic data are analyzed using advanced algorithms. The SandBlast Agent automatically requests logs from involved endpoints. Finally, the SandBlast Agent generates a complete view of attacks, including point of entry, business impact, and full attack flow. The Incident report is sent to SmartEvent. Aside from providing comprehensive threat reporting, the SandBlast agent recommends actionable information that can help in the implementation of remediation measures. Since forensic analysis happens automatically, security response teams do not need to spend hours building the information from the ground up. The SandBlast Agent enables these teams to work efficiently and address threats as they unfold. Figure 521 — SandBlast Agent Forensic Analysis _____________________ _____________________ 636 Check Point Security Engineering SandBlast Deployment SandBlast offers businesses flexibility in implementation based on individual business needs, structure and requirements. You can use a dedicated SandBlast appliance, where Threat Emulation and Threat Extraction are done in a private, secured cloud environment, or combined with SandBlast Cloud. Check Point SandBlast Zero-Day Protection can be deployed as: • Public Cloud Service — SandBlast Cloud • Private Cloud — SandBlast Appliance • Hybrid Solution – SandBlast Appliance and Cloud Public Cloud Service In the SandBlast Cloud or Public Cloud Service, OS-level sandboxing and CPU-level detection are done in a public cloud infrastructure (SandBlast Cloud), which is owned and operated by Check Point with data centers distributed globally. There is no need to install new hardware onsite. SandBlast can be up and running within minutes. It is possible to choose to which public cloud location the files should be sent for detection. If this is not in accordance to your company regulations, the private cloud solution can be used. However, this means that you will need to have a dedicated appliance on premise and the files will not leave the company for checking. Changing the cloud location can be done via the tecli command. P r i va te C l o u d In the Private Cloud solution, OS-level sandboxing and CPU-level detection are done in the Check Point SandBlast appliance and deployed in a private cloud – inside the customer’s network. The SandBlast appliance option is best for organizations that have a policy against sending a file outside the corporate network. A SandBlast appliance has Antivirus, Anti-Bot, Threat Extraction, and Threat Emulation blades; however, it is highly recommended to use it solely for OS-level sandboxing and CPU-level detection. _____________________ _____________________ 637 Check Point Security Engineering H y b r i d S ol u t i o n ( S a n d B l as t A p p l i a n c e a n d C l o u d ) In a hybrid solution, OS-level sandboxing and CPU-level detection work together in both private and public cloud infrastructures. Administrators can choose which files to emulate locally in the SandBlast appliance or in the public SandBlast Cloud. This setup is ideal for companies with a distributed architecture, in which most of their employees work in a regional or global headquarters environment, while others work from various satellite offices. With a hybrid solution, the organization can deploy a SandBlast appliance at its headquarters, and support satellite offices using the SandBlast Cloud. In a hybrid solution, the Threat Prevention tasks are distributed as follows: • Check Point Security Gateways perform traditional Next Generation Threat Prevention duties (Anti-Bot, Antivirus, and Anti-Spam) and also act as an MTA to hold emails. • Threat Extraction can happen either at the Security Gateway or SandBlast appliance. • Threat Emulation with OS-level sandboxing and CPU-level detection happens either with SandBlast appliance or SandBlast Cloud. A distributed architecture is an efficient way to utilize the Check Point SandBlast solution. However, it comes with the challenge of provisioning and managing multiple MTAs. Check Point User Center can help customers with these complex security architectures. _____________________ _____________________ 638 Check Point Security Engineering SandBlast Mobile SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloudbased algorithms. Once a threat is detected, it triggers an automatic response to keep mobile devices and data safe. SandBlast Mobile can analyze behavior across several attack vectors, namely: • OS-Level Exploits — These are exploits that target mobile operating systems. SandBlast Mobile examines the device for any signs of weaknesses, such as vulnerable versions of Open SSL (for Android) or CA certificate, proxy, or VPN configuration (for Apple). • Mobile Application Malware — This is malicious codes hidden in mobile applications. • Network Attacks — These are attacks on network connections. SandBlast Mobile detects Man in the Middle (MiTM) attacks on public Wi-Fi hotspots by validating the integrity of an SSL connection. It also verifies connection security by using a cloudbased honeypot that detects if a malicious actor uses an MiTM attack to break a connection. • SMS Phishing — Also known as Smishing, this attack vector uses Short Message Service (SMS) systems to send text messages with malicious links to coax mobile device users into divulging personal information such as passwords, social security numbers, and credit card details. The SandBlast Mobile solution can detect SMS phishing scams by scanning incoming SMS messages for malicious URLs. Aside from securing these vectors, SandBlast Mobile employs its own dynamic cloud-based sandbox to examine and reveal the vulnerabilities and exploits hiding in mobile applications. It also whitelists trustworthy applications that show behaviors typically associated with mobile threats. To whitelist these applications, it correlates risk analysis data with aggregated factors such as application developer reputation, the number of downloads, and application source. This allows end users to download the applications they need without intervention from their company’s security team. SandBlast Mobile is capable of advanced code analysis by automatically capturing and reverse-engineering applications to expose code and deconstruct flows for semantic analysis. This helps identify suspicious patterns and behaviors. SandBlast Mobile also determines risk scores for devices, which are regularly updated once new findings are uncovered. This continuous analysis provides organizations an up-to-date and accurate picture of mobile threats in their network, as well as detailed information about what is being done to mitigate those risks. _____________________ _____________________ 639 Check Point Security Engineering SandBlast Mobile Components SandBlast Mobile has four dedicated components that constantly work together to protect mobile devices and their data. The constant communication between these components ensures that you are informed of any suspicious activities and threats occurring in the device. The components are: • • • • SandBlast Mobile Protect Application Behavioral Risk Engine SandBlast Mobile Dashboard SandBlast Mobile Gateway Figure 522 — SandBlast Mobile Components The SandBlast Mobile Protect Application SandBlast Mobile Protect is a lightweight mobile application that gathers data and helps analyze threats to the mobile device. The application monitors the mobile operating system, application information, and network connections. It also provides data to the mobile Threat Prevention solution, which is used to identify suspicious or malicious behavior. The application examines critical risk indicators found in the data it collects. It does not collect or examine sensitive data such as content or files. _____________________ _____________________ 640 Check Point Security Engineering To minimize use of device resources and bandwidth, SandBlast Mobile Protect performs some of its analyses on the device, while resource-intensive analyses are performed in the cloud. Figure 523 — SandBlast Mobile Protect Application The Behavioral Risk Engine The cloud-based Behavioral Risk Engine (BRE) receives information sent by the SandBlast Mobile Protect application, which includes the device’s network, configuration, operating system integrity, and metadata related to the installed applications. It harnesses this data to perform an in-depth mobile threat analysis. This analysis helps detect and monitor possible dubious activities on the device. The BRE generates a risk score based on threat type and severity. The risk score determines if and what mitigation is needed to keep the device and its data protected. Once a threat is identified, it triggers the SandBlast Mobile Protect application to notify the end user of the risk level and possible mitigating actions. _____________________ _____________________ 641 Check Point Security Engineering The SandBlast Mobile Dashboard The cloud-based SandBlast Mobile dashboard helps you manage and monitor devices and policies. It is configured as a per-customer instance. This dashboard can be integrated with an existing Mobile Device Management/Enterprise Mobility Management solution for automated policy enforcement on at-risk devices. When integrated, the Mobile Device Management/Enterprise Mobility Management serves as a repository on which the dashboard synchronizes enrolled devices and identities. Using the dashboard, you can register new devices using personal information such as a user’s name, email address, and phone number. The personal information is processed by the dashboard and may also be stored in the dashboard. Figure 524 — SandBlast Mobile Dashboard The SandBlast Mobile Gateway The cloud-based SandBlast Mobile gateway is a multi-tenant architecture to which mobile devices are registered. It handles all solution communications with enrolled mobile devices. The gateway also stores data elements, such as the unique identifier of the registered device and application certificates that may be viewable per customer instance from the organization’s dashboard. Personal information is not processed by or stored in the gateway. _____________________ _____________________ 642 Check Point Security Engineering S a n d B l a s t M o b i l e Wo rk fl ow The SandBlast Mobile Threat Prevention solution and its components protect mobile devices from advanced mobile malware, spyware, viruses, and other threats. Below is a detailed workflow of how the components work together. Figure 525 — SandBlast Mobile Components Workflow 1. 2. 3. 4. 5. 6. 7. 8. 9. The SandBlast Mobile Protect application detects changes in applications or network connections with possible MiTM vulnerability. SandBlast Mobile Protect sends encrypted artifacts to the SandBlast Mobile gateway using SSL. The gateway receives data from the device. The gateway process application list is compared to known Application Risk Assessment based on application_id. The gateway aggregates application artifacts for identification and analysis. It retrieves the copy of the application online or from the device if not available online. The BRE initiates the analysis to identify the risk type and assess severity of the risk. The BRE assigns a risk score to the specific application_id. Analysis results and application metadata are stored in the BRE database. The BRE sends out a risk score and application_id to the gateway. The gateway evaluates risk, score, and application_id. If malicious, it sends a warning to the SandBlast Mobile Dashboard. The dashboard sends an alert to SandBlast Mobile Protect. The dashboard also alerts the company’s Mobile Device Management/Enterprise Mobility Management, so long as they are configured to do so. _____________________ _____________________ 643 Check Point Security Engineering L a b 7. 4 Deploying Threat Emulation and Threat Extraction _____________________ _____________________ 644 Deploying Threat Emulation and Threat Extraction L A B 7.4 Sometimes it’s a good idea to inspect files for viruses before sending them to external users, such as partners, to verify that the files pose no threats. Upload files to the Check Point ThreatCloud for inspection. Then, to handle threats entering the network, configure your Security Gateway to perform Threat Emulation functions to identify and stop zero-day attacks. Ta sks : • Use ThreatCloud to verify file safety. • Configure Threat Emulation to inspect incoming traffic. Pe r for ma n c e Ob j ec t ive s: • Upload a file for Threat detection and emulation. • Configure Threat Emulation. _____________________ _____________________ 645 Check Point Security Engineering Use ThreatCloud to Verify File Safety Upload a file to the ThreatCloud Emulation Service to confirm it is safe to send. 1. From the A-Host virtual machine, locate the following file on the desktop: Safe.pdf 2. Launch a Web browser and navigate to the following site: https://www.checkpoint.com/threat-prevention-resources/ Figure 526 — Check Point ThreatCloud Emulation Service - Login Page 3. Click the icon for the following page: Emulate A File For Malicious Behavior _____________________ _____________________ 646 Check Point Security Engineering 4. In the Username and Password fields, enter your User Center account login information. NOTE If you have not already created a User Center account, do so now. Visit www.checkpoint.com. Next, select Support/Services and click Enter Support Center. Click the Sign Up Now button and enter the requested information. Your user center account should always be created with your work email address. 5. Click the Go icon. NOTE The Upload page may not be visible from all versions of all browser. If you do not see this page, attempt these steps with an updated Internet Explorer or Chrome browser. 6. 7. 8. 9. 10. 11. Click the Choose File button, and the system displays the following window. Browse to the Safe.pdf file. Select Safe.pdf, and click Open. The system adds the selected file to the Selected File field. Click the Upload & Test button, and the system uploads the file to ThreatCloud to be evaluated. Once the file has been evaluated, the system displays the Results page. Close the Browser window. _____________________ _____________________ 647 Check Point Security Engineering Configure Threat Emulation to Inspect Incoming Traffic Configure the Security Gateway Cluster to send incoming files for review to the Check Point ThreatCloud. In SmartConsole, edit the Security Gateway Cluster object. 2. In the Network Security tab, select Threat Emulation. The system displays the Threat Emulation First Time Activation wizard: 1. Figure 527 — Threat Emulation First Time Activation - Emulation Location 3. Verify that the following option is selected: ThreatCloud Emulation Service _____________________ _____________________ 648 Check Point Security Engineering 4. Click Next, and the system displays the following: Figure 528 — Threat Emulation First Time Activation - Compatibility NOTE If the system displays an error and the next button is grayed out, this may be the result of an expired IPS contract. If this happens, it will not negatively affect the lab. Select the option to Ignore the error and continue. Then click Next. 5. Verify that you have Internet connectivity by launching a browser on A-GUI, and navigating to the following site: www.CheckPoint.com _____________________ _____________________ 649 Check Point Security Engineering 6. Click Next, and the system displays the following: Figure 529 — Threat Emulation First Time Activation - Summary _____________________ _____________________ 650 Check Point Security Engineering 7. Click Finish, and the system shows that Threat Emulation is now configured on the Security Gateway object: Figure 530 — Check Point Gateway - General Properties Configured 8. Click OK. _____________________ _____________________ 651 Check Point Security Engineering Since you have modified the configuration of the Security Gateway Cluster object, publish and install the Security Policy. 10. In the Security Policies tab, select the Threat Prevention > Policy: 9. Figure 531 — Threat Prevention Policy Rule Base _____________________ _____________________ 652 Check Point Security Engineering 11. Edit the Optimized profile. Figure 532 — Optimized Profile _____________________ _____________________ 653 Check Point Security Engineering 12. In the navigation pane, select Threat Emulation Settings: Figure 533 — Threat Emulation Settings 13. Verify that the following Protected Scope option is selected: Inspect incoming files from External and DMZ interfaces _____________________ _____________________ 654 Check Point Security Engineering 14. In the navigation pane, expand the Threat Emulation Settings branch. 15. Select Emulation Environment, and the system displays the following: Figure 534 — Emulation Environment 16. In the Analysis Location section of the page, select Specify > Check Point ThreatCloud. _____________________ _____________________ 655 Check Point Security Engineering 17. In the navigation pane, select Advanced: Figure 535 — Advanced 18. Verify that the Emulation Connection Handling Mode selected is as follows: Background - connections are allowed until emulation handling is complete 19. Click OK to save the new profile. Figure 536 — SmartConsole _____________________ _____________________ 656 Check Point Security Engineering 20. Verify that the Threat Emulation icon appears in the Internal Network Figure 537 — Threat Prevention Policy Rule Base Configured _____________________ _____________________ 657 Check Point Security Engineering 21. Install the Threat Prevention policy: Figure 538 — Threat Prevention Policy Installation 22. Click Close. END OF LAB 7.4 _____________________ _____________________ 658 Check Point Security Engineering Review Questions 1. How does SandBlast Threat Emulation and Threat Extraction prevent threats like zero-day attacks and APT? 2. How does IPS complement the Firewall Software Blade when it comes to preventing threats? _____________________ _____________________ 659 Check Point Security Engineering Questions and Answers A P P E N D I X A End of chapter review questions are answered in this Appendix. _____________________ _____________________ 660 Check Point Security Engineering Chapter 1 S y s te m M a n a g e m e n t 1. What is CPUSE and what is it used for? CPUSE is Check Point’s Update Service Engine. It is used to support the deployment of single hotfixes, hotfix accumulators, and major version upgrades. 2. Name at least three Stateful features provided with the Connection table. Streaming based applications, such as Web security Sequence verification and translation Hide NAT Logging, accounting, and monitoring Client and server identification Data connections _____________________ _____________________ 661 Check Point Security Engineering Chapter 2 Autom a t i o n a nd O rc h e s t r a t i o n 1. What are the four command sources which allow you to communicate with the management server using management API? The four command sources which allow you to communicate with the management server using management API are: The SmartConsole GUI The mgmt_cli tool Gaia CLI Web Services 2. What does the sid command string identify? The sid command string identifies the session unique identifier. _____________________ _____________________ 662 Check Point Security Engineering Chapter 3 Red u n d a nc y 1. What happens when the Sticky Decision Function (SDF) is enabled? A connection is sticky when all of its packets are handled, in either direction, by a single cluster member. The SDF enables certain services to operate in a Load Sharing deployment. VPN deployments with 3rd party VPN peers and Endpoint Connect/SSL Network Extender encrypted connections are both supported when SDF is enabled. 2. Describe what a cluster VMAC is and how it works. Cluster Virtual MAC (VMAC) is a virtual MAC address assigned to a Virtual Router. It is a variation of the High Availability New mode and Load Sharing Unicast mode. Configuring the cluster to use VMAC mode allows all cluster members to use the same Virtual MAC address and minimizes possible traffic outages during a failover. In addition, G-ARPs for NAT’d addresses are no longer needed. _____________________ _____________________ 663 Check Point Security Engineering Chapter 4 Ac c e l e r a t i o n 1. Describe the three paths of traffic flow for SecureXL. Firewall path — Packets and connections that are inspected by the Firewall. These packets and connections are not processed by SecureXL. Accelerated path — Packets and connections that are offloaded from the Firewall to SecureXL. These packets and connections are quickly processed. Medium path — Packets that cannot use the accelerated path because they require deeper inspection. Although it is not necessary for the Firewall to inspect these packets, they can be offloaded by another feature. For example, packets that are examined by IPS cannot use the accelerated path and can be offloaded to the IPS Passive Streaming Library (PSL), which provides stream reassembly for TCP connections. As a result, SecureXL processes these packets quicker than packets on the slow path. 2. How does CoreXL improve network performance? CoreXL acts as a load balancer and improves Security Gateway performance in situations where much of the traffic cannot be accelerated by SecureXL or when the gateway has many IPS features enabled, which disables SecureXL functionality. It also improves performance for gateways with a large Rule Base and/or NAT rules. 3. When should you consider using Multi-Queue? Check Point recommends configuring Multi-Queue when the following conditions are presented: The CPU load for SND is high (idle is < 20%). The CPU load for CoreXL Firewall instances is low (idle is > 50%). There are no CPU cores left to be assigned to the SND by changing interface affinity. _____________________ _____________________ 664 Check Point Security Engineering Chapter 5 S m a r t E ven t 1. What are the main components of the SmartEvent Architecture? Check Point Security Gateway Log server Correlation unit SmartEvent server Events database SmartEvent client 2. Explain how SmartEvent identifies an event. SmartEvent retrieves logs from Log servers and searches for patterns. The Correlation Unit scans logs for criteria that match an event definition. SmartEvent uses the following procedures to identify events: • Match a log against global exclusions • Match a log against each event definition • Create an event candidate 3. How would a System Administrator reduce the number of false positives? To eliminate false positives, change the thresholds and other criteria of an event. For example, increase the number of connections, logs, or failures and/or the period of time for them to occur. _____________________ _____________________ 665 Check Point Security Engineering Chapter 6 Rem o te a n d M o b i l e Ac c e s s 1. What is the difference between an SSL VPN and an IPSec VPN? In the SSL VPN solution, users can connect securely to business web-based applications through a web portal, which can be accessed using a web browser. This solution does not require users to install a VPN agent or client and can be configured to enforce two-factor authentication. IPSec, Layer 3 VPN requires remote workers to install a VPN client before gaining access to corporate resources. Once a user installs the client, the Layer 3 VPN provides a secured connection to both web-based and native business applications. 2. How do Capsule Docs and Capsule Workspace work together? As business documents are edited and viewed on personal devices using Capsule Workspace, Capsule Docs protects business data and documents no matter where it is transmitted. _____________________ _____________________ 666 Check Point Security Engineering Chapter 7 T h r e a t P r eve n t i o n 1. How does SandBlast Threat Emulation and Threat Extraction prevent threats like zero-day attacks and APT? To prevent these threats, Threat Emulation performs CPU-level inspection of incoming files to look for signs of exploit methods. It runs the inspection in a sandbox environment, away from the organization’s network. If files exhibit malicious routines, Threat Emulation deletes them promptly. While Threat Emulation performs the inspection, Threat Extraction provides a clean, sanitized version of the file. This is to avoid any disruption to the company's daily operations. 2. How does IPS complement the Firewall Software Blade when it comes to preventing threats? While Firewall blocks network traffic based on source, destination, and port information, IPS analyzes its contents. This is to prevent threats such as drive by download, which are known to hide malicious codes behind hijacked, legitimate websites. _____________________ _____________________ 667