Uploaded by Vinay Kumar

Checkpoint

advertisement
Checkpoint Firewall
R80.x
Firewall: - A firewall is a network security device that monitors incoming and
outgoing network traffic and permits or blocks data packets based on a set of
security rules.
Firewall Types: -
Architecture: -Checkpoint firewall has 3 tier
architecture which consist of (Checkpoint Components)
a. Smart Management Server
b. Smart gateway
c. Smart Console
Objects (network/ groups/profiles etc) /policies (nat
/security policy etc.)/config are created by smart
console, saved on Smart management and enforced by
Smart gateway
All 3 components communicate using SIC (Secure
Internal Communication) in between, SIC uses aes-128
ssl encryption
Reste SIC on gateway
#cpconfig
Choose option number 5
Checkpoint Firewall
R80.x
Deployment: Standalone- Smart management server and gateway
on same box
Smart Mgmt+gateway
Console
Internet
Distributed-Smart management server and gateway on
different boxes
switch
Gateway
Smart Mgmt
Firewall: - A firewall is a network security device that monitors incoming and
outgoing network traffic and decides whether to allow or block specific traffic based
on a defined set of security rules.
Packet Flow: Anti-Spoofing- Anti-Spoofing detects if a packet with an IP address that is behind a
certain interface, arrives from a different interface. For example, if a packet from an
external network has an internal IP address, Anti-Spoofing blocks that packet.
Checkpoint Firewall
R80.x
Sam Database: - SAM is a utility integrated in SmartView Monitor. It blocks activities
that you see in the SmartView Monitor results and that appear to be suspicious. For
example, you can block a user who tries several times to gain unauthorized access
to a network or internet resource.
A Security Gateway with SAM enabled has Firewall rules to block suspicious
connections that are not restricted by the security policy. These rules are applied
immediately (policy installation is not required).
1. Relative: next 2hours/ 8 hours/ next day/ next week
2. Absolute: 01/01/2022-01/10/2022
3. Never – part of relative/ blocked forever
How to identify attack/suspicious activity
1. Reactive: after attack/ TCP SYN
2. Proactive: we use some tools to collect logs, like SIEM etc.
Session Lookup: - firewall will check whether connection is first or existing session
1. First path: - new connection/ no session on fw/ policy lookup will happen
2. Fast path: - existing session/ no -policy lookup
Policy Lookup: - There are 2 types of policy on checkpoint firewall
1. Implied: -created by system and can’t be modified, by default logging is disabled for
all implicit
2. Explicit: -crated by admin, can be modified
a. Management policy
b. Stealth rule or policy
c. Access policy
d. Cleanup Rule
Checkpoint Firewall
R80.x
Destination Nat
Route Lookup
Source Nat
Layer 7 Inspection
Threat Prevention
VPN encryption
Routing
Checkpoint Firewall
R80.x
Consider these points when configuring VRF in your network:










A switch/router with VRF-lite is shared by multiple customers, and all customers have their own
routing tables.
Because customers use different VRF tables, the same IP addresses can be reused. Overlapped IP
addresses are allowed in different VPNs.
VRF-lite lets multiple customers share the same physical link between the PE and the CE. Trunk
ports with multiple VLANs separate packets among customers. All customers have their own
VLANs.
VRF-lite does not support all MPLS-VRF functionality: label exchange, LDP adjacency, or
labeled packets.
For the PE router, there is no difference between using VRF-lite or using multiple CEs. multiple
virtual Layer 3 interfaces are connected to the VRF-lite device.
The Catalyst 4500 series switch supports configuring VRF by using physical ports, VLAN SVIs,
or a combination of both. The SVIs can be connected through an access port or a trunk port.
A customer can use multiple VLANs as long as they do not overlap with those of other customers.
A customer’s VLANs are mapped to a specific routing table ID that is used to identify the
appropriate routing tables stored on the switch.
The Layer 3 TCAM resource is shared between all VRFs. To ensure that any one VRF has
sufficient CAM space, use the maximum routes command.
A Catalyst 4500 series switch using VRF can support one global network and up to 64 VRFs. The
total number of routes supported is limited by the size of the TCAM.
Most routing protocols (BGP, OSPF, EIGRP, RIP and static routing) can be used between the
CE and the PE. However, we recommend using external BGP (EBGP) for these reasons:
 – BGP does not require multiple algorithms to communicate with multiple CEs.
 – BGP is designed for passing routing information between systems run by different
administrations.




 – BGP makes it easy to pass attributes of the routes to the CE.
VRF-lite does not support IGRP and ISIS.
VRF-lite does not affect the packet switching rate.
Multicast cannot be configured on the same Layer 3 interface at the same time.
The capability vrf-lite subcommand under router ospf should be used when configuring OSPF as
the routing protocol between the PE and the CE.
Checkpoint Firewall
R80.x
run
MPLS VPN Configuration
1. Run ospf 65000 between PE1-P-PE-2(PE-1 loopback To PE-2 loopback
should be reachable)
2. Enable MPLS LDP between PE-1 to P to PE-2
1.
2.
3.
4.
PE-1 create VRF, RD, RT and advertise Interface
Run IGP (eigrp) between PE to CE
3. Redistribute IGP into BGP and BGP into IGP(that is running on CE)
Enable (activate MP-BGP) between PE-1 To PE-2
All IP addressing already done
CustA-1
interface Loopback0
ip address 1.1.1.1 255.255.255.255
interface FastEthernet1/0
ip address 10.10.10.1 255.255.255.0
router eigrp 100
no auto-summary
network 1.1.1.1 0.0.0.0
network 10.10.10.0 0.0.0.255
CustA-2
interface FastEthernet1/0
ip address 30.30.30.1 255.255.255.0
interface Loopback0
ip address 3.3.3.3 255.255.255.255
router eigrp 100
no auto-summary
network 3.3.3.3 0.0.0.0
network 30.30.30.0 0.0.0.255
Checkpoint Firewall
R80.x
CustB-1
interface Loopback0
ip address 2.2.2.2 255.255.255.255
interface FastEthernet2/0
ip address 20.20.20.1 255.255.255.0
router eigrp 200
network 2.2.2.2 0.0.0.0
network 20.20.20.0 0.0.0.255
no auto-summary
CustB-2
interface Loopback0
ip address 4.4.4.4 255.255.255.255
interface FastEthernet2/1
ip address 40.40.40.1 255.255.255.0
router eigrp 200
network 4.4.4.4 0.0.0.0
network 40.40.40.0 0.0.0.255
no auto-summary
PE-1
interface FastEthernet0/0
ip address 12.12.12.1 255.255.255.0
router ospf 65000
network 12.12.12.0 0.0.0.255 area 0
ip vrf CustA
rd 65000:1
route-target both 65000:1
exit
Checkpoint Firewall
R80.x
ip vrf CustB
rd 65000:2
route-target both 65000:2
int fa1/0
ip vrf forwarding CustA
ip address 10.10.10.2 255.255.255.0
no shut
int fa2/0
ip vrf forwarding CustB
ip address 20.20.20.2 255.255.255.0
no shut
mpls label range 100 199
int fa0/0
mpls ip
router eigrp 65000
address-family ipv4 vrf CustA
autonomous-system 100
network 10.10.10.0 0.0.0.255
address-family ipv4 vrf CustB
autonomous-system 200
network 20.20.20.0 0.0.0.255
router bgp 65000
no bgp default ipv4-unicast
address-family ipv4 vrf CustA
Checkpoint Firewall
R80.x
redistribute eigrp 100
address-family ipv4 vrf CustB
redistribute eigrp 200
router eigrp 65000
address-family ipv4 vrf CustA
redistribute bgp 65000 metric 100000
10 255 1 1500
exit
address-family ipv4 vrf CustB
redistribute bgp 65000 metric 100000
10 255 1 1500
exit
P
interface FastEthernet0/0
ip address 12.12.12.2 255.255.255.0
interface FastEthernet1/1
ip address 23.23.23.1 255.255.255.0
router ospf 65000
network 12.12.12.0 0.0.0.255 area 0
network 23.23.23.0 0.0.0.255 area 0
mpls label range 200 299
int fa0/0
mpls ip
int fa1/1
mpls ip
Checkpoint Firewall
R80.x
PE-2
interface FastEthernet1/1
ip address 23.23.23.2 255.255.255.0
router ospf 65000
network 23.23.23.0 0.0.0.255 area 0
mpls label range 300 399
int fastEthernet 1/1
mpls ip
ip vrf CustA
rd 65000:3
route-target both 65000:1
ip vrf CustB
rd 65000:4
route-target both 65000:2
interface fastEthernet 1/0
ip vrf forwarding CustA
ip add 30.30.30.2 255.255.255.0
no shut
int fa2/1
ip vrf forwarding CustB
ip address 40.40.40.2 255.255.255.0
no shut
Checkpoint Firewall
R80.x
router eigrp 65000
address-family ipv4 vrf CustA
autonomous-system 100
network 30.30.30.0 0.0.0.255
address-family ipv4 vrf CustB
no auto-summary
network 40.40.40.0 0.0.0.255
router bgp 65000
no bgp default ipv4-unicast
address-family ipv4 vrf CustA
redistribute eigrp 100
address-family ipv4 vrf CustB
redistribute eigrp 200
router eigrp 65000
address-family ipv4 vrf CustA
redistribute bgp 65000 metric 100000
10 255 1 1500
exit
address-family ipv4 vrf CustB
redistribute bgp 65000 metric 100000
10 255 1 1500
configure bgp neighboiur
now enable MP-BGP
on PE1
router bgp 65000
neighbor 7.7.7.7 remote-as 65000
neighbor 7.7.7.7 update-source
loopback 0
Checkpoint Firewall
R80.x
neighbor 7.7.7.7 activate
neighbor 7.7.7.7 send-community
PE-2
router bgp 65000
neighbor 5.5.5.5 remote-as 65000
neighbor 5.5.5.5 update-source
loopback 0
address-family vpnv4 unicast
neighbor 5.5.5.5 activate
neighbor 5.5.5.5 send-community
Download