Checkpoint UTM-1 Admin Guide
Checkpoint UTM-1 Admin Guide
Administration Guide
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying,
distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written
authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or
omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer
Software clause at DFARS 252.227-7013 and FAR 52.227-19.
TRADEMARKS:
©2003–2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point
Express CI, the Check Point logo, Check Point Pointsec Protector, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card,
Cooperative Enforcement, Cooperative Security Alliance, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter,
Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity,
Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec,
Pointsec Mobile, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform,
SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express,
SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM,
SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network
Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge,
VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM,
VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm
Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd.
or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered
trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611,
6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.
For third party notices, see: THIRD PARTY TRADEMARKS AND COPYRIGHTS.
Contents
Chapter 1 Introduction
Introduction to UTM-1 ..................................................................................... 36
Overview of Menu Features ............................................................................... 37
Information ..................................................................................................... 38
Welcome.................................................................................................... 38
Appliance Status ........................................................................................ 38
Network .......................................................................................................... 39
Connections ............................................................................................... 39
Routing...................................................................................................... 39
DNS .......................................................................................................... 39
Domain...................................................................................................... 39
Hosts......................................................................................................... 40
Appliance ....................................................................................................... 41
Date and Time............................................................................................ 41
Backup and Restore .................................................................................... 41
Upgrade..................................................................................................... 42
Image Management..................................................................................... 43
Maintenance .............................................................................................. 44
Web Server................................................................................................. 44
Appliance Administration............................................................................. 44
Web and SSH Clients .................................................................................. 45
Administrator Security................................................................................. 45
Product Configuration ...................................................................................... 46
Download SmartConsole .............................................................................. 46
Launch SmartPortal .................................................................................... 46
Administrator ............................................................................................. 46
GUI Clients ................................................................................................ 46
Licenses .................................................................................................... 46
Certificate Authority .................................................................................... 47
Products .................................................................................................... 47
Table of Contents 5
Overview of Image Management ................................................................... 51
Creating a New Image ...................................................................................... 53
Deleting an Image....................................................................................... 53
Reverting to a Saved Image.......................................................................... 53
Restoring the Factory Defaults ..................................................................... 54
Backup and Restore......................................................................................... 57
Overview of Backup and Restore................................................................... 57
Performing a Manual Backup ....................................................................... 58
Scheduling a Backup .................................................................................. 59
Restoring a Backed Up Configuration............................................................ 60
Chapter 4 Authentication
The Need for Authentication ............................................................................. 82
UTM-1 Solution for Authentication .................................................................... 83
Introduction to UTM-1 Authentication .......................................................... 83
Choosing an Authentication Method.............................................................. 84
Authentication Schemes.............................................................................. 84
Authentication Methods............................................................................... 87
Configuring Authentication ............................................................................... 97
Creating Users and Groups........................................................................... 97
Configuring User Authentication................................................................... 99
Configuring Session Authentication ............................................................ 100
Configuring Client Authentication ............................................................... 104
Configuring Authentication Tracking ........................................................... 109
6
Configuring a UTM-1 Gateway to use RADIUS ............................................. 110
Granting User Access Based on RADIUS Server Groups ................................ 111
Associating a RADIUS Server with a UTM-1 Gateway.................................... 113
Configuring a UTM-1 Gateway to use SecurID.............................................. 113
Configuring a UTM-1 Gateway to use TACACS+ ........................................... 114
Groups of Windows users ........................................................................... 115
Chapter 6 SmartDefense
Need for Active Defense ................................................................................. 158
The SmartDefense Solution for an Active Defense ............................................. 160
Introduction to SmartDefense .................................................................... 160
Application Intelligence-Defending Against the Next Generation of Threats..... 161
Network and Transport Layers: Necessary for Application Intelligence ............ 162
SmartDefense Services .............................................................................. 162
How SmartDefense Works .......................................................................... 164
Table of Contents 7
Categorizing SmartDefense Capabilities ...................................................... 164
The SmartDefense Tree Structure ............................................................... 166
SmartDefense Profiles .................................................................................... 173
Profile Cloning.......................................................................................... 173
Logging.................................................................................................... 174
Configuring SmartDefense .............................................................................. 175
Updating SmartDefense with the Latest Defenses ........................................ 175
Staying Vigilant ........................................................................................ 175
SmartDefense Services................................................................................... 176
Download Updates .................................................................................... 176
Advisories ................................................................................................ 177
Security Best Practices.............................................................................. 178
Configuring SmartDefense Profiles .................................................................. 179
Creating Profiles ....................................................................................... 179
Assign a Profile to the Gateway .................................................................. 179
View Protected Gateways by a Profile .......................................................... 180
SmartDefense StormCenter Module ................................................................. 181
The Need for Cooperation in Intrusion Detection .......................................... 181
Check Point Solution for Storm Center Integration ....................................... 182
Planning Considerations ............................................................................ 186
Configuring Storm Center Integration .......................................................... 187
8
Web Intelligence Security and Usability ........................................................... 216
Web Server Focused Security ..................................................................... 216
Enforcement Granularity ............................................................................ 216
Configuration Flexibility............................................................................. 217
Variable Security Levels............................................................................. 218
Monitor-Only Mode ................................................................................... 218
Customizable Error Page............................................................................ 219
Web Content Protections ................................................................................ 221
Understanding HTTP Sessions, Connections and URLs...................................... 222
HTTP Request Example............................................................................. 222
HTTP Response Example ........................................................................... 223
HTTP Connections .................................................................................... 223
Understanding URLs ................................................................................. 224
Connectivity Versus Security Considerations ..................................................... 225
Monitor-Only Mode ................................................................................... 225
Protection for Specific Servers ................................................................... 225
Variable Security Levels............................................................................. 225
Connectivity Implications of Specific Protections ......................................... 225
Web Security Performance Considerations ........................................................ 227
Protections Implemented in the Kernel Vs. Security Server ........................... 227
Protections with a Higher Performance Overhead ......................................... 228
Adjusting the Number of Allowed Concurrent HTTP Connections ................... 228
Backward Compatibility Options for HTTP Protocol Inspection ........................... 229
Web Intelligence License Enforcement............................................................. 230
Table of Contents 9
Troubleshooting ........................................................................................ 256
Network Topology .......................................................................................... 257
Managing Users in SmartDashboard ................................................................ 259
User Management Requirements ................................................................ 259
The Check Point User Management Solution ............................................... 259
Users Database......................................................................................... 260
User and Administrator Types .................................................................... 261
Configuring User Objects ........................................................................... 261
Working with Policies ..................................................................................... 266
Overview .................................................................................................. 266
Installing a Policy Package ........................................................................ 266
Uninstalling a Policy Package .................................................................... 268
Installing the User Database ...................................................................... 268
Chapter 11 SmartMap
Overview of SmartMap.................................................................................... 288
The SmartMap Solution............................................................................. 288
Working with SmartMap ................................................................................. 289
Enabling and Viewing SmartMap ................................................................ 289
Adjusting and Customizing SmartMap......................................................... 290
Working with Network Objects and Groups in SmartMap ............................... 292
Working with SmartMap Objects................................................................. 295
Working with Folders in SmartMap ............................................................. 297
Integrating SmartMap and the Rule Base ......................................................... 300
Displaying a Legend for Regular and/or NAT Rules ....................................... 300
Troubleshooting SmartMap ............................................................................. 303
For What Objects Are Topology Calculations Made? ...................................... 303
Calculating Topology Information ............................................................... 303
What is SmartMap Helper? ........................................................................ 304
Troubleshooting Duplicated Networks ......................................................... 304
Troubleshooting Unresolved Object Interfaces.............................................. 304
What Objects Can Be Defined as Protected Objects? .................................... 304
10
Defining Protected Objects as Groups ......................................................... 305
Working with SmartMap Output....................................................................... 306
Table of Contents 11
Version Control Operations......................................................................... 346
Version Upgrade ....................................................................................... 347
Version Diagnostics ................................................................................... 348
Backup and Restore .................................................................................. 348
SmartCenter Management Configuration .......................................................... 349
Manual versus Automatic Version Creation .................................................. 349
Chapter 14 SmartPortal
Overview ....................................................................................................... 351
Deploying SmartPortal on a Dedicated Server ................................................... 352
Deploying SmartPortal on the SmartCenter Server ............................................. 353
SmartPortal Configuration and Commands ....................................................... 354
SmartPortal Commands ............................................................................. 354
Limiting Access to Specific IP Addresses .................................................... 354
SmartPortal Configuration.......................................................................... 355
Connecting to SmartPortal .............................................................................. 356
Troubleshooting ............................................................................................. 356
Chapter 15 SmartUpdate
The Need for Software Upgrade and License Management ................................. 360
The SmartUpdate Solution.............................................................................. 361
Introducing SmartUpdate .......................................................................... 361
Understanding SmartUpdate...................................................................... 362
SmartUpdate - Seeing it for the First Time .................................................. 363
Common Operations.................................................................................. 365
Upgrading Packages....................................................................................... 367
Overview of Upgrading Packages ................................................................ 367
The Upgrade Package Process.................................................................... 368
Other Upgrade Operations ......................................................................... 373
Managing Licenses ........................................................................................ 375
Overview of License Management ............................................................... 375
Licensing Terminology............................................................................... 376
License Upgrade....................................................................................... 378
The License Attachment Process ................................................................ 379
Other License Operations........................................................................... 382
Generating CPInfo ......................................................................................... 384
The SmartUpdate Command Line.................................................................... 385
12
Check Point Objects.................................................................................. 394
Nodes...................................................................................................... 397
Interoperable Device ................................................................................. 397
Networks.................................................................................................. 397
Domains .................................................................................................. 398
Open Security Extension (OSE) Devices ...................................................... 398
Groups..................................................................................................... 402
Logical Servers ......................................................................................... 403
Address Ranges ........................................................................................ 404
Dynamic Objects....................................................................................... 404
VoIP Domains........................................................................................... 405
Chapter 19 Introduction to
Site to Site VPN
The Need for Virtual Private Networks .............................................................. 416
Confidentiality .......................................................................................... 416
Authentication.......................................................................................... 416
Integrity ................................................................................................... 416
The Check Point Solution for VPN ................................................................... 417
How it Works ............................................................................................ 417
VPN Communities..................................................................................... 419
VPN Topologies ........................................................................................ 420
Authentication Between Community Members ............................................. 425
Dynamically Assigned IP Gateways ............................................................. 426
Routing Traffic within a VPN Community..................................................... 427
Access Control and VPN Communities ........................................................ 428
Excluded Services..................................................................................... 429
Special Considerations for Planning a VPN Topology ......................................... 430
Configuring Site to Site VPNs.......................................................................... 431
Migrating from Traditional mode to Simplified mode .................................... 431
Configuring a Meshed Community Between Internally Managed Gateways ...... 432
Configuring a Star VPN Community ............................................................ 433
Confirming a VPN Tunnel Successfully Opens.............................................. 434
Configuring a VPN with External Gateways Using PKI ........................................ 435
Configuring a VPN with External Gateways Using a Pre-Shared Secret................. 439
How to Authorize Firewall Control Connections in VPN Communities................... 442
Why Turning off FireWall Implied Rules Blocks Control Connections .............. 442
Allowing Firewall Control Connections Inside a VPN ..................................... 443
Table of Contents 13
Discovering Which Services are Used for Control Connections ....................... 443
14
IP Address Lease duration ......................................................................... 482
Using name resolution - WINS and DNS...................................................... 482
Anti Spoofing ........................................................................................... 483
Using Office Mode with multiple external interfaces ..................................... 483
Office Mode Per Site ................................................................................. 484
Enabling IP Address per User.......................................................................... 486
The Problem............................................................................................. 486
The Solution............................................................................................. 486
Office Mode Considerations ............................................................................ 489
IP pool Versus DHCP................................................................................. 489
Routing Table Modifications ...................................................................... 489
Using the Multiple External Interfaces Feature............................................. 489
Configuring Office Mode ................................................................................. 490
Office Mode — IP Pool Configuration.......................................................... 490
Configuring IP Assignment Based on Source IP Address ............................... 493
Office Mode via ipassignment.conf File ....................................................... 494
Subnet masks and Office Mode Addresses................................................... 494
Checking the Syntax.................................................................................. 495
Office Mode — DHCP Configuration ........................................................... 496
Office Mode - Using a RADIUS Server......................................................... 497
Office Mode Configuration on SecureClient.................................................. 499
Office Mode per Site ................................................................................. 499
Chapter 22 SecuRemote/SecureClient
The Need for SecureClient .............................................................................. 502
The Check Point Solution ............................................................................... 503
How it works............................................................................................. 503
SCV Granularity for VPN Communities ............................................................. 504
Blocking Unverified SCV Connections .............................................................. 505
Selective Routing........................................................................................... 506
Desktop Security Policy .................................................................................. 509
When is a Policy Downloaded? ................................................................... 509
Policy Expiration and Renewal ................................................................... 509
Prepackaged Policy ................................................................................... 509
Policy Server High Availability .................................................................... 509
Wireless Hot Spot/Hotel Registration........................................................... 510
Enable Logging.............................................................................................. 511
NAT Traversal Tunneling ................................................................................ 512
Switching Modes ........................................................................................... 513
HTML Based Help ......................................................................................... 514
Configuring SecureClient ................................................................................ 515
Configuring SCV Granularity for VPN Communities ....................................... 515
Configuring block_scv_client_connections ................................................... 515
Configuring Selective Routing .................................................................... 516
Configuring Desktop Security Policy Expiration Time .................................... 517
Configuring Hot Spot/Hotel Registration ...................................................... 518
Configuring Enable Logging ....................................................................... 519
Configuring NAT Traversal ......................................................................... 520
Table of Contents 15
Enable/Disable Switching Modes ..................................................................... 522
Add HTML Help to Package ............................................................................ 523
16
Index........................................................................................................... 597
Table of Contents 17
18
Preface
Preface P
Who Should Use This Guide page 20
Summary of Contents page 21
More Information page 24
Feedback page 25
19
Who Should Use This Guide
20
Summary of Contents
Summary of Contents
This guide describes the firewall and SmartDefense, VPN and SmartCenter server
components of UTM-1. It contains the following sections and chapters:
Chapter Description
Chapter 1, “Introduction” Describes how to set up a security policy to fit
organizational requirements.
Chapter 2, “Image Describes the VPN-1 authentication schemes
Management and (for username and password management) and
Backup/Restore” authentication methods (how users
authenticate).
Chapter 3, “Access Control” Describes the Network Address Translation (NAT)
process, which involves replacing one IP address
with another. NAT can change both the source
and destination address of the packet. It is used
for both security and administrative purposes.
Chapter 4, “Authentication” Describes the ISP Redundancy feature, which
assures reliable Internet connectivity by allowing
a single or clustered VPN-1 gateway to connect
to the Internet via redundant Internet Service
Provider (ISP) links.
Chapter 5, “Network Address Describes the ConnectControl server load
Translation (NAT)” balancing solution, which distributes network
traffic among a number of servers and thereby
reduces the load on a single machine, improves
network response time and ensures high
availability.
Chapter 6, “SmartDefense” Describes the SmartDefense component, which
actively defends your network, even when the
protection is not explicitly defined in the
Security Rule Base. SmartDefense unobtrusively
analyzes activity across your network, tracking
potentially threatening events and optionally
sending notifications. It protects your
organization from all known (and most unknown)
network attacks using intelligent security
technology.
Preface 21
Summary of Contents
Chapter Description
Chapter 7, “Anti Virus Information detailing the Anti Virus technology.
Protection” Anti Virus protection is available for the HTTP,
FTP, SMTP and POP3 protocols. Options for
each protocol can be centrally configured.
Chapter 8, “Web Understanding Web Intelligence, which allows
Intelligence” customers to configure, enforce and update
attack protections for web servers and
applications, against known and unknown
attacks.
Chapter 9, “SmartCenter Includes an overview of usage, and describes the
Overview” terminology and procedures that will help you
manage UTM-1.
Chapter 10, “Policy Describes how to facilitate the administration
Management” and management of the Security Policy by the
system administrator.
Chapter 11, “SmartMap” Describes how a visual representation of your
network is used to facilitate and enhance the
understanding of the physical deployment and
organization of your network.
Chapter 12, “SmartView Provides information about how to collect
Tracker” comprehensive information on your network
activity in the form of logs and descibes how you
can then audit these logs at any given time,
analyze your traffic patterns and troubleshoot
networking and security issues.
Chapter 13, “SmartCenter Explains the use of SmartCenter tools to make
Management” changes in the production environment securely,
smoothly and efficiently. This chapter includes
information on Revision control(SmartCenter can
manage multiple versions of policies) and
Backup & Restore (when it is imperative that the
SmartCenter Server be upgraded, it is possible to
create a functioning SmartCenter Server which
will replace the existing machine while it is
being serviced).
Chapter 14, “SmartPortal” Includes an explanation about web based
administration and troubleshooting of the UTM-1
SmartCenter Server.
22
Summary of Contents
Chapter Description
Chapter 15, “SmartUpdate” Explains the use of SmartUpdate is an optional
module for VPN-1 that automatically distributes
software applications and updates for Check
Point and OPSEC Certified products, and
manages product licenses. This chapter shows
how SmartUpdate provides a centralized means
to guarantee that Internet security throughout
the enterprise network is always up to date. It
shows how SmartUpdate turns time-consuming
tasks that could otherwise be performed only by
experts into simple point and click operations.
Chapter 16, “Frequently Provides frequently asked questions about
Asked Questions” network objects management and policy
management.
Chapter 17, “Network Provides an in-depth explanation of network
Objects” objects and how manage and configure them.
Chapter 18, “Overview of Provides an overview of Check Point’s solution
VPN” for VPN.
Chapter 19, “Introduction to An introduction to the basics of VPN’s between
Site to Site VPN” Gateways and VPN communities.
Chapter 20, “Introduction to Introduction to VPN connections between
Remote Access VPN” gateways and remote users.
Chapter 21, “Office Mode” Office Mode enables a VPN-1 Power Gateway to
assign a remote client an IP address.
Chapter 22, SecuRemote/SecureClient is a method that
“SecuRemote/SecureClient” allows you to connect to your organization in a
secure manner, while at the same time
protecting your machine from attacks that
originate on the Internet.
Chapter 23, “SSL Network Contains an introduction of the SSL Network
Extender” Extender and the advantages it has for remote
access clients.
Chapter 24, “Resolving Provides information of some of the challenges
Connectivity Issues” remote access clients face when connecting and
various Check Point solutions.
Preface 23
More Information
More Information
• For additional technical information regarding Check Point products, refer to
Check Point’s SecureKnowledge at https://secureknowledge.checkpoint.com/.
• To view the latest version of this document in the Check Point User Center, go
to: http://www.checkpoint.com/support/technical/documents.
24
Feedback
Feedback
Check Point is engaged in a continuous effort to improve its documentation. Please
help us by sending your comments to:
cp_techpub_feedback@checkpoint.com
Preface 25
Feedback
26
Feedback
Preface 27
Feedback
28
Feedback
Preface 29
Feedback
30
Feedback
31
Feedback
32
Feedback
Preface 33
Feedback
34
Chapter 1
Introduction
In This Chapter
35
Introduction to UTM-1
Introduction to UTM-1
Thank you for using UTM-1. UTM-1 provides comprehensive enterprise-class
security for medium sized organizations (organizations with up to 500 users). It
includes SmartCenter management for a specified number of sites, VPN-1 UTM
gateways protecting a specified number of users, SmartDefense and VPN-1
SecuRemote for users.
UTM-1 appliances offer uncompromising levels of security, while streamlining
deployment and administration. UTM-1 appliances offer a complete set of security
features including firewall, intrusion prevention, antivirus, anti-spyware, Web
application firewall, VoIP security, instant messaging (IM) and peer-to-peer (P2P)
blocking, Web Filtering, as well as secure site-to-site and remote access
connectivity.
UTM-1 is supported by SmartDefense™ Services, which maintain the most current
preemptive security for the Check Point security infrastructure. To help you stay
ahead of emerging threats and attacks, SmartDefense Services provide real-time
updates and configuration advisories for defenses and security policies.
36
Overview of Menu Features
Table 1-1
Menu Item Description
Information Displays various device information
such as hostname, version and build,
and installation type.
Network Configure the network settings.
Appliance Local appliance settings including
image management, backup/restore
settings and configuring
administrators.
Product Configuration Establish Secure Internal
Communication (SIC), add a license
and download SmartConsole
applications.
To configure the appliance using the First Time Wizard, see the Getting Started
Guide. The Getting Started Guide is also available here:
http://www.checkpoint.com/downloads/latest/utm/index.html
Advanced configuration is available using the Command Line Interface. For more
information, see the Command Line Interface NGX R62 Administration Guide
available on the CD provided with the appliance.
Chapter 1 Introduction 37
Information
Information
Welcome
The Welcome page offers an introduction to the various sections of the WebGUI.
Appliance Status
This page provides a summary of the appliance information and disk information
such as hostname, version and build and license status.
Figure 1-1 Appliance Status page
38
Network
Network
Connections
This page enables you to create, configure, and edit the properties of network
connections. To update the view, click the Refresh button.
Figure 1-2 Network Connections page
Routing
This page enables you to manage the routing table on your device. You can add a
static or default route, or delete them.
DNS
In the DNS page, you can define up to three DNS servers. A DNS server translates
domain names into IP addresses.
Domain
The Host and Domain Name page enables you to configure a hostname, a domain
name, and select a primary interface from the drop-down box. The hostname will be
associated with the IP of this interface.
Chapter 1 Introduction 39
Network
Hosts
This page enables you to configure the host's local resolving configuration. Once a
host is created, it cannot be edited. To make a change, the host must be deleted
and recreated.
Note - The Host entry for the local machine is automatically generated, based on the
Domain configuration information.
40
Appliance
Appliance
Date and Time
This page allows you to define the current date and time, as well as setting the
time zone. The date must be in the format: dd-Mon-yyyy (e.g. 31-Dec-2003). The
time should be: HH:mm (e.g. 23:30).
Alternatively, Network Time Protocol (NTP) can be used to synchronize clocks of
computers on the network.
Chapter 1 Introduction 41
Appliance
Upgrade
In this page, upgrade UTM-1. Before the upgrade begins, an image is automatically
created to preserve all the current configuration settings.
Upgrades are available from the Check Point Download Center:
http://www.checkpoint.com/downloads/latest/utm/index.html
42
Appliance
Image Management
In the Image Management page, a list of saved images are displayed. The image is a
snapshot of the entire system and configuration settings. The image does not include
logs. These images can be used to restore a machine back to the settings configured in
the image.
Figure 1-5 Image Management page
Chapter 1 Introduction 43
Appliance
Maintenance
This page provides diagnostics information about all the processes that are running
on the machine. For each Process, the User, PID, Parent PID, %CPU, % Memory
and Command are displayed.
You can use the Product commands drop-down list to Start, Restart, or Stop all of
the Check Point products. In addition, you can Shutdown the device, Reboot it, or
download a diagnostic file (cpinfo output) useful for support.
Figure 1-6 Appliance Maintenance page
Web Server
In this window, you can configure the listening IP and port for the Administration
Web server.
Appliance Administration
This page allows you to add and delete SecurePlatform Device Administrators,
allows you to create or delete a SecurePlatform Device Administrator.
In the Password recovery login token section, you can download a One Time Login
Token that can be used in the event a password is forgotten. It is highly
recommended to save and store the password recovery login token file in a safe
place.
44
Appliance
Note - The Password recovery login token can only be used one time. It is recommended
that you download and store another login token.
Administrator Security
In the Administrator Security page, you can configure the Administrator Security
parameters. The Administrator Session Timeout determines how long a session has
to be idle before the session is automatically terminated.
Administrator Login Restrictions will lock an admin account after the configured
amount of failed attempts.
Chapter 1 Introduction 45
Product Configuration
Product Configuration
Download SmartConsole
SmartConsole applications are required to configure and install a security policy.
On this page, you can download the necessary files to install SmartConsole
applications.
Launch SmartPortal
SmartPortal is an advanced management solution which extends browser-based
access to SmartCenter. It allows security administrators to extend, at their
discretion, security-policy access to other groups, thereby increasing security
visibility within the organization. SmartPortal users can view security policies,
network status, object properties and logs.
Administrator
The SmartCenter Administrators page lists the configured Administrators. If no
Administrator has been configured, it enables you to add a SmartCenter
Administrator. This SmartCenter Administrator will have Read/Write Permissions to
SmartCenter and will be allowed to manage the SmartCenter gateway objects and
Administrator accounts.
Only one administrator can be added to this list. In order to add more
administrators the user must use SmartDashboard.
GUI Clients
The SmartCenter GUI Clients page specifies the remote computers from which
administrators will be allowed to connect to the SmartCenter Server. It lists the
type, hostname/IP address and netmask of the configured GUI Clients, and enables
you to add additional GUI Clients or remove them.
Licenses
The Licenses page lists the licenses for the products that you have installed. There
is a 15 day trial period during which you can use all Check Point products.
46
Product Configuration
Certificate Authority
The Certificate Authority page lists key parameters of the SmartCenter Certificate
Authority.
Products
This page enables you to check (via the table), which products and versions are
already installed on the machine.
Chapter 1 Introduction 47
Product Configuration
48
Chapter 2
Image Management and
Backup/Restore
In This Chapter
Overview page 50
Image Management page 51
Backup and Restore page 57
49
Overview
Overview
Keeping duplicates of system configurations and files represents an organizations
protection against loss, damage or unavailability of data held on information
systems.
This chapter describes the role of image management and the backup and restore
process in preventing data loss.
50
Image Management
Image Management
In This Section
Warning - Restoring factory defaults deletes all information on the appliance including
images, backup files, and logs.
52
Creating a New Image
Deleting an Image
To delete an image:
1. Click Appliance > Image Management. The Image Management page opens.
2. Select the image and click Remove.
2. Select an image and click Revert. The Revert To Image page opens
Warning - Restoring factory defaults all information on the appliance including images,
backup files, and logs.
54
Creating a New Image
2. Click Apply.
To restore the factory defaults using the Hyperterminal console:
1. Using the supplied serial console cable from the RJ45 port, connect UTM-1 to
a hyperterminal machine. In the Port Settings window, the setting for the Serial
console is 9600 8N1 (9600 BPS, 8 bits, no parity, 1 stop bit). From the Flow
control drop-down list, select Hardware.
2. Configure the hyperterminal parameters.
3. In Hyperterminal, select Call > Call to connect to the appliance.
4. Power on UTM-1.
When this text appears, you have approximately four seconds to hit any key to
bring up the boot grub menu. Once the boot grub menu appears, you have
approximately ten seconds to hit any key or the machine continues to boot.
6. Scroll down the boot menu to highlight Reset to factory defaults.
7. Press Enter to reset the appliance settings.
56
Backup and Restore
Scheduled Backups
The Scheduling pane displays the following information pertaining to scheduled
backups:
• Status: The scheduled backup is enabled or disabled.
• Backup to: The backup destination, which can be one of the following: the
desktop computer, locally (on the appliance), a TFTP Server or an SCP
Server,
• Start at: The time to start the backup.
• Recur every: The frequency at which to perform the backup.
• File Name: The name of the backup file.
2. In the Backup system configuration files page, enter a name for the backup file
in the Backup File Name field.
58
Backup and Restore
Scheduling a Backup
Backups can be performed according to configurable schedule.
To schedule a backup:
1. Click Appliance > Backup and Restore > Backup > Scheduled Backup.
4. Select a device to hold the backup. The options include the appliance, a TFTP
Server, or an SCP Server.
Note - Trivial File Transfer Protocol is a version of the TCP/IP FTP protocol that
has no directory or password capability. SCP is Secure Copy Protocol.
5. Click Apply.
2. On the Restore system configuration files page, select the full path to the
location where the file you want to restore is located.
3. Click Apply.
60
Chapter 3
Access Control
In This Chapter
61
The Need for Access Control
62
Solution for Secure Access Control
UTM-1 provides secure access control through its granular understanding of all
underlying services and applications traveling on the network. Stateful Inspection
technology provides full application-layer awareness, and comprehensive access
control for more than 150 pre-defined applications, services and protocols as well
as the ability to specify and define custom services.
Stateful Inspection extracts state-related information required for security decisions
from all application layers and maintains this information in dynamic state tables
for evaluating subsequent connection attempts. For complete technical information
about Stateful Inspection, see the Check Point Tech. Note at
http://www.checkpoint.com/products/downloads/firewall-1_statefulinspection.pdf
64
Solution for Secure Access Control
Source and The source and destination is with respect to the originator of the connection.
Destination For applications that work in the client server model, the source is the client.
Once the connection is accepted, packets in the connection are allowed in
both directions.
Source and destination can also be negated. You may for example find it
convenient to specify that the source is NOT in a given network.
VPN Configure whether the rule applies to any connection, either encrypted or
clear, or only to VPN connections. To limit this rule to VPN connections,
right-click and select Replace... .
Service The service column allows predefined applications to be specified. It is also
possible to define new services.
Action A packet can either be Accepted, Rejected, or Dropped. The other possible
Actions relate to authentication (see Chapter 4, “Authentication” on
page 109). If a connection is Rejected, the firewall sends a RST packet to
the originating end of the connection and the connection is closed. If a
packet is Dropped then no response is sent and the connection will eventually
time out.
Track Various logging options are available. See the SmartCenter administration
guide.
Install-On Specifies the UTM-1 Gateways on which the rule is to be installed. There may
be no need to enforce a particular rule at every UTM-1 Gateway. For example,
a rule may allow certain network services to cross one particular gateway. If
these services are not to be allowed to networks behind other UTM-1
Gateways, the rule need not be installed on other gateways. For further
information, see the SmartCenter administration guide.
Time Specify the days and time of day at which this rule should be enforced.
Implied Rules
The Security Policy is made up of rules. Apart from the rules defined by the
administrator, UTM-1 also creates Implied Rules, which are derived from the Policy
Global Properties. Implied rules are defined by UTM-1 to allow certain connections
to and from the firewall with a variety of different services. Examples of two
important implied rules are ones that enable
• UTM-1 Control Connections
• Outgoing Packets originating from the UTM-1 Gateway
There are also implied rules for other possible connection scenarios.
UTM-1 creates a group of implied rules from the Policy Global Properties, that it
places first, last, or before last in the Security Rule Base defined by the
administrator. Implied rules can be logged. The rules are therefore processed in the
following order:
1. Implied Rules defined as first. If an implied rule is first, the implied rule cannot
be modified or overwritten in the Security Rule Base, because the first rule that
matches is always applied to packet, and no rules can be placed before it.
2. Explicit, administrator-defined rules 1 through n-1 in the Rule Base (assuming
n rules).
3. Implied Rules listed as Before Last. Setting a property to Before Last makes it
possible to define more detailed rules that will be enforced before this property.
4. Last explicitly defined rule (Rule n).
5. Implied Rules listed as Last. If a property is Last, it is enforced after the last rule
in the Security Rule Base, which usually rejects all packets, and it will typically
have no effect.
66
Solution for Secure Access Control
Preventing IP Spoofing
Spoofing is a technique where an intruder attempts to gain unauthorized access by
altering a packet's IP address to make it appear as though the packet originated in
a part of the network with higher access privileges. It is important to make sure
that the communication does in fact originate from the apparent source.
Anti-spoofing verifies that packets are coming from, and going to, the correct
interfaces on the gateway. It confirms that packets claiming to be from an internal
network are actually coming from the internal network interface. It also verifies
that, once a packet is routed, it is going through the proper interface.
A packet coming from an external interface, even if it has a spoofed internal IP
address, will be blocked because the UTM-1 anti-spoofing feature detects that the
packet arrived from the wrong interface.
Figure 3-12 illustrates what anti-spoofing does.
On Alaska_GW, UTM-1 checks that
• All incoming packets to interface IF1 come from the Internet.
• All incoming packets to interface IF2 come from Alaska_LAN or
Alaska_RND_LAN or Florida_LAN.
On Alaska_RND_GW, UTM-1 checks that:
• All incoming packets to interface IF3 come from Alaska_LAN or Florida_LAN or
the Internet.
• All incoming packets to interface IF4 come from Alaska_RND_LAN.
When configuring anti-spoofing, you also need to specify (in the interface topology
definitions) whether the interfaces lead to the Internet, in which case they must be
defined as External, or whether they lead to an internal network, in which case they
are defined as Internal. Figure 3-12 illustrates whether the gateway interfaces are
Internal or External.
68
Solution for Secure Access Control
Introduction to Multicast IP
Multicast is used to transmit a single message to a select group of recipients. A
typical use of multicast is to distribute real time audio and video to a set of hosts
which have joined a distributed conference.
Multicast is much like radio or TV where only those who have tuned their receivers
to a selected frequency receive the information. In Multicast you hear the channel
you are interested in, but not the others.
IP Multicasting applications send one copy of each datagram (IP packet) and
address it to a group of computers that want to receive it. This technique addresses
datagrams to a group of receivers (at the multicast address) rather than to a single
receiver (at a unicast address). The routers in the network forward the datagrams to
only those routers and hosts that need to receive them.
The Internet Engineering Task Force (IETF) has developed standards to support
multicast communications. These standards define
• Multicast Routing Protocols
• Dynamic registration
• IP Multicast Group Addressing
70
Solution for Secure Access Control
VPN connections
Multicast traffic can be encrypted and sent across VPN links that are defined using
multiple VPN tunnel interfaces (virtual interfaces associated with the same physical
interface).
72
Considerations for Access Control
Spoof Protection
If you don’t protect your network against address spoofing, all your carefully crafted
access control rules will be ineffective. It is easy enough for a malicious user to
attempt to gain access by changing the source address of the packet. Make sure
you configure anti-spoofing protection on every interface of the UTM-1 Gateway,
including internal interfaces. For configuration details, see “Configuring
Anti-Spoofing” on page 77.
Simplicity
The key to a secure firewall is a simple Rule Base. The biggest danger to the
security of your organization can be simple misconfiguration. Why should a
malicious user try to sneak spoofed, fragmented packets past your firewall when
you have accidentally allowed unrestricted messaging protocols? To keep your Rule
Base simple, keep it short. The more rules you have, the more likely you will make
a mistake. The fewer rules your Rule Base has, the easier it is to understand and
maintain.
Basic Rules
Be careful to allow only the traffic that you want. Consider both traffic crossing the
firewall that is initiated on the unprotected side of the firewall, and traffic initiated
on the protected side of the firewall.
The following basic Access Control rules are recommended in every Security Rule
Base:
• A Stealth Rule to prevent any direct access to the UTM-1 Gateway.
• A Cleanup Rule to drop all traffic that is not permitted by the previous rules.
There is an implied rule that does this, but the Cleanup Rule allows you to log
any access attempts.
Remember the fundamental concept of a Rule Base: “That which is not explicitly
permitted is prohibited”.
Rule Order
Rule order is critical. Having the same rules, but placing them in a different order,
can radically alter how your firewall works. It is therefore best to place the more
specific rules first, the more general rules last. This prevents a general rule being
matched before a more specific rule, and protects your firewall from
misconfigurations.
74
Considerations for Access Control
76
Configuring Access Control
Configuring Anti-Spoofing
Make sure you configure anti-spoofing protection on every interface of every UTM-1
Gateway, including internal interfaces. This basic configuration example shows how
to set up anti-spoofing parameters on an external interface and the internal
interface.
78
Configuring Access Control
1. In the Gateway General Properties page, ensure the Gateway version is correctly
specified. A per-interface multicast policy can be defined for Gateways of
version R60 or higher.
2. In the Topology page, edit an interface.
3. In the Interface Properties window, Multicast Restrictions tab (Figure 3-17),
check Drop Multicast packets by the following conditions.
Figure 3-17 Interface Properties window, Multicast Restrictions tab
4. Define either a restrictive or a permissive multicast policy for the interface. You
can either
• Drop multicast packets whose destination is in the list, or
• Drop all multicast packets except those whose destination is in the list
5. Click New to add a multicast address range. In the Multicast Address Range
Properties window, define either an IP address Range or a Single IP Address that
are in the range 224.0.0.0 to 239.255.255.255.
6. In the Security Rule Base, add a rule to allow the required multicast groups. In
the Destination of the rule specify the multicast groups defined in step 5.
7. Save and install the Security Policy.
80
Chapter 4
Authentication
In This Chapter
81
The Need for Authentication
82
UTM-1 Solution for Authentication
Chapter 4 Authentication 83
UTM-1 Solution for Authentication
Authentication Schemes
Authentication Schemes employ usernames and passwords to identify users. Some
of these schemes are maintained locally, storing the usernames and passwords on
the UTM-1 enforcement module. Others store the user database externally, and
authentication requests are directed to an external authentication server. Some
schemes, such as SecurID, are based on a one-time password. All the schemes can
be used with users defined on an LDAP server. For information on configuring
UTM-1 to integrate LDAP, see SmartDirectory (LDAP) and User Management in the
SmartCenter book.
84
UTM-1 Solution for Authentication
OS Password
UTM-1 can use the user and password information that is stored in the operating
system of the machine on which UTM-1 is installed. It is also possible to use
passwords that are stored in a Windows domain. No additional software is needed.
RADIUS
Originally developed by Livingston Enterprises (now part of Lucent Technologies) in
1992, Remote Authentication Dial-In User Service (RADIUS) is an external
authentication scheme that provides security and scalability by separating the
authentication function from the access server. RADIUS was submitted to the
Internet Engineering Task Force (IETF) as a proposed standard protocol in 1996.
RFC 2865 is the latest update to the proposed standard, and can be found at URL:
www.ietf.org/rfc/rfc2865.txt.
When employing RADIUS as an authentication scheme, UTM-1 forwards
authentication requests by remote users to the RADIUS server. The RADIUS server,
which stores user account information, authenticates the users.
The RADIUS protocol uses UDP for communications with the gateway. RADIUS
Servers and RADIUS Server Group objects are defined in SmartDashboard. For
more on configuring RADIUS, see “Configuring a UTM-1 Gateway to use RADIUS”
on page 110.
SecurID
Developed by RSA Security, SecurID requires users to both possess a token
authenticator and to supply a PIN or password. Token authenticators generate
one-time passwords that are synchronized to an RSA ACE/Server, and may come in
the form of hardware or software. Hardware tokens are key-ring or credit card-sized
devices, while software tokens reside on the PC or device from which the user
wants to authenticate. All tokens generate a random, one-time-use access code that
changes every minute or so. When a user attempts to authenticate to a protected
resource, that one-time-use code must be validated by the ACE/Server.
When employing SecurID as an authentication scheme, UTM-1 forwards
authentication requests by remote users to the ACE/Server. ACE manages the
database of RSA users and their assigned hard or soft tokens. The UTM-1
enforcement module acts as an ACE/Agent 5.0, which means that it directs all
access requests to the RSA ACE/Server for authentication. For agent configuration
see ACE/Server documentation.
Chapter 4 Authentication 85
UTM-1 Solution for Authentication
TACACS
Terminal Access Controller Access Control System (TACACS) provides access
control for routers, network access servers and other networked devices via one or
more centralized servers. TACACS was originally developed by the U.S. Department
of Defense and BBN Planet Corp. and then further developed by Cisco. A newer
version of the protocol called TACACS+ provides enhancements to the original
protocol, including the use of TCP instead of UDP.
TACACS is an external authentication scheme that provides verification services.
When employing TACACS as an authentication scheme, UTM-1 forwards
authentication requests by remote users to the TACACS server. The TACACS server,
which stores user account information, authenticates users. The system supports
physical card key devices or token cards, and supports Kerberos secret-key
authentication. TACACS encrypts the username, password, authentication services
and accounting information of all authentication requests for more secure
communications.
For information on configuring TACACS see “Configuring a UTM-1 Gateway to use
TACACS+” on page 114.
Undefined
The authentication scheme for a user can be specified as undefined. If a user with
an undefined authentication scheme is matched to a Security Rule with some form
of authentication, he or she is always denied access.
86
UTM-1 Solution for Authentication
Authentication Methods
In This Section
Chapter 4 Authentication 87
UTM-1 Solution for Authentication
User Authentication
User Authentication provides authentication for the services: Telnet, FTP, HTTP,
and rlogin. By default, User Authentication is transparent. The user does not
explicitly connect to the UTM-1 Gateway, but initiates a connection directly to the
target server.
The following example demonstrates a Telnet session to 10.11.12.13, with User
Authentication and the OS Password authentication scheme (Rlogin works in
almost exactly the same way):
# telnet 10.11.12.13
Trying 10.11.12.13...
Connected to 10.11.12.13.
Escape character is ‘^]’.
Check Point FireWall-1 authenticated Telnet server running on
tower
User: fbloggs
FireWall-1 password: *******
User fbloggs authenticated by FireWall-1 authentication
Connected to 10.11.12.13
...
...
login:
Note - When configuring user objects, you can set the locations that they are allowed to
access. This can lead to conflicts with security rules that require a form of authentication.
See “Resolving Access Conflicts” on page 105 for more information.
88
UTM-1 Solution for Authentication
At this point you will be connected to the remote FTP server. Log in using the user
command:
ftp> user anonymous
331 Anonymous access allowed, send identity (e-mail name) as
password.
Password: fbloggs@checkpoint.com
230 Anonymous user logged in.
ftp>
Chapter 4 Authentication 89
UTM-1 Solution for Authentication
Session Authentication
Session Authentication can be used for any service, but to retrieve a user’s identity
it requires a Session Authentication agent. The Session Authentication agent is
normally installed on the authenticating client, in which case the person who
initiates the connection to the destination host supplies the authentication
credentials. Like User Authentication, it requires an authentication procedure for
each connection. However, the Session Authentication agent can also be installed
on the destination machine, or on some other machine in the network. In that case,
the person at the machine on which the Agent is installed is asked to supply the
username and password.
Figure 4-18 shows the Session Authentication login prompt. After typing his or her
username, another prompt asks the user to supply a password.
Figure 4-18 Session Authentication login prompt
90
UTM-1 Solution for Authentication
Note - When configuring user objects, you can set the locations that they are allowed to
access. This can lead to conflicts with security rules that require a form of authentication.
See “Resolving Access Conflicts” on page 105 for more information.
Client Authentication
In This Section
Note - When configuring user objects, you can set the locations that they are allowed to
access. This can lead to conflicts with security rules that require a form of authentication.
See “Resolving Access Conflicts” on page 105 for more information.
Client Authentication can be used with any one of the different sign on methods.
These sign on methods provide a choice of Authentication Methods for
authenticated and other services, as summarized in Table 4-5. For all sign on
Chapter 4 Authentication 91
UTM-1 Solution for Authentication
Manual Sign On
Manual Sign On is available for any service, as long as it is specified in the Client
Authentication rule.
In Manual Sign On, the user must first connect to the Gateway in order to
authenticate (in other words, the authentication is not transparent). The user must
authenticate in one of two ways:
1. A Telnet session to the Gateway on port 259
92
UTM-1 Solution for Authentication
2. An HTTP connection to the gateway on port 900, through a Web browser. The
requested URL must include the gateway name and the port number, such as
http://Gateway:900.
The following example shows what Client Authentication with Standard, Manual
Sign On looks like to a user. Before opening a connection to the destination host,
user fbloggs first authenticates to london, the UTM-1 Gateway:
tower 1% telnet london 259
Trying 191.23.45.67 ...
Connected to london.
Escape character is '^]'.
CheckPoint FireWall-1 Client Authentication Server running on
london
Login: fbloggs
FireWall-1 Password: ********
User authenticated by FireWall-1 auth.
Choose:
(1) Standard Sign On
(2) Sign Off
(3) Specific Sign On
Chapter 4 Authentication 93
UTM-1 Solution for Authentication
The following example shows what Client Authenticating with Specific, Manual Sign
On looks like to a user. In the example, two services are specified: rstat and
finger, each one to a different host.
tower 3% telnet london 259
Trying 191.23.45.67 ...
Connected to london.
Escape character is '^]'.
CheckPoint FireWall-1 Client Authentication Server running on
london
Login: jim
FireWall-1 Password: ********
User authenticated by Internal auth.
Choose:
(1) Standard Sign On
(2) Sign Off
(3) Specific Sign On
94
UTM-1 Solution for Authentication
Chapter 4 Authentication 95
UTM-1 Solution for Authentication
Single Sign On
Single Sign On is available for any service, as long as the required service is
specified in the Client Authentication rule. UserAuthority must be installed.
Single Sign On is the Check Point address management feature that provides
transparent network access. In this method, UTM-1 consults the user IP address
records to determine which user is logged on at a given IP address. When a
connection matches a Single Sign On enabled rule, UTM-1 queries UserAuthority
with the packet's source IP. UserAuthority returns the name of the user who is
registered to the IP. If the user's name is authenticated, the packet is accepted; if
not, it is dropped.
96
Configuring Authentication
Configuring Authentication
In This Section
Chapter 4 Authentication 97
Configuring Authentication
Creating Users
4. In the Users branch of the objects tree, right click and choose the template on
which the new user’s properties will be based. The User Properties window is
displayed.
5. Enter the data for the user. For any user, you can freely change the properties
that user inherited from the template, but they will be changed for the user
only. The template remains unchanged.
98
Configuring Authentication
Chapter 4 Authentication 99
Configuring Authentication
Table 4-7 Session User Authentication Rule for HTTP and FTP
5. Double click the Action column to edit the User Authentication Action Properties.
6. If you wish, adjust the Failed Authentication Attempts settings for Session
Authentication in the Authentication page of the Global Properties.
7. Install the Security Policy.
100
Configuring Authentication
Passwords Tab
Figure 4-20 Configuration window — Passwords tab
The Passwords tab of the Configuration window enables you to specify how
frequently the user is asked to supply a password (that is, to authenticate himself
or herself). One-time passwords (such as SecurID) cannot be cached.
Check one of the available choices:
Every request — The user will be prompted for the password each time UTM-1
requests authentication. Each time the user initiates a session to which a Session
Authentication rule applies, the user will be prompted for a password. In this case,
no password caching occurs.
Once per session — The user will be prompted for a password once per Session
Authentication agent session. In this case, the user supplies the password once and
the Session Authentication agent caches the password indefinitely. This option
cannot be used with one-time passwords. If the Session Authentication agent is
terminated and then re-started, the user will have to supply the password again.
After ... minutes of inactivity — This option is the same as Once per session, except
that the user will be prompted again for a password if there has been no
authentication request for the specified time interval.
The Allowed FireWall-1 tab of the Configuration window enables you to specify the
UTM-1 Gateways for which this Session Authentication agent may provide
authentication services.
Any IP Address — This Session Authentication agent may provide authentication
services for any UTM-1 Gateway.
IP Address — This Session Authentication agent may provide authentication
services only for a UTM-1 Gateway running on the specified IP address. You can
specify up to three IP addresses.
102
Configuring Authentication
Options Tab
Figure 4-22 Configuration window — Options tab
The Options tab of the Configuration window (Figure 4-22) enables you to specify
whether to allow clear passwords and resolve addresses.
104
Configuring Authentication
4. For Partially or fully automatic client authentication, make sure that port 80 is
accessible on the gateway machine.
5. Double click the Action column to edit the Client Authentication Action
Properties. The settings for Requires Sign On and for Sign On Method are
described in “Client Authentication” on page 91.
6. Make sure all Client Authentication Rules are placed above the Rule that
prevents direct connections to the UTM-1 Gateway (the “Stealth Rule”), so that
they have access to the UTM-1 Gateway.
7. If you wish, adjust the Failed Authentication Attempts settings for Client
Authentication in the Authentication page of the Global Properties.
8. Install the Security Policy.
Location tab of user Susan allows connections only within Mktg_net, UTM-1 does
not know whether to allow the authentication request when Susan tries to connect
to Finance_net.
You can specify how to resolve this conflict by editing the Authentication Action
Property of the rule in question. Right click on the Action field of a rule using some
form of authentication and select Edit Properties.
• If you want to apply the more restrictive access privileges specified in the rule
and in the Location tab of each user’s User Properties window, choose Intersect
with User Database.
• If you want to allow access according to the location specified in the rule,
choose Ignore User Database.
You can set this property for both the Source and Destination of the rule.
106
Configuring Authentication
4. Make sure that there is no rule that blocks the connection to the new port.
5. Restart UTM-1 (cpstart).
Not all of the parameters shown in the sample file of Figure 4-23 will necessarily
be present in your file.
For information on configuring Client Authentication, see “Configuring Client
Authentication” on page 104.
to:
900 fwssd in.ahclientd wait 900 ssl:defaultCert
Table 4-9
Source Destination Service Action
User_group@Any Internal https Client Auth
server (Partially
automatic
or Manual mode)
Note - This Rule also allows HTTPS traffic between the client and the Web server. This
traffic is allowed after a successful authentication.
108
Configuring Authentication
Note - Authentication failure tracking for Check Point firewalls prior to version NG is set by
the Authentication Failure Track property on the Authentication page of Global
Properties.
110
Configuring Authentication
112
Configuring Authentication
It is possible to switch off the RADIUS to UTM-1 association on a per user basis,
so that the user will always authenticate to the Radius server specified in the User
Properties Authentication tab. Do this by switching off another attribute in the
UTM-1 database, using the dbedit command:
modify users <user obj> use_fw_radius_if_exist false
a. On the General tab, enter the default login name for the ACE/Server. (When
configuring Match all users as an External User Profile, the name “generic*”
is automatically assigned).
b. On the Personal tab, adjust the Expiration Date.
c. On the Authentication tab, choose SecurID from the drop down list.
d. On the Groups tab, add the User Profile to the SecurID group.
7. Verify that communications between the firewall and the ACE/Server are not
NATed in the Address Translation Rule Base.
8. Save, verify, and install the policy.
When the UTM-1 Gateway has multiple interfaces, the SecurID agent in UTM-1 will
in some cases use the wrong interface IP to decrypt the reply from ACE/Server, and
authentication will fail. To overcome this problem, place a new text file named
sdopts.rec is the same directory as sdconf.rec. The file should contain the
following line
CLIENT_IP=<ip>
where <ip> is the primary IP of UTM-1, as defined on the ACE/Server. This is the
IP of the interface to which the server is routed.
114
Configuring Authentication
5. Enable TACACS authentication for UTM-1 users by choosing Manage > Users
and Administrators > New > User by Template > Default.
6. Enable TACACS authentication for users without UTM-1 user accounts by
creating an External User Profile. Choose Manage > Users and Administrators >
New > External User Profile > Match all users... or Match by domain.... If you are
supporting more than one external authentication scheme, make sure to set up
your External User Profiles with the setting Match By Domain.
7. For all User Profiles and Templates:
a. On the General tab, enter the default login name for the TACACS Server.
(When configuring Match all users as an External User Profile, the name
“generic*” is automatically assigned).
b. On the Personal tab, adjust the Expiration Date.
c. On the Authentication tab, choose TACACS from the drop down list.
d. On the Groups tab, add the User Profile to the TACACS group.
8. Verify that communications between the firewall and the TACACS Server are not
NATed in the Address Translation Rule Base.
9. Save, verify, and install the policy.
116
Chapter 5
Network Address Translation
(NAT)
In This Chapter
117
The Need to Conceal IP Addresses
118
Check Point Solution for Network Address Translation
NAT in UTM-1
Network Address Translation (NAT) involves replacing one IP address with another.
NAT can change both the source and destination address inside the packet. This
means that a packet that is sent from the internal (protected) side to the external
(unprotected) side of the firewall appears to the destination as if it came from a
different address, and packet that is sent from the external to the internal side of
the firewall will arrive at the correct address.
UTM-1 supports two kinds of NAT:
• Static NAT, where each private address is translated to a corresponding public
address. In a typical Static NAT scenario with a number of machines in an
internal network, the address of each machine is translated to a different public
IP address. It is a many-to-many translation. Static NAT allows machines on
both sides of the UTM-1 Gateway to initiate connections, so that, for example,
internal servers can be made available externally.
• Hide NAT, where a single public address is used to represent multiple
computers on the internal network with private addresses. Hide NAT is a
many-to-one translation. Hide NAT allows connections to be initiated only from
the protected side of the UTM-1 Gateway.
NAT can be performed on Check Point network objects, Nodes, Networks, Address
Ranges, and Dynamic objects.
120
Check Point Solution for Network Address Translation
NAT can be defined either automatically, via the network object, which
automatically adds rules to the Address Translation Rule Base, or manually, by
defining rules in the Address Translation Rule Base.
Manually creating NAT Rules adds extra flexibility. For example, as well as
translating IP addresses, it is possible to translate the Service, in other words the
destination port numbers. Port number translation is a type of Static NAT, in which
one port number is translated to another port number.
Static NAT
Static NAT translates each private address to a corresponding public address.
• Static NAT on a node translates the private address of the node to a public
address.
• Static NAT on a network or address range translates each IP address in the
network or range to a corresponding public IP address, starting from the
defined Static IP address.
In Figure 5-24, an address range (10.1.1.2 to 10.1.1.10) is hidden behind a NAT
range (192.168.0.2-192.168.0.11). A connection is shown originating at
10.1.1.3, and the source and destination translation for the original and reply
packet.
Figure 5-24 Static NAT on an Address Range
122
Check Point Solution for Network Address Translation
Hide NAT
With a NAT gateway, it is possible to share a single public address with multiple
computers on your intranet that have private addresses. The Internet is unaware of
the division you have created between the Internet and your intranet, and sees your
multiple computer connection as simply a single connection.
Hide NAT allows only connections that originate on the internal network. This lets
an internal host initiate a connection to both inside and outside the intranet, but a
host outside the network cannot initiate a connection to an internal host.
The Hide Address is the address behind which the internal network, address range
or node is hidden. You can choose to hide the internal address(es)
• behind a virtual IP address, which is a public (routable) IP address that does
not belong to any real machine, or
• behind the IP address of the UTM-1 interface through which the packet is
routed out (what used to be known as “Hiding behind IP address 0.0.0.0”).
In Figure 5-25, an address range (10.1.1.2 to 10.1.1.10) is hidden behind the
address of the external UTM-1 interface (192.168.0.1). A connection is shown
originating at 10.1.1.3, and the source and destination translation for the original
and reply packet.
Figure 5-25 Hide NAT on An Address Range
124
Check Point Solution for Network Address Translation
Note that regular NAT rules take precedence over NAT-for-internal-networks rules.
In other words, if a connection can match both a regular NAT rule and a
NAT-for-internal-networks rule, the connection will be matched to the regular NAT
rule.
Access Rules must still be defined in the Security Rule Base.
Note - For configuration details, see “Configuring Automatic Hide NAT for Internal
Networks” on page 140.
Each rule specifies what happens to the first packet of a connection. Reply packets
travel in the opposite direction to the original packet, but are matched to the same
rule.
The Address Translation Rule Base is divided into two sections, the Original Packet
section, and the Translated Packet section. The Original Packet section specifies
the conditions when the rule is applied. The Translated Packet section specifies the
action taken when the rule is applied.
Each section in the Address Translation Rule Base Editor is divided into Source,
Destination, and Service. The action is always the same:
• Translate Source under Original Packet, to Source under Translated Packet
• Translate Destination under Original Packet, to Destination under Translated
Packet
• Translate Service under Original Packet, to Service under Translated Packet
126
Check Point Solution for Network Address Translation
Bidirectional NAT
Bidirectional NAT applies to automatic NAT rules in the Address Translation Rule
Base, and allows two automatic NAT rules to match a connection. Without
Bidirectional NAT, only one automatic NAT rule can match a connection.
When NAT is defined for a network object, an automatic NAT rule is generated
which performs the required translation. If there are two such objects and one is
the source of a connection and the other the destination, then without Bidirectional
NAT, only one of these objects will be translated, because only one of the
automatically generated NAT rules will be applied, and so a connection between
the two objects will only be allowed in one direction. With Bidirectional NAT, both
automatic NAT rules are applied, and both objects will be translated, so
connections between the two objects will be allowed in both directions.
The detailed logic of Bidirectional NAT is as follows:
• If the first match on a connection is on a Manual NAT rule, no further checking
of NAT Rule Base is done.
• If the first match on a connection is on an Automatic NAT rule, then the rest of
the NAT Rule Base is checked, one rule at a time, to see if another Automatic
NAT Rule matches the connection. If it does, both rules are matched, and no
further checking is performed.
The operation of Bidirectional NAT can be tracked using the SmartView Tracker,
using the fields NAT Rule Number and NAT Additional Rule Number. The
“additional rule” is the rule that matches the automatic translation performed on
the second object in Bidirectional NAT.
Rule 1 says that for connections within the internal (unprotected) side of the
firewall, no NAT takes place.
Rule 2 says that for connections initiated on the internal (protected) side of the
firewall, the source address of the packets is translated to the public Hide NAT
address.
In automatic Hide NAT rules, the translated address is known as the Hiding
Address, and this is the address that is known and used on the unprotected side of
the UTM-1 Gateway. The “real” addresses are the private addresses that are used
on the protected side of the UTM-1 Gateway.
128
Check Point Solution for Network Address Translation
Rule 1 says that for connections within the internal (unprotected) side of the
firewall, no NAT takes place. A packet sent from one machine to another in the
same network is not changed.
Rule 2 says that for packets originating on the internal (protected) side of the
firewall, source addresses are translated to valid (public) static NAT addresses.
Rule 3 says that for packets originating on the external (unprotected) side of the
firewall, valid (public) destination addresses are translated to static NAT addresses.
In automatic Static NAT rules, statically translated public addresses are called Valid
Addresses, and these are the addresses that are known and used on the
unprotected side of the UTM-1 Gateway. The “real” addresses are the private
addresses that are used on the protected side of the UTM-1 Gateway.
Port Translation
Port Translation allows multiple application servers in a hidden network to be
accessed using the a single IP address, based on the requested service (destination
port). This has the benefit of saving on scarce public IP addresses. A typical
implementation could allow an FTP server (accessible via port 21), an SMTP server
(port 25) and an HTTP server (port 80) to be accessed using a single IP public
address.
To use Port Translation you need to craft manual NAT rules. Port Translation rules
are supported on UTM-1 enforcement points of version NG FP3 and higher.
Routing Issues
Static Routes on the UTM-1 Gateway
This section is intended only for administrators who have upgraded the
SmartCenter Server, where in the pre-upgrade:
• pre-NG version, automatic NAT for the server was performed on the server side,
or in the
• pre-NG FP3 version, manual NAT for the server was performed on the server
side.
In a client-server connection across the UTM-1 Gateway, connections originate at
the client, and the server sends reply packets back to the client.
In NG or higher versions, for both manual and automatic rules, NAT for the server
is performed by default on the client side of the UTM-1 Gateway (Figure 5-30).
This ensures that the Operating System routes the packets correctly.
In Figure 5-30, for the original packet, the UTM-1 Gateway translates the
destination address to the valid address of the server, and then the packet is routed
to destination.
130
Check Point Solution for Network Address Translation
For reply packets, no NAT is performed on the destination, and the OS correctly
routes the packet back to the client.
Figure 5-30 Illustrating NAT on Client side, which ensures that static routes are not
needed
The NG and higher default setting ensures reliable anti-spoofing and routing. It is
recommended to stick to the default setting unless you have upgraded your
SmartCenter Server from a pre-NG version, and you have UTM-1 enforcement
modules whose configuration requires other settings.
If NAT for the server destination is configured to be performed on the server side,
the operating system receives the packet for routing before NAT is performed. The
operating system therefore sees a valid address as the destination, and will
therefore route the packet back out to the Internet router rather than to the server.
To resolve this, configure Static Host Routes on the UTM-1 Gateway, so that it
forwards packets to the correct interface. For example:
route add 192.168.0.3 10.1.1.2
If using manual rules, you must configure proxy-arps. In other words, you must
associate the translated IP address with the MAC address of the UTM-1 Gateway
interface that is on the same network as the translated addresses.
132
Planning Considerations for NAT
134
Configuring NAT
Configuring NAT
In This Section
1. Edit the Node object for Alaska_Web, and in the NAT page, select Add
Automatic Address Translation rules (Figure 5-34).
Figure 5-34 Hide NAT configuration for a Node- NAT page
136
Configuring NAT
2. Select Translation Method Hide, and the option Hide behind the interface of the
Install on Gateway.
3. Select the Install on Gateway. The NAT Gateway in this example is Alaska_GW,
so you can select either Alaska_GW or All.
Packets originating in Alaska_Web with the Internet as their destination will have
their source address translated from 10.1.1.10 to 192.168.0.1. For example,
packets originating on the web server will have their source address changed from
172.16.10.3 to 192.168.0.1.
The web and mail servers require static translation because incoming connections
will be made to them from the Internet. Two routable addresses are available.
192.168.0.5 will be used for the Alaska.Web HTTP server, and 192.168.0.6 for
the Alaska.Mail SMTP server.
The internal clients require hide translation because they will initiate connections.
No incoming connections are allowed to them from the Internet. They will hide
behind the external interface of the UTM-1 Gateway.
1. Define network objects for Alsaka.Web (10.1.1.5), Alaska.Mail (10.1.1.6),
Alaska_LAN (10.1.1.0 with Net Mask 255.255.255.0), and the UTM-1
Gateway (Alaska.GW).
2. Edit the Alaska.Web object, and in the NAT page check Add Automatic Address
Translation Rules, select Translation Method Static, and define the Translate to IP
Address as 192.168.0.5.
3. Similarly for Alaska.Mail, select Translation Method Static, and define Translate
to IP Address as 192.168.0.6.
4. Edit the Alaska_LAN object, and in the NAT page select Translation Method
Hide, and select Hide behind the interface of the Install On Gateway. The effective
Hide address for the internal clients on Alaska_LAN is therefore 192.168.0.1.
The resulting Address Translation Rule Base is shown in Figure 5-36.
Figure 5-36 Automatic Address Translation Rule Base for Static and Hide NAT
138
Configuring NAT
1. Define network objects for the network Alaska.DMZ.LAN (172.16.0.0 with Net
Mask 255.255.0.0), the web server Alaska_DMZ_Web (172.16.1.7), and the
Mail server Alaska_DMZ_Mail (172.16.1.5), and the UTM-1 Gateway
(Alaska.GW).
2. On the Alaska.DMZ.LAN network object, in the NAT tab, select Add Automatic
Address Translation Rules, and Translation Method Hide, and select Hide behind
the interface of the Install on Gateway. This adds two automatic rules to the
Address Translation Rule Base (Rules 1 and 2 in Figure 5-38).
3. In the Address Translation Rule Base, define a Manual NAT Rule that translates
requests for the HTTP service to the Web server (Rule 3 in Figure 5-38), and a
Manual NAT Rule to translate SMTP requests to the SMTP server (Rule 4 in
Figure 5-38).
Configure automatic Hide NAT for internal networks from the NAT page of the
Check Point Gateway object. In the section Automatic Hide for Internal Networks,
either check or uncheck the option Hide all connections from internal interfaces to
external interfaces behind the gateway.
140
Advanced NAT Configuration
Network Configuration
The network shown in Figure 5-39 will be used as an example.
Figure 5-39 Example — Class C network
Both network A and network B share the same address space (192.168.1.0/24), so
standard NAT cannot be used to enable communications between network A and
network B. Instead, overlapping NAT must be performed on a per-interface basis.
Users in network A who wish to communicate with users in network B will use the
192.168.30.0/24 network as a destination. Users in network B who wish to
communicate with users in network A will use the 192.168.20.0/24 network as a
destination.
The UTM-1 enforcement module will translate the IP addresses differently on each
interface, as follows:
142
Advanced NAT Configuration
interface A
• inbound source IP addresses will be translated to virtual network
192.168.20.0/24
• outbound destination IP addresses will be translated to network
192.168.1.0/24
interface B
• inbound source IP addresses will be translated to network 192.168.30.0/24
• outbound destination IP addresses will be translated to network
192.168.1.0/24
interface C
Overlapping NAT will not be configured for this interface. Instead, use NAT Hide in
the usual way (not on a per-interface basis) to hide source addresses behind the
interface’s IP address (192.168.4.1).
Communication Example
Suppose you wish to allow communication between internal networks and between
an internal network and the Internet, as follows:
Table 5-10
step source IP address destination IP address
interface A — before NAT 192.168.1.10 192.168.30.10
interface A — after NAT 192.168.20.10 192.168.30.10
UTM-1 enforcement module enforces Security Policy for packets from network
192.168.20.0/24 to network 192.168.30.0/24.
interface B — before NAT 192.168.20.10 192.168.30.10
interface B — after NAT 192.168.20.10 192.168.1.10
Table 5-11
step source IP address destination IP address
interface A — before NAT 192.168.1.10 10.10.10.10
interface A — after NAT 192.168.20.10 10.10.10.10
UTM-1 enforcement module enforces Security Policy for packets from network
192.168.20.0/24 to the Internet.
interface C — before NAT 192.168.20.10 10.10.10.10
interface C — after NAT Hide 192.168.4.1 10.10.10.10
Routing Consideration
In order to allow routing from network A to network B, routing needs to be
configured on the firewall machine. The following examples are for Windows and
Linux. For other Operating Systems, use the equivalent commands:
On Windows
route add 192.168.30.0 mask 255.255.255.0 192.168.3.2
route add 192.168.20.0 mask 255.255.255.0 192.168.2.2
On Linux
route add -net 192.168.30.0/24 gw 192.168.3.2
route add -net 192.168.20.0/24 gw 192.168.2.2
144
Advanced NAT Configuration
Table 5-12
parameter value
enable_overlapping_nat true
overlap_nat_dst_ipaddr The overlapping IP addresses (before NAT). In
the example configuration, this would be
192.168.1.0 for both interfaces.
overlap_nat_src_ipaddr The IP addresses after NAT. In the example
configuration, this would be 192.168.20.0 for
interface A, and 192.168.30.0 for interface B.
overlap_nat_netmask The net mask of the overlapping IP addresses.
In the example, 255.255.255.0.
Note - SmartCenter Behind NAT is not supported for deployments in which SmartCenter
also acts as an enforcement module and must be addressed from outside the NATed domain
(for example, when it receives SAM commands).
146
Advanced NAT Configuration
NAT for the SmartCenter Server is enabled in the NAT page of the SmartCenter
Server object by defining NAT and selecting Apply for VPN-1 Power/UTM control
connections.
There are situations in which the module will decide to contact the SmartCenter
with an address that does not correspond to the remote module’s deployment. For
example:
• When there are enforcement modules from a version prior to NG with
Application Intelligence. In such a case, refer to SecureKnowledge solution
SK15558 at https://secureknowledge.checkpoint.com/ for further instructions.
• When the enforcement module’s automatic selection does not conform with the
routing of the module’s deployment.
In the second case, you can define the masters and loggers manually. This allows
the remote module to contact SmartCenter using the desired address. When an
inbound connection from a managed module comes in to the UTM-1 Gateway, port
mapping is used to translate from the hiding address to the real IP address of the
SmartCenter Server.
To do this select Use local definitions for Log Servers and Use local definitions for
Masters and specify the correct IPs on the enforcement module.
Such a solution encompasses two cases:
• The remote module addresses the NATed IP when you would like it to address
the real IP.
• The remote module addresses the real IP when you would like it to address the
NATed IP. In this case, specify the SIC name of the SmartCenter in the masters
file.
Note that:
• Only one object can be defined with these settings, unless the second object is
defined as a Secondary SmartCenter Server or a Log Server.
• It is important to properly define the Topology settings on all enforcement
modules. In Figure 5-40 for example, on California_GW, you must define the
Primary_SmartCenter on its internal interface.
• All managed modules, and the SmartCenter Server must be of version NG with
Application Intelligence and above.
• In previous versions, various workarounds were required. All previous
workarounds will continue to work, with no changes in behavior.
148
Advanced NAT Configuration
IP Pool NAT
An IP Pool is a range of IP addresses (an Address Range, a network or a group of
one of these objects) routable to the gateway.
IP Pool NAT ensures proper routing for encrypted connections, in two connection
scenarios:
• SecuRemote/SecureClient to MEP (Multiple Entry Point) Gateways
• Gateway to MEP Gateways
When a connection is opened from a SecuRemote/SecureClient or a client behind a
Gateway, to a server behind the MEP Gateways, the packets are routed through one
of the MEP Gateways. Return packets in the connection must be routed back
through the same Gateway in order to maintain the connection. To ensure that this
happens, each of the MEP Gateways maintains a pool of IP addresses that are
routable to the Gateway itself. When a connection is opened to a server, the
gateway substitutes an IP address from the IP Pool for the source IP address. Reply
packets from the server return to the gateway, which restores the original source IP
address and forwards the packets to the source.
The pool of IP addresses is configured in the NAT > IP Pool page of the Gateway
object. For a discussion of how IP Pool NAT is used in MEP scenarios, see
Chapter 11, “Multiple Entry Point VPNs” in the Virtual Private Networks
administration guide.
150
Advanced NAT Configuration
If a remote client makes a connection to the internal network, reply packets from
hosts inside the internal networks are routed to the correct Gateway interface
through the use of static IP pool NAT addresses.
The remote VPN client’s IP address is NATed to an address in the IP pool on one of
the Gateway interfaces. The addresses in that IP pool are routable only through that
Gateway interface, so all reply packets from the target host are returned to that
interface, and not to any other. For this reason, it is important that the IP NAT
pools of the interfaces do not overlap.
When the packet returns to the Gateway interface, the Gateway restores the remote
peer’s source IP address.
The routing tables on the routers that lie behind the Gateway must be edited so
that addresses from a Gateway IP pool are returned to the correct Gateway
interface.
Switching between IP Pool NAT per gateway and IP Pool NAT per interface and
then installing the Security Policy deletes all IP Pool allocation and all NATed
connections.
NAT Priorities
IP Pool NAT can be used both for encrypted (VPN) connections and for clear
connections that are not encrypted and decrypted by the Gateway.
Note - To allow IP Pool NAT for clear connections through the Gateway, you must configure
INSPECT changes in the user.def file. Contact Technical Support for details.
For non-encrypted connections, IP Pool NAT has the following advantages over Hide
NAT:
1. New back connections (X11, for example) can be opened to the NATed host.
2. User-to-IP mapping servers of protocols that allow one connection per IP, can
work with a number of hosts instead of one host.
3. Protocols such as IPSec, GRE and IGMP can be NATed using IP Pool NAT (and
Static NAT). Hide NAT works only with TCP, UDP and ICMP protocols.
Because of these advantages, it is possible to specify that IP Pool NAT has priority
over Hide NAT, if both match the same connection. Hide NAT is only applied if the
IP pool is used up.
The NAT priorities are:
1. Static NAT
2. IP Pool NAT
3. Hide NAT
Static NAT has all the advantages of IP Pool NAT as well as other advantages, and
so has a higher priority than the other NAT methods.
For Gateways of versions lower than NGX (R60), and for upgraded Gateways (by
default), the NAT priorities are:
1. Static NAT
2. Hide NAT
3. IP Pool NAT
152
Advanced NAT Configuration
The default “do not reuse” IP Pool behavior is that each IP address in the IP Pool
is used once (connections 1 and 2 in Figure 5-43). In this mode, if an IP pool
contains 20 addresses, up to 20 different clients can be NATed. Back connections
can be opened from any source to the client (connection 3).
Switching between “reuse” and “do not reuse” modes and then installing the
Security Policy deletes all IP Pool allocation and all NATed connections.
154
Advanced NAT Configuration
156
Chapter 6
SmartDefense
In This Chapter
157
Need for Active Defense
Since access control devices like Check Point’s UTM-1 have prevented
unauthorized traffic from passing through the gateway, hackers are now focusing
their efforts on the misuse of allowed traffic and services. Some of the most serious
threats in today's Internet environment come from attacks that attempt to exploit
the application layer. Of particular interest to hackers are services such as HTTP
(TCP port 80) and HTTPS (TCP port 443), which are commonly open in many
networks. Access control devices cannot easily detect malicious attacks aimed at
these services.
Consider the following two examples of Denial of Service (DoS) attacks. Let’s say
that you have decided to allow ICMP requests (pings) on your network. A DoS
attack may exploit this to flood your network with pings, thereby preventing other
connections. Without a defense that automatically detects and prevents this attack,
your only recourse may be to disallow pinging, certainly not an ideal solution. But
what do you do when a DoS attack exploits the protocol you use to communicate on
the Internet? That’s what happens with a SYN attack, which disrupts TCP/IP traffic
by sending SYN packets and then not acknowledging the TCP/IP server’s response
packet. This causes the server to keep signaling until it eventually times out, a very
effective attack. Certainly disabling TCP/IP is not an option.
Other solutions available, such as content security applications like virus scanners,
are important, but inadequate for this purpose. While they do inspect the content
of individual packets, content security applications are limited to specific services,
and are unable to detect patterns of malicious activity.
158
Need for Active Defense
Securing the network with the most up-to-date methods of detecting and preventing
attacks is critical for safeguarding data and communications. The only solution that
addresses these types of threats is an active, intelligent, and reliably up-to-date
defense. The following section details Check Point’s solution to the mutating nature
of attacks on the perimeter of the network.
Introduction to SmartDefense
Check Point SmartDefense provides a unified security framework for various
components that identify and prevent attacks. SmartDefense actively defends your
network, even when the protection is not explicitly defined in the Security Rule
Base. It unobtrusively analyzes activity across your network, tracking potentially
threatening events and optionally sending notifications. It protects organizations
from all known, and most unknown, network attacks using intelligent security
technology.
Keeping up-to-date with the latest defenses does not require up-to-the-minute
technical knowledge. A single click updates SmartDefense with all the latest
defenses from the SmartDefense website.
SmartDefense provides a console that can be used to:
• Choose the attacks that you wish to defend against, and read detailed
information about the attack.
• Easily configure parameters for each attack, including logging options.
• Receive real-time information on attacks, and update SmartDefense with new
capabilities.
160
The SmartDefense Solution for an Active Defense
Note - The OSI Reference Model is a framework, or guideline, for describing how data is
transmitted between devices on a network.
The Application Layer is not the actual end-user software application, but a set of services that allows
the software application to communicate via the network. Distinctions between layers 5, 6, and 7 are
not always clear, and some competing models combine these layers, as does this guide.
SmartDefense Services
SmartDefense Services maintain the most current preemptive security for the
Check Point security infrastructure. SmartDefense Services provide ongoing and
real-time updates and configuration advisories for defenses and security policies.
SmartDefense Services also add completely new defense techniques for new and
emerging protocols and applications between your regularly scheduled product
upgrades.
The SmartDefense Research Center also actively monitors and where appropriate
communicates with white-, black- and grayhat communities to identify
vulnerabilities and potential exploits before they are introduced into "the wild" (i.e.,
to the general internet community). Using this information, the SmartDefense
Research Center develops defenses and disseminates the information using relevant
components of the SmartDefense Services.
SmartDefense Services content is delivered in several different ways:
• SmartDefense Updates are automatically imported into the SmartDashboard
GUI when the Update Now button is pressed in SmartDashboard. After the
Updates are imported, defenses can be activated and configured via the
SmartDashboard.
162
The SmartDefense Solution for an Active Defense
Subscription Information
SmartDefense functionality is freely included with UTM-1. However, subscribing
customers can automatically update SmartDefense and Web Intelligence with a
single click. Customers who purchase a SmartDefense subscription service can
obtain the following updates as soon as they are released.
1. HTTP and CIFS worm patterns.
2. INSPECT file updates.
3. Dynamic Attack protection.
4. Peer to Peer HTTP Headers
Customers with a valid subscription license also receive special SmartDefense
Advisories that provide updated SmartDefense and Web Intelligence attack
protections, as well as information, tools and best practice methods to mitigate
different attacks.
Note - SmartDefense is integrated with Check Point gateways of version NG FP2 and
higher. Previous versions do not receive the SmartDefense configurations. It is
recommended to keep your gateway version up-to-date, as the newest defenses are
incorporated into only the latest version of Check Point software.
Advisories
SmartDefense Advisories are detailed descriptions and step-by-step instructions on
how to activate and configure relevant defenses provided by Check Point products
and SmartDefense Updates. The SmartDefense Advisories are available to
SmartDefense Service subscribers.
164
The SmartDefense Solution for an Active Defense
Note - When updating SmartDefense, new categories, as well as attack defenses, may be
added to the tree structure.
General
This page allows you to easily update SmartDefense with the latest information on
new and emerging attacks (provided you participate in the subscription program).
Network Security
These pages allow you to configure various SmartDefense protections against
attacks on the network and transport level. The effect of such attacks, on the IP,
TCP, UDP or ICMP network protocols, range from simple identification of the
operating systems used in your organization, to denial of service attacks on hosts
and servers on the network.
166
The SmartDefense Solution for an Active Defense
Denial of Service
Denial of Service (DoS) attacks are aimed at overwhelming the target with spurious
data to the point where it is no longer able to respond to legitimate service
requests. The attacks in this section exploit operating system bugs to remotely
crash machines.
For more information, see the SmartDefense HTML pages and online help.
IP and ICMP
This page allows you to enable a comprehensive sequence of layer 3 tests (IP and
ICMP protocols).
For example, the fragmentation timeout logs feature generates logs when detecting
packets purposefully fragmented for a FireWall bypassing or Denial of Service
attack.
For more information, see the SmartDefense HTML pages and online help.
TCP
UTM-1 is able to identify the basic IP based protocols and analyze a packet in
order to verify that it contains allowed options only.
In order to verify that TCP packets are legitimate, the following tests are
conducted:
• protocol type verification
• protocol header analysis
• protocol flags analysis and verification
SYN Attack Protection prevents attacks in which TCP connection initiation packets
are sent to the server in an attempt to cause Denial of Service.
The sequence verifier is a mechanism matching the current TCP packet’s sequence
number against a TCP connection state. Packets that match the connection in
terms of the TCP session but have incorrect sequence numbers are either dropped
or stripped of data.
For more information, see the SmartDefense HTML pages and online help.
Fingerprint Scrambling
It is sometimes possible to identify the operating system used by a machine, or to
impersonate an existing connection, by means of a fingerprint that characterizes
the operating system or the connection. SmartDefense can prevent this by
distorting the fingerprint to make such identification impossible.
For more information, see the SmartDefense HTML pages and online help.
Successive Events
Successive Events detection provides a mechanism for detecting malicious or
suspicious events and notifying the security administrator.
Successive Events detection runs on the SmartCenter Server and analyzes logs from
UTM-1 enforcement modules by matching log entries to attack profiles.
The security administrator can modify attack detection parameters, turn detection
on or off for specific attacks, or disable the Successive Events feature entirely.
Logs which do not reach the SmartCenter Server (for example, local logs and logs
sent to the Log Server) are not analyzed.
For more information, see the SmartDefense HTML pages and online help.
168
The SmartDefense Solution for an Active Defense
• You can decide to send logs to the Storm Center in order to help other
organizations combat the threats that were directed at your own network. You
can decide which logs to send by selecting the rules for which you want to send
logs.
For more information about the SmartDefense DShield Storm Center integration,
see “SmartDefense StormCenter Module” on page 181.
Port Scan
Port Scanning is a method of collecting information about open TCP and UDP ports
in a network. Gathering information is not in itself an attack, but the information
can be used later to target and attack vulnerable computers.
To offer a service to other computers, a host has to open a port for that service.
Ports often remain open from a default installation, and the administrator may not
know about them. This can leave the host vulnerable to attack. For example, if the
FTP service is left open by default, an attacker can try to guess the default
username and password in order to get access to the machine.
Port scanning can be performed either by a hacker using a scanning utility such as
nmap, or by a worm trying to spread itself to other computers. Port Scanning is
most commonly done by trying to access a port and waiting for a response. The
response indicates whether or not the port is open.
The Smartdefense Port Scanning feature does not block the scanning.
SmartDefense detects ports scans with one of three possible levels of detection
sensitivity. When a port scan is detected a log or alert is issued.
It is possible to block clients that SmartDefense detects as performing port
scanning, by configuring automatic SAM (Suspicious Activity Monitoring) alert rules
on the SmartCenter to block offending IPs. For information about the sam_alert
command see the Command Line Interface (CLI) administration guide.
Warning - An automatic sam_alert rule may expose legitimate hosts to a remote DoS
attack. An attacker could spoof a port scan from a legitimate IP, which would then be
blocked by the automatic SAM rule.
For more information, see the SmartDefense HTML pages and online help.
Dynamic Ports
A number of applications (such as FTP under heavy load, and SIP protocols) can
set up connections by opening ports dynamically. These ports can turn out to be
the same as those used by one of the pre-defined services in the SmartDashboard.
Use this page to define whether to drop a connection with a dynamically opened
port that is the same as a pre-defined service port. Also use this page to choose
whether to drop dynamic port connections that use low ports (below 1024).
For more information, see the SmartDefense HTML pages and online help.
Application Intelligence
These pages allow you to configure various protections at the application layer,
using SmartDefense's Application Intelligence capabilities.
Mail
The SMTP security server allows strict enforcement of the SMTP protocol. It
protects against malicious mail messages, provides SMTP protocol centered
security, prevents attempts to bypass the Rule Base using mail relays, and prevents
Denial of Service and spam mail attacks. Usually the security server is activated by
specifying resources or authentication rules in the Security Rule Base.
These pages allow you to select what types of enforcement will be applied to SMTP
connections passing through the security server. Clicking Configuration applies to all
connections will forward all SMTP connections to the SMTP security server and
enforce the defined settings on all connections, without having to define a resource
in the Rule Base. Clicking Configurations apply only to connections related to rule
base defined objects applies these configurations only to SMTP connections for
which a resource is defined in the Rule Base.
For more information, see the SmartDefense HTML pages and online help.
FTP
These pages allow you to configure various protections related to the FTP protocol.
For example, preventing FTP port overflow checks foils any attempt to use an FTP
server as an agent for a malicious operation.
Microsoft Networks
These pages allow you to configure various protections at the application layer,
using SmartDefense's Application Intelligence capabilities.
170
The SmartDefense Solution for an Active Defense
Peer to Peer
SmartDefense can block Peer to Peer traffic by identifying the proprietary protocols
and preventing the initial connection to the Peer to Peer networks. This prevents
not only downloads, but also search operations. SmartDefense can identify the
protocol even if the peer to peer application switches port numbers. The detection
does not, for example, rely on identifying HTTP header signatures.
For more information, see the SmartDefense HTML pages and online help.
Instant Messengers
These pages allow you to block Instant Messaging applications that use VoIP
protocols. Instant Messaging applications have many capabilities, including voice
calls, message transfer, and file sharing.
DNS
The DNS protocol is used to identify servers by their IP addresses and aliases. DNS
protocol messages can be transported over TCP or UDP.
This option checks that all the connections on the DNS port over UDP are
DNS-related. In addition, certain restrictions are imposed on the type of data
allowed in queries and answers.
For more information, see the SmartDefense HTML pages and online help.
VoIP
Voice and video traffic, like any other information on the corporate IP network, has
to be protected as it enters and leaves the organization. Possible threats to this
traffic are
• Call redirections, where calls intended for the receiver are redirected to
someone else.
• Stealing calls, where the caller pretends to be someone else.
• Systems hacking using ports opened for VoIP connections
VoIP calls involve a whole series of complex protocols, each of which can carry
potentially threatening information through many ports.
SmartDefense makes sure that addresses of the caller and receiver are where they
are claimed to be, and that the caller and receiver are allowed to make and receive
VoIP calls. In addition, SmartDefense examines the contents of the packets passing
through every allowed port, to make sure they contain proper information. Full
stateful inspection on H.323, SIP, MGCP and SCCP commands ensures that all
VoIP packets are structurally valid, and that they arrive in a valid sequence.
SNMP
SmartDefense enables you to protect against SNMP vulnerabilities by providing the
option of enforcing SNMPv3 (the latest SNMP version) while rejecting previous
versions. In addition, SmartDefense can allow all SNMP versions while dropping
requests with SNMPv1 and SNMPv2 default community strings. A monitor-only
mode makes it possible to track unauthorized traffic without blocking it.
For more information, see the SmartDefense HTML pages and online help.
172
SmartDefense Profiles
SmartDefense Profiles
Different gateways may need to guard against different types of threats that
requires different configurations. SmartDefense Profiles allow the administrator to
customize the SmartDefense configuration according to the needs of each gateway
in the community. A SmartDefense Profile may be installed on more than one
gateway.
There are several features that are not configured per profile but are set universally
for all gateways:
1. Spoofed Reset Protection – the services exclusion list will not be per profile
(since services are global and not per profile).
2. Successive Events – these settings are relevant for log servers and not for each
gateway.
3. DShield Storm Center – Report to DShield – these settings are not part of the
firewall and therefore cannot have different settings.
4. Definitions of patterns (worm catcher patterns, P2P/IM patterns) – the
definition is global and each pattern can be activated/deactivated in each
profile.
If a profile is not specified, the gateway is assigned the default profile. All gateways
earlier than NGX R60 use the default profile.
Up to 20 profiles may be created and SmartDefense Profiles are available for all
NGX R60 gateways and above.
Note - Every profile created takes 2 MB of RAM from the user console machine on both
Windows and Motif.
Profile Cloning
Creating a duplicate copy of an existing profile is called Profile Cloning.
Once a clone is created, changes can be made to customize the new version. This
is helpful when only a few changes are required from an existing profile and is
easier than creating a brand new profile.
Logging
Activity is logged in Check Point’s SmartView Tracker. The SmartDefense Profile field
contains the profile that is assigned to the gateway or user of that particular entry.
This field is included in the SmartDefense query by default.
In versions older than NGX R62, the profile is listed in the Information field.
174
Configuring SmartDefense
Configuring SmartDefense
Configuring SmartDefense is simple and intuitive. Proceed as follows:
1. In the SmartDashboard toolbar, click the SmartDefense icon.
2. In the SmartDefense Settings window, select the SmartDefense category to view
information about the category. To view details of a specific attack, click [+] to
expand the branch, and select the attack.
3. Check the attacks you wish to defend against, and configure Settings for the
categories and the specific attacks.
4. Install the Security Policy. You need to reinstall the Security Policy in order to
implement changes to the SmartDefense configuration.
Staying Vigilant
Of course your responsibility does not end with simply configuring SmartDefense
according to your network’s needs. The security administrator must vigilantly review
the records logged in Check Point’s SmartView Tracker. Knowledge of the threats
your SmartDefense has encountered is crucial to maintaining an active defense.
SmartDefense Services
The SmartDefense Services tab enables the ability to update all available products
from a central location. The tab contains the following three views:
• Download Updates
• Advisories
• Security Best Practices
Download Updates
In this tab you can review information regarding available updates to download.
Each entry in the table describes an updates package as follows:
1. VPN-1 gateways - Describes SmartDefense updates for the following network
objects:
• VPN-1 Power/UTM gateways
• VPN-1 Power/UTM clusters
• VPN-1 UTM Edge gateways
• VPN-1 Power VSX gateways
• VPN-1 Power VSX clusters
2. InterSpect 1.x and 2.0 - Describes SmartDefense and Web Intelligence updates
for centrally managed InterSpect gateways of versions 1.0, 1.1, 1.5 and 2.0.
This entry will appear only if the gateways are defined in SmartDashboard.
3. InterSpect NGX - Describes SmartDefense and Web Intelligence updates for
centrally managed InterSpect gateways of version NGX.
This entry will appear only if the gateways are defined in SmartDashboard.
4. Connectra 2.0 - Describes SmartDefense and Web Intelligence updates for
centrally managed Connectra gateways of version 2.0.
This entry will appear only if the gateways are defined in SmartDashboard.
5. Connectra NGX - Describes SmartDefense and Web Intelligence updates for
centrally managed Connectra gateways of version NGX.
This entry will appear only if the gateways are defined in SmartDashboard.
176
SmartDefense Services
6. Express CI - Describes manual signature updates for gateways that are AntiVirus
installed. To implement this, make sure that AntiVirus is checked in the Check
Point Products list on the General Properties page of the gateway.
This entry will appear only if the gateways are defined in SmartDashboard.
7. Edge CI - Describes manual signature updates for VPN-1 UTM Edge gateways
that are AntiVirus installed, these are defined on the Content Filtering page of
the gateway.
This entry will appear only if the gateways are defined in SmartDashboard
The following columns give information about each particular update:
1. Last Downloaded Update column:
This reflects the update that is currently downloaded in SmartCenter.
When clicking on the link, the highlights of the currently installed update will
be displayed.
(For the CI entries such information does not exist).
2. Available New Update column:
This reflects the latest available update on the download center.
When clicking on the link, the highlights of the newest update will be
displayed.
(For the CI entries such information does not exist).
3. Deployment Status column:
This shows which updated version is installed for each gateway, as well as the
gateway status:
a. Up to date - the gateway has the latest available update installed.
b. Out of date - the gateway does not have the latest update installed
c. Not available - there is no update currently installed on the gateway.
Advisories
In this tab you can see detailed descriptions and step-by-step instructions on how
to activate and configure the relevant defenses provided by Check Point products
and SmartDefense Updates. The view has two states:
1. When the admin is not logged in to the UserCenter: click on the Check Point
Reference column and a vulnerability description is displayed.
2. When the admin is logged in to the UserCenter (via the Log in to UserCenter
link located at the top of the page), a full step-by-step solution to the described
attacks is provided.
178
Configuring SmartDefense Profiles
To assign a profile, select a profile form the list in the from down menu next to
Assign profile.
5. Click OK.
To assign a profile from the SmartDefense tab:
1. Click SmartDefense tab > Profile Assignment.
2. Select a gateway and click Edit.
3. Navigate to the SmartDefense page.
4. To disable SmartDefense on this gateway, select Do not apply SmartDefense on
this gateway.
To assign a profile, select a profile form the list in the from down menu next to
Assign profile.
5. Click OK.
180
SmartDefense StormCenter Module
Introduction
The SmartDefense Storm Center Module is included in the standard UTM-1 product
installation. It enables a two way information flow between the network Storm
Centers, and the organizations requiring network security information.
One of the leading Storm Centers is SANS DShield.org http://secure.dshield.org/.
DShield.org gathers statistics and presents it as a series of reports at
http://secure.dshield.org/reports.html.
Check Point SmartDefense integrates with the SANS DShield.org Storm Center in
two ways, illustrated in Figure 6-47.
• The DShield.org Storm Center produces a Block List report, which is a list of
address ranges that are worth blocking. This Block List is frequently updated.
The SmartDefense Storm Center Module retrieves and adds this list to the
Security Policy in a way that makes every update immediately effective.
• You can decide to send logs to the Storm Center in order to help other
organizations combat the threats that were directed at your own network. You
can decide which logs to send by selecting the Security rules and
SmartDefense/Web Intelligence protections for which you want to send logs.
182
SmartDefense StormCenter Module
Figure 6-47 How the Block List is Received and Logs are Submitted
Figure 6-48 Showing the retrieval of the Block List in the SmartView Tracker
184
SmartDefense StormCenter Module
1. To check the authenticity of the origin of the received Block List, by verifying
the validity of the certificate received with the Block List.
2. To establish an SSL connection with the Storm Center when submitting logs,
while assuring that the logs are indeed sent to the Storm Center and to no one
else.
The Certificate Authority of SANS DShield.org is Equifax. The file name of the
locally stored certificate is equifax.cer, and it is stored in the conf directory of the
Storm Center Module installation.
To send logs to DShield.org, you must register with them. DShield.org authenticate
the submitters of logs with a username and password that submitters obtain when
registering.
Planning Considerations
Which Logs to send to the Storm Center
Storm Centers have a special interest in receiving logging information about:
1. Unwanted port 80 traffic reaching the organization.
2. The Drop All rule (the last Rule in the Rule Base, that drops any traffic not
explicitly allowed in previous rules).
3. Logs generated by blocking of malicious IPs.
4. SmartDefense and Web Intelligence protections.
186
SmartDefense StormCenter Module
Note - Make sure that the Block List is enforced on perimeter Gateways ONLY.
3. If you are also submitting logs to DShield, and would like to report logs
generated by blocking malicious IPs, make the Track setting identical to the
Submit Logs of Type setting in SmartDefense DShield Storm Center > Report to
DShield.
4. Install the Security Policy.
• Place the Block List rule as high as possible in the Security Rule Base, but
below all authentication rules, and any other rules for trusted sources that
should not be blocked.
• If you want to retrieve and block malicious IPs only at particular gateways,
specify them in the Install On cell of the rule.
Note - Make sure that the Block List is enforced on perimeter Gateways ONLY.
• If you are also submitting logs to DShield, and would like to report logs
generated by blocking malicious IPs, make the Track setting identical to the
Submit Logs of Type setting in SmartDefense DShield Storm Center > Report to
DShield.
Figure 6-50 The Block List Rule
Table 6-13
Source Destination Service Action Install On Track Comment
CPDShield Any Any Drop Policy UserDefined Block List
Targets Rule
3. Install the Security Policy.
188
SmartDefense StormCenter Module
5. Configure the option Hide internal networks using this mask to prevent the
internal network topology from being exposed by the submitted logs. A mask of
0.0.0.0 reveals the whole of the internal IP address. A mask of 255.255.255.0
reveals 8 valid bits, and converts an IP address such as 192.168.46.88 to
0.0.0.88. Make sure that the Topology is correctly defined for all Gateways (in
the Gateway object Topology page).
6. Install the Security Policy.
190
Chapter 7
Anti Virus Protection
In This Chapter
191
Introduction to Integrated Anti Virus Protection
192
Architecture
Architecture
When Anti Virus scanning is enabled, traffic for the selected protocols is trapped in
the kernel and forwarded to the security server. The security server forwards the
data stream to the Anti Virus engine. The data is allowed or blocked based on the
response of the Anti Virus engine.
Anti Virus scanning is applied only to accepted traffic, that has been allowed by the
Security Policy.
With VPN-1 UTM an Anti Virus configuration makes CVP resource configuration
obsolete. In cases where both Anti Virus and CVP are used only Anti Virus will work.
2. In the Topology page, define the gateway topology, specifying the internal
networks, and the DMZ.
3. Use the Security Rule Base to allow services. Anti Virus scanning is applied
only to accepted traffic.
4. In the Content Inspection tab select the services that should be scanned using
the options provided:
• In the Anti Virus page, configure options for file handling and scan failures.
• In the Signature Updates page, configure when to perform automatic
signature updates, or initiate a manual signature update.
• In the SMTP, FTP, HTTP and POP3 pages, configure Anti Virus scanning
options for these services.
• In the File Types page, configure whether to Scan, Block or Pass traffic
according to the file type, and configure continuous Download settings.
194
Signature Update Mechanism
Automatic updates of the virus signature can be scheduled at any chosen interval.
Manual updates of virus signatures can be initiated at any time.
Prior to downloading automatic signature (you had a typo) updates, verify that you
have the following:
• HTTP and HTTPs Internet connectivity is available and DNS is properly
configured.
• A valid Check Point User Center username and password.
The following three signature update mechanisms are available. For both
mechanisms, the default update interval is 120 minutes:
• Download signature updates every x minutes allows you to choose the update
interval. The default update interval is 120 minutes
• Download from Check Point site indicates that each VPN-1 gateway (AKA
module) is responsible for contacting Check Point’s site to fetch Anti Virus
signatures. Updates are downloaded directly to the UTM-1 gateways. This
method will likely result in faster update times.
• Download from My local SmartCenter Server indicates that updates are
downloaded only by the SmartCenter Server from the default Check Point
signature distribution server, and then redistributed by the SmartCenter Server
to all UTM-1 gateways. This method is useful when Internet access is not
available for all gateways or when it is required that the download only occur
once for all the gateways.
Scan By Direction
Specifies whether to scan files passing to or from the external, internal and/or DMZ
networks.
This method (the default) is an intuitive way of specifying which files will be
scanned without having to specify hosts or networks.
Use this method if you wish to scan all traffic in a given direction. It is possible to
specify exceptions, that is, locations to or from which files will not be scanned.
Note - Scan By Direction works only when UTM-1 is connected as a gateway, and is placed
inline between the external and the Internal/DMZ networks. It does not work when UTM-1
is connected as a node, in Proxy mode.
In addition, Scan By Direction only works when the Gateway topology is correctly defined.
Scan By IP Address
Scan by IP address allows you to define very precisely which traffic to scan. For
example, if all incoming traffic from external networks reaches the DMZ, Scan by
IP allows you to specify that only traffic to the FTP, SMTP, HTTP and POP3 servers
will be scanned, whereas Scan by Direction scans all traffic to the DMZ.
When choosing to Scan by IP address, you use a Rule Base to specify the source
and destination of the data to scan. For FTP, for each rule, you can choose to scan
either the GET or PUT methods, or both. For HTTP, for each rule, you can choose
to scan either the HTTP Request, or the HTTP Response, or both.
196
Understanding Scan By Direction and Scan By IP
198
Understanding Scan By Direction and Scan By IP
200
Scanning by Direction: Choosing the Data to Scan
What is a DMZ?
The DMZ (demilitarized zone) is an internal network with an intermediate level of
trust. Its trust level lies between that of trusted internal networks, such as a
corporate private LAN, and that of untrusted external networks such as the
Internet.
Typically, the DMZ contains devices accessible to Internet traffic, such as Web
(HTTP) servers, FTP servers, SMTP (e-mail) servers, DNS servers and POP3 servers.
The Scan By Direction options allow you to specify a level of Anti Virus scanning
that is specific to the DMZ. For example, you can decide not to scan traffic passing
from external networks to the DMZ, while scanning traffic passing from the DMZ to
internal networks, and from the external to internal networks.
An internal interface can be defined as leading to the DMZ in the UTM-1 Gateway
topology.
• Outgoing files leaving (see Figure 7-57) - this refers to files leaving through
external interfaces.
• the internal networks (1).
• the DMZ (2).
• the DMZ and internal networks (1 and 2).
Figure 7-57 Options for scanning Outgoing files leaving
202
Scanning by Direction: Choosing the Data to Scan
204
Continuous Download
Continuous Download
The Anti Virus engine acts as a proxy which caches the scanned file before
delivering it to the client only for files that need to be scanned.
When large files are being scanned, if the whole file is checked before being made
available, the user may experience an unacceptably long delay before the file is
delivered. A similar problem may arise when using client applications with short
timeout periods (certain FTP clients for example) to download large files. If the
whole file is cached and scanned before being delivered, the client applications
may time out while waiting.
To address this, Continuous Download trickles information to the client while the
Anti Virus scanning is taking place. If a virus is found during the scan, the file
delivery to the client is terminated.
It is possible to specify file types for which Continuous Download will not take
place. Some file types (such as Adobe Acrobat PDF files and Microsoft Power
Point) can open on a client computer before the whole file has been downloaded. If
Continuous Download is allowed for those file types, and a virus is present in the
opened part of the file, it could infect the client computer.
Note - SMTP and POP3 support Continuous Download per the entire email message.
206
File Size Limitations and Scanning
File Handling
• Maximum file size to scan limits the file size that will be allowed through the
gateway. If the file is a compressed archive, the limit applies to the file after
decompression (The Anti Virus engine decompresses archives before scanning
them). Before performing Anti Virus scanning, the gateway reassembles the
entire file and then scans it. The limit is meant to protect the gateway
resources and the destination client.
An archive is a file that contains one or more files in a compressed format.
Archives (and all other file types) are recognized by their binary signature (also
known as the “magic number”). By default, any file type that is not positively
identified as being non-archive, is assumed to be an archive, and the Anti Virus
engine tries to expand it.
• When file exceeds limit determines whether to not scan the file or block it.
Note - An email is treated as an archive and as a result it is not affected when the file
exceeds the limit.
Scan Failure
• When Anti Virus engine is overloaded or scan fails determines whether to not
scan the file or block it.
• When Anti Virus engine fails to initialize determines whether to not scan the file
or block it.
208
VPN-1 UTM Edge Anti Virus
Note - It is important to configure a valid DNS server address on your management and
enforcement module in order for the signature update to work.
With the VPN-1 UTM Edge Anti Virus scanning policy you can select the service(s)
to and from which a source and/or destination will be scanned. Scanning specifies
the files to be scanned by means of a classic Rule Base that defines the source
and destination of the connection to be scanned. Use this method if you wish to
define very precisely which traffic to scan. For example, if all incoming traffic from
external networks reaches the DMZ, it is possible to specify that only traffic to the
Anti Virus servers will be scanned.
To configure Anti Virus to work on VPN-1 UTM Edge gateways, it must be
configured in the Edge Anti Virus section of the Content Inspection tab. The Edge
Anti Virus settings in the Content Inspection tab only work for VPN-1 UTM Edge
machines.
210
Chapter 8
Web Intelligence
In This Chapter
211
The Need for Web Attack Protection
With almost all organizations allowing web traffic (TCP port 80) through their
perimeter firewall, hackers are increasingly focusing their attacks on web servers
and applications. Many attacks today exploit security weaknesses in the different
layers of the modern web architecture, often termed as the N-tier web architecture.
These attacks range from defacing the primary web interface, getting an embedded
web application on a server to do unintended functions, installing malicious
applications, to tricking the backend database to send information back to the user.
Similar to network security, web security is only as strong as the weakest link. To
build secure web applications, web developers must design security in every aspect
of the web application. Unfortunately, many enterprise web applications were not
designed with holistic security in mind. Worse, an organization may only design
web security into only some of the web servers that are made accessible to the
outside world.
212
The Web Intelligence Solution for Web Attack Protection
214
Web Intelligence Online Updates
Tip - It is recommended to keep your gateway version up-to-date, as the newest defenses are
incorporated into the latest version of Check Point software.
In This Section
Enforcement Granularity
It is possible to vary the scope of the protection. A protection can be applied to
selected web servers, or to all web servers.
Figure 8-60 Protection Scope and Action Settings
216
Web Intelligence Security and Usability
Configuration Flexibility
The Web Server View page in SmartDashboard gives a convenient global view of
every Web Intelligence protection. The configuration state of every protection on
every web server can be viewed and changed.
Protections can be also be enabled/disabled from the individual protection page in
Web Intelligence, and via the web server object. The protections can be applied via
the web server object if the protection scope in Web Intelligence is set to apply to
specific web servers.
Figure 8-61 The Web Intelligence Web Server View, and the Web Server object.
Monitor-Only Mode
All Web Intelligence protections have a monitor-only option, which detects and
tracks unauthorized traffic without blocking it (see Figure 8-60). Intrusions are
logged in SmartView Tracker.
The monitor-only option is helpful when deploying a Web Intelligence protection for
the first time, to evaluate the effectiveness of the protection without interrupting
connectivity. Monitor-only mode also makes it possible to have an audit-only
deployment.
218
Web Intelligence Security and Usability
This makes it possible to quickly nail down and eliminate the attack, before it can
spread. The security administrator can fix the problem even before users know
about it, or if the users notice the problem first, they can call the Help Desk about
it. Alternatively, users can be given information in the web page about how to fix
the problem themselves, which is of great benefit to overworked support staff.
The administrator can customize the page with text and a logo. To help pinpoint the
reason that caused the connection to be closed, the page shows two IDs: a Reject
ID and an Error ID.
Note - Activating the Error Page decreases performance for Web traffic to which this
feature is applied.
Reject ID
The Reject ID that appears on the Error page is intended to deliver information to
the administrator without exposing it to a potential attacker.
The Reject ID is unique for each rejected connection. The Reject ID also appears
in the SmartView Tracker, and allows the administrator to correlate between an
error and a log record of a specific connection. The log record contains attack
information, such as “Cross site scripting detected”.
Error Description ID
The Error description ID is a standard ID that is used to identify the attack. It
appears in the SmartView Tracker log, and corresponds to a SecureKnowledge
solution about the attack. For example, the following could appear in the
Information column of the SmartView Tracker log: “WSE0030002 cross site
scripting detected in request”. The WSE0030002 is the Error description ID, and
a SecureKnowledge search for that ID will locate information about the attack.
The administrator can choose whether or not to display the Error Description ID on
the error page. It is not recommended to display it because the information could
be misused by an attacker.
220
Web Content Protections
222
Understanding HTTP Sessions, Connections and URLs
Body section
<Some content (usually a filled form which will be submitted)>
Body section
<Some content (usually an HTML page or a binary file)>
HTTP Connections
HTTP/1.1 encourages the transmission of multiple requests over a single TCP
connection. Each request must still be sent in one contiguous message, and a
server must send responses (on a given connection) in the order that it received the
corresponding requests.
The following is an example of an HTTP request connection:
Understanding URLs
A URL is made up of the Host, Path and Query parameters. In the URL in
Figure 8-64, the Host is http://www.elvis.com, the Path is /alive/qc.html, and the
Query is everything else. UTM-1 and Web intelligence can filter the URL on these
parameters and decide whether to allow the HTTP request containing a particular
URL.
Figure 8-64Example URL showing Host, Path and Query components
224
Connectivity Versus Security Considerations
Monitor-Only Mode
All Web Intelligence protections have a monitor-only mode which makes it possible
to evaluate how the protection will affect connectivity, by examining logs to spot
traffic that Web Intelligence has detected as being dangerous. All this, while
allowing uninterrupted traffic flow.
• HTTP methods - Some standard and non-standard HTTP methods are unsafe,
because they can be used to exploit vulnerabilities on a web server. Microsoft
WebDAV methods (used for Outlook Express access to Hotmail), for example,
have certain security issues, but blocking them can prevent use of important
applications. Applying the protection for specific web servers can solve the
connectivity problems.
226
Web Security Performance Considerations
Table 8-14 Web security capabilities that do not require the Web Intelligence Add-On
Web security capability
Integration with CVP servers for Anti-Virus protection.
URL filtering (via a UFP server) with enhanced security checks.
Blocking URL-based attacks by source and destination
Integrated URL filtering of a limited list of sites.
HTML weeding: Stripping script tags, Applet tags, ActiveX, FTP links and
port Strings.
HTTP Response scanning: Blocking Java Code.
Securing XML Web Services (SOAP).
For more information, see the Firewall and SmartDefense Administration Guide.
228
Backward Compatibility Options for HTTP Protocol Inspection
For gateway clusters, a single regular gateway license is required for any one of the
cluster members, and a cluster license for each of the other cluster members.
For R60 and higher versions, the correct licensing is enforced by counting the
number of Web Servers that are protected by each Gateway. This number is
calculated using the setting in the Protected by field of the Web Server page of the
Web Server object. If *All is specified, the number of counted Web servers is
incremented for all gateways that enforce Web Intelligence features.
For version R60 and higher versions, if the correct license is not installed, it is not
possible to Install a Policy on any gateway. When upgrading, be aware of this
change of behavior.
230
Web Intelligence License Enforcement
Web Intelligence licenses are installed on and attached to the SmartCenter Server.
The SmartCenter Server allocates licenses to gateways in an optimal way. For
example, if three gateways A, B, and C, protect 3, 7, and 35 Web servers
respectively, and the SmartCenter Server has three licenses: one for 3 Web servers,
one for 10 and a third for an unlimited number. The licenses are allocated as in
Table 8-16.
232
Chapter 9
SmartCenter Overview
In This Chapter
233
Introduction
Introduction
To make the most of Check Point products, their capabilities and features, you
must be familiar with some basic concepts and components. This chapter includes
an overview of usage, and describes the terminology and procedures that will help
you install VPN-1 for NGX R62 and Check Point Express.
Unless otherwise stated, all references to VPN-1 in this Guide are relevant to Check
Point Express. In addition, the process of creating your first Policy Package is
described.
Note - Refer to the Check Point Express Supplemental Guide to view a list of
supported features.
VPN-1Power
VPN-1 Power is part of the Check Point Suite. It provides a comprehensive security
solution for very large enterprises and organizations. It integrates access control,
authentication, and encryption to guarantee the security of network connections,
the authenticity of local and remote users, and the privacy and integrity of data
communications. VPN-1 Power supports both site-to-site and, together with VPN-1
SecuRemote/SecureClient, remote access VPN solutions.
234
Some Basic Concepts and Terminology
• SmartCenter server is the component that manages the database and policies,
and downloads policies to the gateways. This server is also referred to as
SmartCenter Power server. The Check Point Express server is called the
SmartCenter Express server.
• A Log server is the repository for log entries generated on gateways, that is, the
gateways send their log entries to the Log server. A Log server is often installed
on the same machine as the SmartCenter server.
• SmartDashboard is the SmartConsole used to create, edit and install policies.
• Users are the people defined in SmartDashboard as the users of an
organization. For example, users may be the employees of a specified
organization.
236
Possible Deployment Scenarios
In Figure 9-65, there are two gateways. Each gateway is installed on a gateway
module that leads to the Internet on one side, and the LAN on the other side.
It is possible to create a Virtual Private Network (VPN) between the two gateways to
secure all communication between them.
The SmartCenter server is installed on the LAN, so that it is protected by VPN-1
Power & Check Point Express. The SmartCenter server manages the gateways and
allows remote users to securely connect to the corporate network. SmartDashboard
may be installed on the SmartCenter server or on any other internal machine.
In addition to Check Point modules, other OPSEC-partner modules (for example, an
AntiVirus Server) can be deployed in collaboration with the SmartCenter server and
its gateways to complete the network security.
This chapter describes how to deploy and manage Check Point products to secure
a network, including:
• Managing Objects in SmartDashboard describes how to manage objects, the
building blocks of policies.
• Securing Channels of Communication Between Internal Components (SIC)
describes how Check Point components installed on different machines
securely communicate with each other for policy installation, status
information, and so on.
• Network Topology describes how the structure of the internal network protected
by the gateway is represented on the Network object that represents the
gateway.
• Managing Users in SmartDashboard describes how to manage administrators
and users.
• Working with Policies describes how to define and install policies.
Login Process
Overview
The process of logging in to the SmartCenter server is common to all Check Point
SmartConsole applications (SmartDashboard, SmartUpdate, and so on). This
process consists of a bidirectional operation, in which the administrator and the
SmartCenter server authenticate each other and create a secure channel of
communication between them using Secure Internal Communication (SIC). Once
both the administrator and the SmartCenter server have been successfully
authenticated, SmartCenter launches the selected SmartConsole.
238
Authenticating the SmartCenter Server Using Its Fingerprint
Objects are created by the system administrator to represent actual hosts and
devices, as well as intangible components such as services (for example, HTTP and
TELNET) and resources (for example, URI and FTP). Each component of an
organization has a corresponding object to represent it. Once these objects are
created, they can be used in the rules of the Security Policy. Objects are the
building blocks of Security Policy rules and are stored in the Objects database on
the SmartCenter server.
Objects in SmartDashboard are divided into several categories which can be viewed
in the different tabs of the Objects Tree (Figure 9-66).
Figure 9-66 Objects Tree
For example, the Network Objects tab shows both the physical machines and the
logical components, such as dynamic objects and address ranges, that make up
your organization.
240
SmartDashboard and Objects
When creating objects the system administrator must consider the needs of the
organization:
• What are the physical and logical components that make up the organization?
Each component that accesses the firewall probably needs to be defined.
• Who are the users and administrators and how should they be divided into
different groups?
In other words, a substantial amount of planning should go into deciding what
objects should be created and how they should be implemented.
Objects are created, manipulated, and accessed in these panes. The following
section describes the functions and characteristics of each pane.
242
Managing Objects
SmartMap Pane
A graphical display of objects in the system is displayed in SmartMap view. This
view is a visual representation of the network topology. Existing objects
representing physical components such as Gateways or Hosts are displayed in
SmartMap, but logical objects such as dynamic objects cannot be displayed.
Managing Objects
The Objects Tree is the main view for adding, editing, and deleting objects,
although these operations can also be performed from the menus, toolbars, and the
various views, such as in Rule Bases or in SmartMap.
Configuring Objects
An object consists of one or more tabs and/or pages in which the object settings are
configured.
The following procedure describe the creation and configuration of a typical object.
To define and configure a new Check Point Gateway object:
1. To create a new Check Point Gateway in the Objects Tree, right-click Check
Point and select New Check Point > Gateway….
Figure 9-69 Creating a New Check Point Gateway in the Objects Tree
A window opens allowing you to configure this object using a helper wizard, or
manually, via the Classic method.
2. Select the Classic method. The Check Point Gateway window opens with the
following four default pages:
• General Properties: For most new objects, the required values are a name
and an IP address. In this window, you should also configure the Check
Point products to be installed on the Check Point Gateway. To enable this
object to communicate with the SmartCenter server, you must initialize
Secure Internal Communication (SIC) by clicking Communication.
• Topology: Enter the interfaces that make up the network topology of your
organization.
• NAT: If relevant, configure this object for NAT and anti-spoofing purposes.
244
Changing the Objects Tree View
Note - It is possible to clone a Host object and a Network object (that is, duplicate the
object). To do this, right-click the Host or Network object you would like to duplicate,
select Clone... and enter a new name.
Classic View
In Classic View, network objects are displayed according to object type. For
example, a corporate mail server appears under the Node category (see
Figure 9-70).
Figure 9-70 Nodes in the Objects Tree
Check Point management stations and gateways appear in the category Check Point,
DAIP servers appear in the category Dynamic Objects, and so on. Organizing objects
by category is preferred for small to medium-sized deployments. SmartDashboard
opens to Classic View by default unless set to Group View.
Group View
In Group View, network objects are organized according to the Group Objects to
which they belong. For example, a group called GW-group could include all of the
Gateway objects in an organization (see Figure 9-71).
Figure 9-71 Group View
Group View provides the flexibility to display objects in keeping with the specific
needs of your organization. For example, by function (as in the gateway group
example above), by regional distribution of resources, or any number of other
groupings. Group View is especially useful for larger deployments that could benefit
from grouping objects in this way.
Any objects not associated with a group appear as they would in Classic View, in
the appropriate logical category under the category Others.
To switch to Group View:
1. Right-click Network Objects and select Arrange by groups.
As changing views can at first be disorienting, a warning message appears
(Figure 9-72).
Figure 9-72 SmartDashboard Warning
246
Changing the Objects Tree View
2. Click OK. The Network Objects tab is now arranged by group. If no groups have
been created, the order is similar to that of Classic View, with the addition of
the category Others (see Figure 9-73).
Figure 9-73 Switch to Arrange by Group
When you begin adding groups, they appear above the Others category. For
example, network objects grouped by function would look something like
Figure 9-74.
Figure 9-74 Grouping Network Objects by Function
2. In the Group Properties window, give the group a name, select the objects you
want in the group from the Not in Group pane, and click Move >.
3. To save the new group, click OK.
Note that when you select a group in the Objects Tree, the group’s network objects
appear in the Objects List, as shown in Figure 9-77.
248
Groups in the Network Objects Tree
You can create groups that are members of other groups. In Figure 9-77, the
nested group Alaska is shown as a member of GW-group in the Objects List.
Figure 9-77 Group within a Group
Showing the groups hierarchy also provides additional functionality. For example,
you can right-click a group object and create a new network object that is
automatically assigned membership in the group.
It also allows groups to be sorted individually. By right-clicking a group object, you
can sort objects in a manner independent of how the tree or other groups are
sorted. You can sort each group by type, name or color, or as the Objects Tree is
sorted.
To enable the groups hierarchy, right-click either the Groups category or a group
object and select Show groups hierarchy.
250
Groups in the Network Objects Tree
Group Conventions
You can configure a group object to have SmartDashboard prompt you whenever
you create a network object whose criteria match certain properties you define as
characteristic of the group. If you select Suggest to add objects to this group, the
Group Properties window then shifts to display matchable properties (see
Figure 9-80).
Figure 9-80 Group Properties
From the drop-down menus, choose any combination of name, color, and network
to set the appropriate condition to be a member of this group. For example, if you
set the network object Corporate-dmz-net as a matchable property, each time you
create an object with an IP address on this network, SmartDashboard will prompt
you to include the new object in this group.
If an object matches the properties of several groups, the Groups Selection Dialog
window appears (see Figure 9-81).
Figure 9-81 Groups Selection Dialog Window
If the list of matching groups includes a group to which you do not want to assign
the object, set that group’s Action property to Don’t Add, and click OK.
If you alter the properties of an object so that it no longer matches the parameters
of the group, SmartDashboard notifies you and asks if you want to remove the
object from the group. Removing an object from a group does not delete the object
or otherwise change it. If an object does not belong to any other group, you can
locate it in its logical category under Others.
252
Securing Channels of Communication Between Internal Components (SIC)
The SmartCenter server must be able to communicate with all the modules and
partner-OPSEC applications that it manages, even though they may be installed on
different machines. The interaction must take place to ensure that the modules
receive all the necessary information from the SmartCenter server (such as the
Security Policy). While information must be allowed to pass freely, it also has to
pass securely.
This means that:
• The communication must be encrypted so that an imposter cannot send,
receive or intercept communication meant for someone else.
• The communication must be authenticated, there can be no doubt as to the
identity of the communicating peers.
• The transmitted communication should have data integrity, that is, the
communication has not been altered or distorted in any form.
• The SIC setup process allowing the intercommunication to take place must be
user-friendly.
Note - In order for SIC between the Management and the Module to succeed, their clocks
must be properly and accurately synchronized.
1. In the Check Point Configuration Tool, the Internal Certificate Authority (ICA) is
created when the SmartCenter server is installed.
254
Understanding SIC Trust States
After the ICA is created, it issues and delivers a certificate to the SmartCenter
server.
2. SIC can be initialized for every module in the Secure Internal Communication tab
of the Check Point Configuration tool. An Activation Key must be decided upon
and remembered. This same Activation Key must be applied on the appropriate
network object in SmartDashboard. At this point only the module side has been
prepared. The Trust state remains Uninitialized.
3. In SmartDashboard, connect to the SmartCenter server. Create a new object
that represents the module. In the General Properties page of the module, click
Communication to initialize the SIC procedure.
4. In the Communication window of the object, enter the Activation Key that you
created in step 2.
5. To continue the SIC procedure, click Initialize. The module is issued a
certificate by the ICA. The certificate is signed by the ICA.
6. SSL negotiation takes place after which the two communicating peers are
authenticating with their Activation Key.
7. The certificate is downloaded securely and stored on the module.
8. After successful Initialization, the module can communicate with any module
that possesses a SIC certificate, signed by the same ICA. The Activation Key is
deleted. The SIC process no longer requires the Activation Key, only the SIC
certificates.
Communicating, the SmartCenter server is able to contact the module, but SIC
communication cannot be established. In this case, an error message appears,
which may contain specific instructions on how to remedy the situation.
Warning - The Reset operation must be performed on the module’s object, using
SmartDashboard, as well as physically on the module using the Check Point Configuration
Tool.
Troubleshooting
If SIC fails to initialize, verify that:
• The SmartCenter server and its modules are of version NG and higher.
• The gateway is up and connected to the network.
• The Activation Key is properly set for both the module and the SmartCenter
server.
• The clocks of the SmartCenter server and its gateways are properly set and
accurately synchronized.
256
Network Topology
Network Topology
The network topology represents the internal network (both the LAN and the DMZ)
protected by the Enforcement module. The module must be aware of the layout of
the network topology to:
• Correctly enforce the Security Policy.
• Ensure the validity of IP addresses in traffic (inbound and outbound).
• Configure a special domain for Virtual Private Networks.
Each component in the network topology is distinguished on the network by its IP
address and net mask. The combination of objects and their respective IP
information make up the topology. For example:
• The IP address of the LAN is 10.111.254.0 with the net mask
255.255.255.0.
• A Check Point Gateway on this network has an external interface with the
following IP address 192.168.1.1, and an internal interface with the IP
address 10.111.254.254.
In this case, there is one simple internal network.
In more complicated scenarios, the LAN is composed of many different networks,
as illustrated in the Figure 9-82.
Figure 9-82 A Complex Topology
• A Check Point Gateway that protects this network has an external interface with
IP address 192.168.1.1, and an internal interface with the IP address
10.111.254.254.
In this case, the system administrator must define the topology of the gateway
accordingly.
In SmartDashboard:
• An object should be created to represent each network. The definition must
include the network’s IP address and net mask.
• A group object should be created which includes both networks. This object
represents the LAN.
• In the Gateway object, the internal interface should be edited to include the
group object. (In the selected Gateway, double-click the internal interface in
the Topology page. Select the group defined as the specific IP addresses that
lie behind this interface).
258
Managing Users in SmartDashboard
SmartDirectory (LDAP)
LDAP is a standardized protocol that makes a single Users Database available to
multiple applications (for example, email, domains, and firewalls) and requires a
special deployment (in addition to the VPN-1 Power deployment).
SmartDashboard
Check Point’s user management solution is part of SmartDashboard. Users,
Administrators and their groups are managed as objects, using the standard object
administration tools: the Objects Tree pane and the Objects Manager window.
• The Objects Tree pane (Users and Administrators tab):
• Provides a graphical overview of all users and administrators.
• Allows you to manage users and administrators by right-clicking the relevant
folder (for example, Administrator, Administrator Groups, External User
Profiles, etc.) and selecting the appropriate command (Add, Edit, Delete,
etc.) from the menu.
• The Objects Manager (Users and Administrators window):
• Lists all users and administrators (you can filter this list to focus on a
specific type of users or administrators).
• Allows you to define new objects using the New... menu, and to delete or
modify an object by selecting them in the list and clicking Remove or Edit
(respectively).
The user’s definition includes access permissions to and from specific machines at
specific times of the day. The user definition can be used in the Rule Base’s
Authentication Rules and in Remote Access VPN.
SmartDashboard further facilitates user management by allowing you to define user
and administrator templates. Templates serve as prototypes of standard users,
whose properties are common to many users. Any user you create based on a
template inherits all of the template’s properties, including membership in groups.
Users Database
The users defined in SmartDashboard (as well as their authentication schemes and
encryption keys) are saved to the proprietary Check Point Internal Users Database
(also referred to as the Users Database). The Users Database resides on the
SmartCenter server and on the firewalled machines (the enforcement points).
The Users Database is automatically downloaded to the VPN-1 Power Modules as
part of the Policy installation process. Alternatively, you can manually install the
Users Database by selecting Policy > Install Database....
The Users Database does not contain information about users defined outside
VPN-1 (such as users in external SmartDirectory (LDAP) groups), but it does
contain information about the external groups themselves (for example, on which
260
User and Administrator Types
Account Unit the external group is defined). For this reason, changes to external
groups take effect only after the Security Policy is installed or after the Users
Database is downloaded.
Configuring Users
User Objects are defined in the Users and Administrators tab.
To configure a new user:
1. In the Users and Administrators tab of the Objects Tree, create a new user (see
Figure 9-83).
The User Properties window iopens.
2. In the General tab, specify the User’s Login Name.
This property is the user’s only mandatory property and is case sensitive.
262
Configuring User Objects
Configuring Administrators
1. In the Users and Administrators tab of the Objects Tree, create a new
administrator.
The Administrator Properties window opens.
2. In the General tab, specify the administrator’s Login Name and Permissions
Profile.
3. In the Admin Certificates tab, create a login certificate for this administrator as
follows:
a. Click Generate and save.
You are warned that the certificate generation cannot be undone unless you
click Revoke.
b. Click OK.
The Enter Password window opens.
c. Enter and confirm the Password to be used with this certificate.
d. Click OK.
The Save Certificate File As window opens.
e. Browse to the folder in which you wish to save the certificate and click Save
(by default, the certificate is saved under the administrator’s Login Name
but you can rename it as needed).
In the Admin Certificates tab, the Certificate State changes to Object has a
certificate and the administrator’s Distinguished Name (DN) is displayed.
4. Click OK.
The administrator’s definition is saved to the Users Database on the
SmartCenter server.
Configuring Templates
To create a new user template:
1. In the Users and Administrators tab of the Objects Tree, create a new template.
The User Template Properties window opens.
2. In the General tab, specify the template’s name in the Login Name field.
This property is mandatory and is case sensitive.
3. Define additional user properties as needed (see step 3 on page 263).
To use a template to define a new user:
1. Right-click the Users folder and select New User > Template name....
2. In the General tab, specify the new user’s Login Name. This is the only property
the user cannot inherit from the template.
3. Select one of the following:
• To complete the user definition using the template’s default settings, click
OK.
• To specify the user’s unique properties, modify the relevant settings as
needed and click OK.
The template’s definition is saved to the Users Database on the
SmartCenter server.
264
Configuring User Objects
Configuring Groups
To create a new user group:
1. In the Users and Administrators tab of the Objects Tree, create a new user group.
The Group Properties window opens.
2. Specify the groups name in the Name field.
This property is the group’s only mandatory property and is case sensitive.
3. Move the users, external user profiles or groups to be included in this group
from the Not in Group list to the In Group list.
• To easily locate objects in the Not in Group list, limit the View to a specific
type of objects (for example, users).
• The In Group list shows collapsed sub-groups, without listing their members.
For a list of all group members (including the sub-groups’ members), click
View Expanded Group....
4. Click OK to complete the definition.
The group’s definition is saved to the Users Database on the SmartCenter server.
Overview
page 266
Installing a Policy Package
page 266
Uninstalling a Policy Package
page 268
Overview
A Policy Package is a set of Policies that are enforced by the Enforcement
modules. They can be installed or uninstalled together on selected VPN-1 modules.
The Policy Package components include:
• Advanced Security — consisting of:
• the Security Rule Base
• the Address Translation (NAT) Rule Base
• the Users Database — the proprietary Check Point Internal User Database,
containing the definitions and authentication schemes of all users defined
in SmartDashboard.
• the Objects Database — the proprietary Check Point Objects Database,
containing the definitions of all network objects defined in
SmartDashboard.
• QoS — the Quality of Service (Check Point QoS) Rule Base
• Desktop Security — the Desktop Security Rule Base
266
Installing a Policy Package
Note - The Policy to be installed includes implied rules, resulting from the Global
Properties settings. To view the implied rules, select View > Implied Rules from the
menu.
Note - If you are installing the Policy on a Gateway Cluster, specify if the installation must
be successful for all Cluster Members.
4. Click OK.
The Installation Process window opens, allowing you to monitor the progress of
the verification, compilation and installation.
If the verification is completed with no errors and the SmartCenter server is
able to connect to the module securely, the Policy installation succeeds.
If there are verification or installation errors, the installation fails (in which
case you can view the errors to find the source of the problem).
If there are verification warnings, the installation succeeds with the exception
of the component specified in the warning.
Note - To find out which Policy is installed on each module, select File >
Installed Policies....
268
Installing the User Database
270
Chapter 10
Policy Management
In This Chapter
271
The Need for an Effective Policy Management Tool
272
The Check Point Solution for Managing Policies
Policy Packages
Policy Packages allow you to address the specific needs of your organization’s
different sites by creating a specific Policy Package for each type of site.
Figure 10-84 illustrates an example organization’s network, consisting of four sites.
Figure 10-84Example Organization with Different Types of Sites
274
Policy Packages
Unlike the above Policies, the Security Rule Base does not apply to a specific site
but to the relationship between sites. Therefore, this Rule Base is common to all
sites.
The Web Access Rule Base is independent of Policy Packages, since it applies to
the organization as a whole (as opposed to a specific site). Its appearance in the
Rule Base pane is determined by SmartDashboard’s Global Properties settings (see
the SmartDashboard Customization page of the Global Properties window).
File Operations
File operations (New, Open, Save, and so on) are performed at the Policy Package
level (as opposed to the single policy level).
• New allows you to either define a new Policy Package or add a single policy to
an existing Policy Package.
• Open allows you to display an existing Policy Package. The policy types included
in the Policy Package determine which tabs are displayed in the Rule Base.
• Save allows you to save the entire Policy Package.
• Save As allows you to save the entire Policy Package, or to save a specific
policy that is currently in focus in the Rule Base (i.e. Security and Address
Translation, QoS or Desktop Security).
• Delete allows you to delete the entire Policy Package.
• Add to Policy Package allows you to add existing Policies to your Policy Package.
• Copy Policy to Package allows you to copy existing Policies to your Policy
Package.
Note - To back up a Policy Package before you modify it, use the Database Revision Control
feature. Do not use File operations for backup or testing purposes, since they clutter the
system with extraneous Packages. In addition, as there are multiple Packages but only one
Objects Database, the saved Package may not correspond to changes in the Objects
Database.
Installation Targets
To install (and uninstall) Policy Packages correctly and eliminate errors, each Policy
Package is associated with a set of appropriate installation targets. This association
both eliminates the need to repeat the module selection process per installation
and ensures that Policy Package is not mistakenly installed on any inappropriate
target.
The installation targets are defined for the whole Policy Package, thereby
eliminating the need to specify them per rule in each policy. The selected targets
are automatically displayed every time you perform an Install or Uninstall operation
(Figure 10-85 on page 276).
Figure 10-85Example Installation Targets in the Install Policy Window
You can set the Package’s Policies to be either selected or cleared by default for all
installation targets (in the SmartDashboard customization page of the Global
Properties window), and then modify these settings as needed per installation.
276
Dividing the Rule Base into Sections Using Section Titles
Note - Objects that are used by entities defined on an LDAP server are considered by the
query as “not used”.
You can further benefit from the query results by defining them as a group. For
example, you may wish to create a group of all Mail Servers in your system and use
this group in your Rule Base. If your naming convention is to include the word
“Mail” in a Mail Server’s name, you can easily find these objects by showing All
network objects, choosing the Search by Name filter and entering the string *Mail*.
Then create a group out of the results and use it in the appropriate rule.
This group object is also available through other Check Point SmartConsoles. For
example, if you are using the Eventia Reporter, you can include this group as the
source of connections in the Email Activity report.
278
Querying and Sorting Rules and Objects
280
Policy Management Configuration
Table 10-17 lists the Rule Base tabs corresponding to each policy type.
282
Adding a Rule Section Title
• To modify the targets of this operation only, select the relevant modules and
Policies and clear all others.
• To modify the targets of all future operations, click Select Targets... to
display the Select Installation Targets window and modify the list as needed.
284
Querying the Rule Base
Intersecting Queries
To perform intersecting queries:
1. Display the Rule Base you wish to query (Security, Desktop Security or Web
Access) and select Search>Manage Rule Queries.
The Rule Base Queries window opens.
2. Select the first query you wish to run and click Apply.
The rules matching this query are displayed in the Rule Base, while all other
rules are hidden.
3. If you cannot find a relevant query on the list, you can define one now as
follows:
a. Click New....
The Rule Base Query window opens.
b. Specify the new query’s Name and click New....
The Rule Base Query Clause/View Policy of Gateway window opens.
c. Define the query (see step 2 on page 284 to step 5 on page 284) and click
OK.
The query is added to the Clause list.
d. You can add new clauses to the query and use the following logical
operations:
• And, to search for rules matching all clauses
• Or, to search for rules matching at least one of the clauses
• Negate query, to search for the negation of these clauses.
4. Select the second query you wish to run.
5. Click one of the following:
• And, so that only rules matching both queries are displayed.
• Or, to show rules that match either one of queries.
6. To run the selected query, click Apply.
7. To show all rules, click Clear all.
Querying Objects
To query objects:
1. Select Search > Query Network Objects.
The Network Objects window opens, showing All network objects in your system
(the default selection) in the Network objects section. Alternatively, you filter
the display according to the object type (e.g., VPN-1 installed, Check Point QoS
installed).
2. In the Refined Filter section, specify the appropriate search criterion and click
Apply. For example:
• To find objects whose names contain a specific strings, select Search by
Name from the Refine by drop-down list, and enter the string you wish to
search for (you may use wildcards).
• To find objects with duplicate IP addresses, select Duplicates from the
Refine by drop-down list.
The objects that match the search criteria are displayed.
3. To locate one of these objects in SmartMap, click Show.
4. To create a group consisting of the search results, click Define query results as
group... and specify the new group’s name in the Group Properties window.
286
Chapter 11
SmartMap
In This Chapter
Overview of SmartMap
page 288
Working with SmartMap
page 289
Integrating SmartMap and the Rule Base
page 300
Troubleshooting SmartMap
page 303
Working with SmartMap Output
page 306
287
Overview of SmartMap
Overview of SmartMap
Most organizations have multiple gateways, hosts, networks, and servers. The
topology of these organizations is represented in SmartDashboard by network
objects. The topology is often highly complex, vastly distributed over many different
machines, and enforced in many different rules and Rule Bases. While this layout
matches the needs of your organization, it is difficult to visualize, and even harder
to translate in a schematic format. While the network objects are easy to use in the
Rule Base, it would be easier to understand and troubleshoot the policy if the rules
were displayed in an easily understood format.
288
Working with SmartMap
Enabling SmartMap
It is not possible to work with SmartMap until it has been enabled.
• To enable SmartMap, select Policy > Global Properties > SmartMap.
Toggling SmartMap
To clear SmartDashboard of visual clutter, SmartMap can be toggled until such
time that you need to work with it again.
Note - When the SmartMap view is hidden or inactive, all of its menus and commands are
disabled; however, topology calculations do continue.
Launching SmartMap
SmartMap can be displayed, embedded, or docked into the GUI window, or it can
be displayed outside of the SmartDashboard window.
• To display SmartMap outside the SmartDashboard window, select SmartMap >
Docked View.
In This Section
290
Adjusting and Customizing SmartMap
Scrolling
If you have an IntelliMouse, you can use the scroll wheel to scroll SmartMap.
Note - You can add a new network object directly to a network by right-clicking a specific
network in SmartMap and then continuing according to the previous instructions,
Creating a Group
To create a group:
292
Working with Network Objects and Groups in SmartMap
1. Select all the objects that you would like to include in the group.
2. Right-click the selected objects and select Group from the popup menu.
3. Configure the group by adding or removing objects to and from the group.
Note - A warning is displayed if you attempt to remove an object that is used in the policy.
If you ignore the warning, the object is still removed and SmartMap is adjusted accordingly.
294
Working with SmartMap Objects
Note - Topology objects, or objects created by the SmartMap view, such as clouds and
implied networks, cannot be defined as protected objects. They cannot be included in
any group, nor can they be pasted into the SmartDashboard Rule Base.
296
Working with Folders in SmartMap
298
Working with Folders in SmartMap
300
Displaying a Legend for Regular and/or NAT Rules
To show a rule:
1. In the Rule Base, select a rule that you would like to display in SmartMap by
rule number.
2. Select Show and then select the required view option from the popup menu.
302
Troubleshooting SmartMap
Troubleshooting SmartMap
SmartMap can be used as a troubleshooting tool, mostly for topology calculations
and certain connectivity issues such as duplicated networks and unresolved object
interfaces.
Note - Some network systems may require duplicated networks. Consider the needs of your
system before modifying duplicated networks.
To solve duplicated networks, you can modify the shared IP address so that they are
all unique. Alternatively, you can delete the duplicated network.
304
Defining Protected Objects as Groups
Printing SmartMap
You can set the attributes for printing in SmartMap. This includes how the output
is to be scaled, the size of the margins and finally information to be included (such
as page numbers, borders, crop marks, or even a customized caption).
306
Chapter 12
SmartView Tracker
In This Chapter
307
The Need for Tracking
308
The Check Point Solution for Tracking
Tracking Overview
Check Point products enable you to collect comprehensive information on your
network activity in the form of logs. You can then audit these logs at any given
time, analyze your traffic patterns and troubleshoot networking and security issues.
Figure 12-86 illustrates the log collection and tracking process.
Figure 12-86Log Collection and Tracking Process
The SmartDashboard allows you to customize your tracking settings for each Rule
Base, by specifying per-rule whether or not to track the events that match it.
If you decide to track the events that match a certain rule, you can choose from a
variety of tracking options, based on the information’s urgency. For example, you
can choose a standard Log for allowed HTTP connections; opt for an Account log
when you wish to save byte data; or issue an Alert (in addition to the log) when a
connection’s destination is your firewall machine. For a list of the available tracking
options, right-click the relevant rule’s Track column.
The VPN-1 gateways on which this Policy is installed collect data as specified in
the Policy, and forward the logs to the Log server (and/or to SmartCenter servers,
depending on their settings). The logs are organized in files according to the order
in which they arrived at the log server. All new logs are saved to the fw.log file,
except for audit (management-related) logs, which are saved to the fw.adtlog file.
The Log server makes these logs available for inspection via SmartView Tracker - a
comprehensive auditing solution, enabling central management of both active and
old logs of all Check Point products. You can conveniently customize searches to
address your specific tracking needs; integrate the logs with Check Point’s Eventia
Reporter; or export them to text files or to an external Oracle database.
The log server also performs the operations specified in the Policy for events
matching certain rules (e.g., issuing an alert, sending email, or running a
user-defined script).
In addition, you can benefit from the tracking and auditing capabilities of the
Check Point SmartConsole:
• SmartView Monitor allows you to manage, view and test the status of various
Check Point components throughout the system, as well as to generate reports
on traffic on interfaces, VPN-1 and QoS modules, and other Check Point
system counters.
• Eventia Reporter allows you to save consolidated records (as opposed to “raw”
logs) and conveniently focus on events of interest.
310
SmartView Tracker
SmartView Tracker
Figure 12-87 displays the main window of SmartView Tracker. Each entry in the
Records pane is a record of an event that was logged according to a specific rule in
the Rule Base. New records that are added to the fw.log file are automatically
added to the Records pane as well.
To understand Figure 12-87, refer to the numbers in the figure and the following
explanation:
1. The Log, Active and Audit modes display different types of logs.
2. The Query Tree pane displays the Predefined and Custom queries.
3. The Query Properties pane displays the properties of the fields in the Records
pane.
4. The Records pane displays the fields of each record in the log file.
312
SmartView Tracker
Filtering
SmartView Tracker’s filtering mechanism allows you to conveniently focus on log
data of interest while hiding other data, by defining the appropriate criteria per log
field. Once you have applied the filtering criteria, only entries matching the
selected criteria are displayed.
The filtering options available are a function of the log field in question. For
example, while the Date field is filtered to show data that is after, before, or in the
range of the specified date, the Source, Destination and Origin fields are filtered to
match (or differ from) the specified machines.
It is very useful to filter the Product field and focus on a specific Check Point
product, therefore SmartView Tracker features these filters as predefined queries,
as described in the following section.
Queries
SmartView Tracker gives you control over the Log file information displayed. You
can either display all records in the Log file, or filter the display to focus on a
limited set of records matching one or more conditions you are interested in. This
filtering is achieved by running a query.
A query consists of the following components:
• Condition(s) applied to one or more log fields (record columns). For example, to
investigate all HTTP requests arriving from a specific source, you can run a
query specifying HTTP as the Service column’s filter and the machine in
question as the Source column’s filter.
• A selection of the columns you wish to show. For example, when investigating
HTTP requests, the URL log field is relevant.
Each of the three modes (Log, Active and Audit) has its own Query Tree, consisting
of the following folders:
• Predefined: Containing the default queries that cannot be directly modified or
saved.
The predefined queries available depend on the mode you are in. The default
query of all three modes is All Records. In addition, the Log mode includes
predefined per product or feature queries.
314
Matching Rule
• Custom: Allowing you to customize your own Query based on a predefined one,
to better address your needs. Customized queries are the main querying tool,
allowing you to pinpoint the data you are interested in. An existing query that is
copied or saved under a new name is automatically added to the Custom folder.
The attributes of the selected query are displayed in the Query Properties pane.
Matching Rule
SmartView Tracker records the Security Rule Base rule to which a connection was
matched. The matching rule is recorded in four columns in SmartView Tracker, as
shown in Figure 12-88:
Figure 12-88Recording the Matching Rule
• The Rule column records the number of the rule in the Rule Base at the time
the log entry was recorded. Like other properties in SmartView Tracker, logs can
be sorted and queried by rule number.
• The Current Rule Number column is a dynamic field that reflects the current
placement of the rule in the Rule Base and displays the current policy package
name. As the Rule Base is typically subject to change, this column makes it
possible to locate the rules that have changed their relative positions in the
Rule Base since the log was recorded, and to create filters for log entries that
match the rule, not just the rule number. By way of example, note the log entry
in Figure 12-88. When this log was first recorded, it recorded the matching rule
as Rule 1. Since then the rule’s position in the Rule Base has changed, and so
the Current Rule Number column reports its present position as 2 [Standard],
where [Standard] is the name of the policy package in which this rule resides.
• The Rule UID column records the unique identifying number (UID) that is
generated for each rule at the time that it is created. This number serves an
internal tracking function, and as such the column is hidden by default. To
display this column, select View > Query Properties and enable the Rule UID
property.
Note - SmartCenter supports UID rule numbers from NG with Application Intelligence R55
and later. However, to enable VPN-1 gateways of versions R55 and R55W to include the
UID field when forwarding logs, you must first install a policy generated by a NGX R62
SmartCenter server to those VPN-1 gateways.
• The Rule Name column the short textual description of the rule in the Name
column of the Rule Base, when in use.
For configuration information, see “Configuring the Current Rule Number Filter” on
page 326.
316
Matching Rule
If you are using version control, SmartDashboard opens with the revision that was
saved when this record was created. If no revision is available and the record was
created after installing NG with Application Intelligence R55 (or later),
SmartDashboard uses the unique identifying number to display the relevant rule. If
neither version control nor a UID number are available, the View rule in
SmartDashboard option is not available.
318
Local Logging
Selecting the Export option (File > Export...) allows you to create a comma-delimited
ASCII file that can be used as input for other applications.
Local Logging
By default, gateways forward their log records online to the log server. Alternatively,
to improve the gateway’s performance, you can free it from constantly sending logs
by saving the information to local log files. These files can either be automatically
forwarded to the log server or SmartCenter server, according to a specified
schedule; or manually imported through SmartView Tracker, using the Remote File
Management operation.
If you choose to use a local logging configuration, you need to manually configure
the standard log maintenance settings (log switch, cyclic logging, and so on) on the
gateway.
Custom Commands
SmartView Tracker allows you to conveniently run commands from the
SmartConsole, instead of working in the command line. The commands available by
default are ping and whois. These commands, along with the ones you add
manually, are available from the popupu menu when you right-click a cell in the
Records pane.
320
Tracking Considerations
Tracking Considerations
In This Section
Note - If cyclical logging has been enabled, the log files maintained on the sender after
forwarding are eventually overwritten.
322
Tracking Configuration
Tracking Configuration
In This Section
324
SmartView Tracker View Options
Query Pane
The Query Tree pane is the area where the log files appear. The SmartView Tracker
has a new and improved interface enabling you to open multiple windows.
You can open more than one log file simultaneously. You can also open more than
one window of the same log file. This may be helpful if you want to get different
images of the same log file. For example, you can open two windows of the same
file and use different filtering criteria in each window. You can view both windows
simultaneously and compare the different images. You can also resize each window
to include as many windows as possible in the Query pane.
The Query pane is divided into two sections:
• The Query Properties pane shows all the attributes of the fields contained in the
Records pane.
• The Records pane displays the fields of each record in the log file.
Resolving IP Addresses
Since the IP address resolution process consumes time and resources, SmartView
Tracker allows you to choose whether or not to display source and destination host
names in the Log file.
Click the Resolve IP toolbar button to toggle between:
• Displaying the name of the host and the domain.
• Displaying the addresses in conventional IP dot notation.
Resolving Services
The Resolving Services option allows you to control the display of the source and
destination port in the log file. Each port number is mapped to the type of service
it uses.
This option toggles between:
• Displaying the destination port number.
• Displaying the type of service the port uses.
Note - If you click Resolving Services to display the type of service the port uses, and the
port number appears, it means that a service has not been defined for this port. A port
number can be mapped to a service either in the Objects database using the Object
Manager or in the Services Configuration file.
In SecurePlatform, the Services Configuration file name is called /etc/services.
Configuring Filters
Filtering a Log Field
You can filter a log field and focus on data of interest
1. Display the Query Properties pane (by selecting View > Query Properties). Then
right-click the desired log field in the Filter column and select Edit Filter from
the popup menu.
or
In the Records pane, right-click the log field (e.g., the column) you wish to
filter, and select Edit Filter from the popup menu.
Each field displays a type-specific Filter window.
Configure the filter attributes in the window as required. .
2. Click OK to apply the filter settings. The log data is filtered and displayed
accordingly..
Note - Filtering criteria takes effect only if the Apply Filter toolbar button is activated.
326
Follow Source, Destination and User Data
Note - A new window opens, displaying the relevant column (Source, Destination or User)
first.
Adding a Source
The Add Source option allows you to add a Source to the communication.
Right-click the record with the value of interest in the Records pane and select one
of the following Add Source commands:
• Add Source to Bypass indicates that connections from this source pass
transparently through InterSpect. However, basic sanity tests on the packets are
performed, and malformed packets are dropped. IP addresses can also be
added to and removed from the bypass list via SmartDashboard.
• Add Source to Block indicates that connections from this source are not allowed.
This Action isolates the zone from the rest of the network, and can be used
when a zone is infected, or is under threat. IP addresses can also be added to
and removed from the bypass list via SmartDashboard.
• Add Source to Quarantine indicates that the hosts or network of worm or attack
victims at this source are blocked at the borders of the zone for a limited period
of time, and quarantined users of a web browser are informed that they are
blocked via a customized web page. IP addresses can also be added to and
328
Configuring Queries
Configuring Queries
In This Section
Creating a Query
New queries are created by customizing existing queries and saving them under
new names.
To create a new query:
1. Select an existing query in the Query Tree (either a predefined query or a custom
query) and select Query > Copy.
A copy of the query, named New, is added to the Custom folder.
2. Rename the new query.
3. In the Query Properties pane, modify the query as required by specifying the
following for each relevant log field (column):
• Whether or not to Show the information available for that column.
• The Width of the column displaying the information.
• The Filter (conditions) applied to the column.
4. Double-click the query to run it.
• Double-click the query you would like to open. The query appears in the
Records pane.
330
Hiding and Showing the Query Tree Pane
Table 12-20
Column Description
Column The name of the column.
Show Select Show to display the corresponding column in
the Records pane. Clear the checkbox to conceal
the corresponding column.
Width The specified width of the corresponding column in
the Records pane in pixels.
Filter The items contained in this column represent the
filtering criteria used to display specific log data.
332
Copying Log Record Data
Note - The Abort option only becomes active when a certain action is being executed, for
example, when the log file is being updated or when a search is taking place.
Viewing a Rule
You can view the rule that created the log.
To view a rule:
1. Open SmartDashboard.
• Click the Database Revision Control toolbar button.
• Select Create new version upon Install Policy.
• Click Close.
• Install Policies in the SmartDashboard.
2. Go to SmartView Tracker.
3. Right-click the desired record.
4. Select View Rule in SmartDashboard. The SmartDashboard opens and the rule
appears.
Note - This process only works for logs that have a rule number and were created after the
Create a new version upon Install Policy operation is selected. In addition, this option
is only available on a Management Station. It is not available on CLM (Customer Log
Module).
Find by Interface
To find by interface, add the specific Interface. You can find according to direction,
forward and back.
334
Maintaining the Logs
Local Logging
To save logs to a local file (instead of forwarding them to the SmartCenter server or
to a log server):
1. In the SmartDashboard, double-click the gateway to display its properties
window.
2. In the Log Servers page (under the Logs and Masters branch), select Define Log
Servers and then select Save logs locally, on this machine (VM).
3. You can either set a schedule for forwarding the local file to the appropriate
machine (the SmartCenter server or a log server), or manually import these files
using SmartView Tracker.
To specify a log file forwarding schedule:
• Display the Additional Logging Configuration page (under the Logs and
Masters branch).
• In the Log forwarding settings section, set the following:
i. Select Forward log files to SmartCenter Server and select the log server
from the drop-down list.
336
Working with Log Servers
ii. Set a Log forwarding schedule by selecting the appropriate time object
from the drop-down list.
To view the local file using SmartView Tracker:
• Select Tools > Remote Files Management...
The Remote Files Management window opens, listing all Check Point Gateways
from which you can fetch Log files.
• Select the desired Check Point Gateway and click Get File List..
The Files on <Gateway Name> window opens, listing all Log files found on
the selected Check Point Gateway.
• Select one or more files to be fetched.
Note - You cannot fetch an active log file. If you want to fetch the current file, you must
first perform a log switch.
ii. Set up Secure Internal Communication between this log server and the
SmartCenter server.
• Define additional properties as needed and click OK.
3. Install the Check Point Objects Database on the log server object:
• Select Policy > Install Database....
The Install Database window opens.
• In the Install Database on list, select the log server object and click OK.
4. To set up the gateway to forward its logs to this log server, double-click the
gateway so that its properties window opens.
5. You can either forward the log records online, one by one, or you can save the
records locally, and then forward them in a file according to a specific
schedule.
To forward log records online:
• Display the Log Servers page (under the Logs and Masters branch).
• Select Define Log Servers.
• Add this log server to the Always send logs to table (click Add... to display
the Add Logging Servers window, and move the log server from the Available
Log Servers list to the Select Log Servers list).
To specify a log file forwarding schedule:
• Display the Additional Logging Configuration page (under the Logs and
Masters branch).
• In the Log forwarding settings section, set the following:
i. Select Forward log files to Management Server and select the log server
from the drop-down list.
ii. - Set a Log forwarding schedule by selecting the appropriate time object
from the drop-down list.
6. By default, when the selected log server is unreachable, the logs are written to
a local file. Alternatively, you can select a backup log server as follows:
• Display the Log Servers page (under the Logs and Masters branch).
• Under When a Log Server is unreachable, send logs to section, click Add... to
display the Add Logging Servers window.
• Move the log server from the Available Log Servers list to the Select Log
Servers list and click OK.
7. Repeat step 4 to step 6 on all relevant gateways.
8. Launch SmartView Tracker and log in to this log server (instead of the
SmartCenter server).
338
Custom Commands
Custom Commands
To configure the commands you can run through SmartView Tracker:
1. Select Tools > Custom Commands....
The Custom Commands window opens.
2. Click Add....
The Add New Command window opens.
3. Specify the following command properties:
• Menu Text, defines how this command is to be displayed in the right-click
menu (e.g., Ping).
• Command, specifying the name of the command (e.g., ping.exe).
• Arguments to be used by the command.
• IP Columns only, allowing you to apply this command only to columns that
have an IP address value (e.g., Origin, Source, Destination).
Note - It is recommended not to use a full path name in the Executable field, since the
executable file may be found in different directories of different SmartView Tracker clients.
The administrator must ensure that the command can be executed from the SmartView
Tracker installation directory. Commands requiring a full path can be executed by a script,
which all administrators save in the same directory, but each administrator edits according
to the company’s needs.
Example:
1. In the Add New Command window, add the Menu Content TELNET, which runs the
command TELNET using <Cell Value> as its Parameter.
2. In the Records pane, right-click a record with the IP address 20.13.5.2. and
select telnet from the popup menu.
The executed command is: telnet 20.13.5.2.
340
Configuring Alert Commands
342
Chapter 13
SmartCenter Management
In This Chapter
343
The Need for SmartCenter Management
344
The SmartCenter Management Solution
Versions can be created manually by the system administrator, or the system can be
set to automatically create a new version every time Security Policy installation
takes place.
Create a Version
A new version can be manually created by the system administrator, or the system
can be set to automatically create new versions every time a new policy is installed.
Each new version has the following attributes:
• the creation date
• the system administrator who initiated the new version
• the version of the software
• two editable options determined by the system administrator: the name of the
version, as well as, an additional optional comment.
Note - It is recommended to create a version before upgrading the system. This enables the
administrator to revert to a functioning environment in case of problems during the upgrade
operation.
346
Version Upgrade
View a Version
A saved version can be viewed in SmartDashboard. For every saved version you can
view certain entities such as objects, users, rules. Various operations, such as
queries, can be executed on these entities.
Delete a Version
A previously saved version can be deleted. This operation will also delete the
various databases included in the policy version.
Version Upgrade
When the SmartCenter server is upgraded, the various versions are upgraded as
well. This means that saved versions will be compliant with the upgraded software,
and there is no need to downgrade to a previous software version to revert to a
saved version. For example, new object attributes are added to comply with the new
features.
Version Diagnostics
The success or failure of version operations that require modification of the
Versions table (such as creating, reverting to or deleting a version) are audited in
the audit log of the SmartView Tracker. It is recommended that these logs be
checked to ensure that operations have taken place successfully.
Saved versions require disk space. If the existing disk space is exhausted, a
threshold alert is sent to the SmartView Monitor. Use this SmartConsole to make
sure that you meet the disk space requirements needed to implement the
versioning feature.
348
SmartCenter Management Configuration
350
Chapter 14
SmartPortal
In This Chapter
Overview
SmartPortal enables web-based administration and troubleshooting of the VPN-1
SmartCenter server. The SmartPortal product is included on the NGX R62 CD-ROM.
The product can be deployed on a dedicated server, or alongside the SmartCenter
server. SSL encrypted connections are used to access the SmartPortal web
interface. Administrative access can be limited to specific IP addresses. Dedicated
administrator users can be limited to SmartPortal access only.
351
Deploying SmartPortal on a Dedicated Server
352
Deploying SmartPortal on the SmartCenter Server
354
SmartPortal Configuration
SmartPortal Configuration
The following SmartPortal product properties can be modified by editing the
cp_httpd_admin.conf conf file. This file can be found in the SmartPortal conf
directory.
• To change the web server port, modify the PORT attribute (default is TCP
4433).
• To use HTTP instead of HTTPS set the SSL attribute to 0. It is not
recommended to do this for security reasons and should only be used when
troubleshooting.
• To change the Web Server certificate, modify the SERVCERT (the full path to the
certificate) and CERTPWD (the certificate password) attributes.
Connecting to SmartPortal
You can connect to SmartPortal using one of the following supported web browsers:
• Internet Explorer
• Mozilla
• FireFox
• Netscape
SmartPortal requires that you enable JavaScript and disable popup blockers in your
browser.
To connect to SmartPortal:
• Enter the following URL in one of the supported browsers:
https://<SmartCenter_server_ip>:4433
Note - After authenticating. click the HELP button to display the SmartPortal
Online Help. The Online help explains the functionality of each window.
Troubleshooting
• The web demon (cpwmd) error log file is cpwmd.elg and can be found in the
SmartPortal log (in Windows: C:\program
files\CheckPoint\R60\SmartPortal\portal\log and in Solaris, Linux and
SecurePlatform: /opt/CPportal-R60/portal/log) directory.
• The web server (cp_http_serve) error log file is cphttpd.elg and can be found
in the SmartPortal log directory.
• To see debug cpwmd messages, perform the following:
• cpwmd debug -app SmartPortal on
• To see debug cpwmd messages with greater detail, perform the following:
• cpwmd debug -app SmartPortal on TDERROR_ALL_ALL=5
• To see additional cp_http_server debug messages, stop the daemon using
cpwd_admin stop -name CPHTTPD and perform the following steps:
• Set the TDERROR_CPHTTPD_ALL environment variable to 5.
356
Troubleshooting
358
Chapter 15
SmartUpdate
In This Chapter
The Need for Software Upgrade and License Management page 360
The SmartUpdate Solution page 361
Upgrading Packages page 367
Managing Licenses page 375
Generating CPInfo page 384
The SmartUpdate Command Line page 385
359
The Need for Software Upgrade and License Management
360
The SmartUpdate Solution
Introducing SmartUpdate
SmartUpdate is an optional module for VPN-1 that automatically distributes
software applications and updates for Check Point and OPSEC Certified products,
and manages product licenses. It provides a centralized means to guarantee that
Internet security throughout the enterprise network is always up to date.
SmartUpdate turns time-consuming tasks that could otherwise be performed only
by experts into simple point-and-click operations.
SmartUpdate extends your organization’s ability to provide centralized policy
management across enterprise-wide deployments. SmartUpdate can deliver
automated software and license updates to hundreds of distributed security
gateways from a single management console. SmartUpdate ensures security
deployments are always up-to-date by enforcing the most current security software.
This provides greater control and efficiency while dramatically decreasing
maintenance costs of managing global security installations.
SmartUpdate enables remote upgrade, installation and license management to be
performed securely and easily. A system administrator can monitor and manage
remote gateways from a central location, and decide whether there is a need for
software upgrade, new installations or license modification.
On a VPN-1 gateway, it is possible to remotely upgrade:
• VPN-1 gateways
• Hotfixes, Hotfix Accumulators (HFAs) and patches
• Third party OPSEC applications
• VPN-1 UTM Edge/Embedded
• Nokia Operating System
• SecurePlatform
All operations that can be performed via SmartUpdate can also be performed via
thecommand line interface. See “The SmartUpdate Command Line” on page 385
for more information.
Understanding SmartUpdate
Figure 15-1illustrates the integration of SmartUpdate in the network.
Figure 15-1 SmartUpdate Architecture
362
The SmartUpdate Solution
Packages and licenses are loaded into these repositories from several sources:
• the Download Center web site (packages)
• the Check Point CD (packages)
• the User Center (licenses)
• by importing a file (packages and licenses)
• by running the cplic command line
Of the many processes that run on the VPN-1 gateways distributed across the
corporate network, two in particular are used for SmartUpdate. Upgrade operations
require the cprid daemon, and license operations use the cpd daemon. These
processes listen and wait for the information to be summoned by the SmartCenter
server.
From a remote location, an administrator logged into the SmartCenter server
initiates operations using the SmartUpdate tool. The SmartCenter server makes
contact with VPN-1 gateways via processes running on these gateways in order to
execute the operations initiated by the system administrator (e.g., attach a license,
or upload an upgrade). Information is taken from the repositories on the
SmartCenter server. For instance, if a new installation is being initiated, the
information is retrieved from the Package Repository; if a new license is being
attached to remote gateway, information is retrieved from the License Repository.
This entire process is Secure Internal Communication (SIC) based, and therefore
completely secure.
364
The SmartUpdate Solution
Common Operations
Dragging and Dropping page 365
Sorting page 365
Expanding or Collapsing page 365
Modifying the Repository View page 365
Viewing Operation Details page 366
Searching for Text page 366
Printing Views page 366
Sorting
To sort in ascending or descending order, click the column title in the Licenses or
Packages tab.
Expanding or Collapsing
To expand or collapse the VPN-1 gateways tree structure, right-click the tree root
and select Expand/Collapse.
Printing Views
To print a view, select File > Print. The Choose Window opens. Select the window
that you would like to print, e.g., Operation Status or License Repository.
Optionally, you can adjust the print setup settings, or preview the output.
366
Upgrading Packages
Upgrading Packages
In This Section
368
Upgrading Packages
370
Upgrading Packages
3. If one or more of the required packages are missing from the Package
Repository, the Download Packages window opens. Download the required
package directly to the Package Repository.
4. Click Upgrade.
The installation proceeds only if the upgrade packages for the selected
packages are available in the Package Repository.
372
Upgrading Packages
Cancelling an Operation
You can halt the distribution (that is, installation) or upgrade while in progress.
To cancel an operation:
• Select Status > Stop Operation.
At a certain point in any operation, the Stop Operation function becomes
unavailable. If you decide to cancel an operation after this point is reached, wait
for the operation to complete, and then select Packages > Uninstall.
Note - Uninstallation restores the gateway to the last management version distributed.
374
Managing Licenses
Managing Licenses
In This Section
Licensing Terminology
• Add
Licenses received from the User Center should first be added to the
SmartUpdate License Repository. Adding a local license to the License Repository
also attaches it to the gateway.
Licenses can be conveniently imported to the License Repository via a file and
they can be added manually by pasting or typing the license details.
• Attach
Licenses are attached to a gateway via SmartUpdate. Attaching a license to a
gateway involves installing the license on the remote gateway, and associating
the license with the specific gateway in the License Repository.
• Central License
A Central License is a license attached to the SmartCenter server IP address,
rather than the gateway IP address. The benefits of a Central License are:
• Only one IP address is needed for all licenses.
• A license can be taken from one gateway and given to another.
• The new license remains valid when changing the gateway IP address.
There is no need to create and install a new license.
• Certificate Key
The Certificate Key is a string of 12 alphanumeric characters. The number is
unique to each package. For an evaluation license your certificate key can be
found inside the mini pack. For a permanent license you should receive your
certificate key from your reseller.
• CPLIC
A command line for managing local licenses and local license operations. Refer
to Local Licensing Commands in the NGX R62 SmartCenter Administration Guide
for additional information.
• Detach
Detaching a license from a gateway involves uninstalling the license from the
remote gateway and making the license in the License Repository available to
any gateway.
• State
Licenses can be in one of the following states: Requires Upgrade, No NGX R62
License, Obsolete or Assigned.
376
Managing Licenses
The license state depends on whether the license is associated with the VPN-1
gateway in the License Repository, and whether the license is installed on the
remote VPN-1 gateway. The license state definitions are as follows:
• Attached indicates that the license is associated with the VPN-1 gateway in
the License Repository, and is installed on the remote VPN-1 gateway.
• Unattached indicates that the license is not associated with the VPN-1
gateway in the License Repository, and is not installed on any VPN-1
gateway.
• Requires Upgrade indicates an NG license that is installed on a NGX R62
machine, for which no replacement upgraded license exists.
• Assigned is a NGX R62 license that is associated with the VPN-1 gateway in
the License Repository, but has not yet been installed on the gateway as a
replacement for an existing NG license.
• No NGX license is an NG license that does not need a new license, or one
for which the license upgrade failed.
• Obsolete license is a pre-NGX license for which a replacement NGX R62
license is installed on an NGX R62 VPN-1 gateway.
• Upgrade Status is a field in the License Repository that contains an error
message from the User Center when the Upgrade process fails.
• Get
Locally installed licenses can be placed in the License Repository, in order to
update the repository with all licenses across the installation. The Get operation
is a two-way process that places all locally installed licenses in the License
Repository and removes all locally deleted licenses from the License Repository.
• License Expiration
Licenses expire on a particular date, or never. After a license has expired, the
functionality of the Check Point package may be impaired.
• Local License
A Local License is tied to the IP address of the specific gateway and can only be
used with a gateway or a SmartCenter server with the same address.
• Multi-License File
Licenses can be conveniently added to a gateway or a SmartCenter server via a
file, rather than by typing long text strings. Multi-license files contain more than
one license, and can be downloaded from the User Center:
https://usercenter.checkpoint.com/home2/index.jsp.
Multi-license files are supported by the cplic put, and cplic add
command-line commands.
• SKU/Features
SKU stands for Stock Keeping Unit and is a character string that identifies an
individual packages features.
License Upgrade
One of the many SmartUpdate features allows you to upgrade licenses that reside
in the License Repository. SmartUpdate takes all the licenses in the License
Repository and attempts to upgrade them using the Upgrade tool.
For a full explanation on how to upgrade licenses, refer to the Upgrading Licenses
to NGX R62 chapter in the NGX R62 Upgrade Guide.
378
Managing Licenses
380
Managing Licenses
Attaching Licenses
After licenses have been added to the License Repository, select one or more
licenses to attach to a VPN-1 gateway.
1. Select the license(s).
2. Select Licenses > Attach.
3. In the Attach Licenses window, select the desired device.
If the attach operation fails, the Local licenses are deleted from the Repository.
Detaching Licenses
Detaching a license involves deleting a single Central license from a remote VPN-1
gateway and marking it as unattached in the License Repository. This license is then
available to be used by any VPN-1 gateway.
To detach a license, select Licenses > Detach and select the licenses to be detached
from the displayed window.
Note - Local licenses, prior to NGX R62, cannot be detached from a remote VPN-1
gateway.
382
Managing Licenses
Generating CPInfo
CPInfo is a support tool that gathers into one text file a wide range of data
concerning the Check Point packages in your system. When speaking with a Check
Point Technical Support Engineer, you may be asked to run CPInfo and transmit the
data to the Support Center.
To generate CPInfo:
1. Select Tools > Generate CPInfo to run CPInfo.
2. Select the directory in which you want to save the output file.
3. Select one of the following methods to name the file:
• Based on the SR number the technician assigns you
• Acustom name that you define.
4. Optionally, you may choose to add:
• Log files to the CPInfo output
• The registry to the CPInfo output
384
The SmartUpdate Command Line
386
Chapter 16
Frequently Asked Questions
In This Chapter
387
Network Objects Management
388
Policy Management
Policy Management
How can I open or save a specific Policy? — All Policy operations (opening, saving
etc.) are performed at the Policy Package-level (as opposed to the single
policy-level). For detailed instructions, please refer to Chapter 10, “Policy
Management””.
Why are some Rule Base tabs missing when I open a Policy Package? — •Policy
Packages may include one or more of the following policies:
- a Security and Address Translation Policy, consisting of the Security, Address
Translation and VPN Manager Rule.
- a QoS Policy, displayed in the QoS Rule Base.
- a Desktop Security Policy, displayed in the Desktop Security Rule Base.
- The Web Access Rule Base.
The Rule Bases you see correspond to the Policies included in this specific
Policy Package.
After upgrading all of my products, why does the SmartDashboard show only the Security
Rue Base? — The Policy Package you are currently displaying contains only the
Security and Address Translation Policies, so the QoS and Desktop Security Policies
are not displayed. For more details, please refer to Chapter 10, “Policy
Management””.
How can I locate duplicate IP addresses? — Select Search > Query Network Objects...
from the SmartDashboard menu and select Duplicates from the Refine by drop-down
list.
The port I need to use is occupied. How can I find the corresponding service? —
Display the Object Tree’s Services tab and then sort the Objects List by its Port
column.
390
Chapter 17
Network Objects
In This Section
391
Introduction to Objects
Introduction to Objects
Network objects are created to represent actual physical machines and
components,such as gateway, servers, as well as logical components, such as IP
address 4anges and Dynamic objects.
Objects are created and managed by the system administrator via SmartDashboard.
All objects are managed using SmartDashboard, therefore it is recommended that
the objects database not be accessed or edited directly. This section provides
general information about network objects, including configuration specifications,
where applicable.
392
The Object Creation Workflow
Network Objects
In This Section
394
Check Point Objects
Gateway Cluster
A Gateway Cluster is a group of VPN-1 module machines on which Check Point
software has been installed that has been configured to provide failover services
using ClusterXL or another Cluster solution.
You can detach a Cluster member from a Gateway Cluster and convert it into a
Check Point Gateway.
396
Nodes
Nodes
A node can represent any network entity. The two most common uses of this object
are to create non-Check Point Gateways and Hosts.
• A Gateway Node is a gateway that does not have Check Point software installed.
• A Host Node is a host that does not have Check Point software installed.
Converting Nodes
• Gateway Nodes can be converted to Host Nodes and vice versa. Right-click the
specified Node in the Objects Tree and select Convert to Host or Gateway.
• Gateway Nodes can be converted to Check Point Gateways. Right-click the
Gateway Node in the Objects Tree and select Convert to Check Point Gateway.
• Host Nodes can be converted to Check Point Hosts. Right-click the specified
Host Node in the Objects Tree and select Convert to Check Point Host.
Interoperable Device
An Interoperable Device is a device that has no Check Point product software
installed. This device is managed by any Management Server, including
SmartCenter server. Although it cannot receive the Check Point Security Policy, it
can participate in Check Point VPN communities and solutions.
Networks
A Network is a group of IP addresses defined by a network address and a net mask.
The net mask indicates the size of the network.
A Broadcast IP address is an IP address which is destined for all hosts on the
specified network. If this address is included, the Broadcast IP address is
considered part of the network.
Domains
This object defines a DNS domain name.
The format of the domain name is .x.y, where each section of the domain name is
demarcated by a period. For instance .mysite.com or .mysite.co.uk. The domain
name that is specified must be an actual domain name that can be resolved to a
valid IP address. The first time that a domain name is resolved by VPN-1 a brief
delay may occur. Once the domain name has been resolved, it is entered into the
cache, and no further delays take place on any subsequent access attempts. Due to
the initial delays that may occur for each new domain name; the rules that contain
Domain objects in their Source or Destination should be placed towards the end of
the Rule Base.
398
Open Security Extension (OSE) Devices
When working with a Cisco Router (that is, OSE object), the Rule Base should not
contain any of the following or SmartCenter will fail to generate Access Lists from
the rules.
• Drop (in the Action column)
• Encrypt (Action)
• Alert (Action)
• RPC (Service)
• <??AH>(Service)
• ACE (Service)
• Authentication Rules
• Negate Cell
Note - It is recommended that you list OSE device objects in your hosts (Unix) and
lmhosts (Windows) files in addition to defining them in the VPN-1 database.
• Comment: This text is displayed in the bottom of the Network Object window
when this object is selected.
• Color: Select a colorfrom the drop-down list. The OSE device will be
represented in the color selected, throughout the SmartMap for easier user
tracking and management.
• Type: Select one of the following options from the drop-down list:
• Cisco Systems
• Nortel
Note - At least one interface must be defined in the Topology tab or Install Policy will
fail.
The Show all IPs behind gateway option shows all IP addresses behind the device in
the SmartMap View.
To add an interface, click Add. The Interface Properties window opens.
To edit an interface, select the interface and click Edit, or double-click the
interface. The Interface Properties window opens.
To delete an interface, select the interface and click Remove.
The manner in which names are specified for OSE device interfaces is different
from the manner in which they are specified for interfaces of other network objects.
The following attributes are set for device interfaces:
• Name: The name of the network interface as specified in the router’s interface
configuration scheme.
This name does not include a trailing number.
• IP Address: The IP address of the device
• Net Mask: The net mask of the device.
• Exportable for SecuRemote/SecureClient: Specifies whether information about this
object can be made available to SecuRemote/SecureClient machines.
400
Open Security Extension (OSE) Devices
Note - Logging for spoofing attempts is available for external interfaces only.
• Spoof Rules Interface Direction: The spoof tracking rules are enforced on data
packets traveling in this direction on all interfaces.Security:The security
administrator must select either none, Wellfleet or Other from the drop-down
list.
• Password: The password to access the OSE device.
• Additional Managers — Additional managers as defined in the Bay Site Manager
software.
• Volume: The volume on the OSE device.
• Config File: The name of the config file on the OSE device.
• Version: The version of the OSE device (7.x, 8.x, 9.x, 10.x, 11.x, or 12.x).
• OSE Device Access
• Username: The name required to log on to the OSE device.
• Password: The password to access the OSE device.
• Manager Password: The password required to connect to the OSE device.
• Interface Directions
• Rules: The direction in which the rules are enforced on the OSE device
interfaces
• Spoof Rules: The direction in which spoof rules are enforced on each OSE
device interface
• Generate ICMP Errors: For denied packets, this option specifies whether or not
the OSE Device should generate ICMP destination administratively unreachable
messages (ICMP type 13).
Groups
A network objects group is a collection of hosts, gateways, networks or other
groups.
Groups are used in cases where you cannot work with single objects, e.g., when
working with VPN domains or with topology definitions.
In addition, groups can greatly facilitate and simplify network management, since
they allow you to perform operations only once instead of repeating them for every
group member.
402
Logical Servers
The Group Properties window lists the network objects included from the group
versus those excluded from the group. To configure the group, move objects
between the lists as needed.
To include an unlisted network object in the group, create it now by clicking New...
This window shows collapsed sub-groups, without listing their members. For a list
of all group members (including the sub-groups’ members), click View Expanded
Group....
Logical Servers
A Logical Server is a group of machines that provides the same services. The
workload of this group is distributed between all its members.
When a Server group is stipulated in the Servers group field, the client is bound to
this physical server. In Persistent server mode, the client and the physical server
are bound for the duration of the session.
• Persistency by Service: Once a client is connected to a physical server for a
specified service, subsequent connection to the same Logical Server and the
same service are redirected to the same physical server for the duration of the
session.
• Persistency by Server: Once a client is connected to a physical server,
subsequent connections to the same Logical Server (for any service) are
redirected to the same physical server for the duration of the session.
Balance Method
The load balancing algorithm stipulates how the traffic is balanced between the
servers. There are several types of balancing methods:
• Server Load: VPN-1 determines which server is best equipped to handle the new
connection.
• Round Trip Time: On the basis of the shortest round trip time between VPN-1
and the servers, executed by a simple ping, VPN-1 determines which Server is
best equipped to handle the new connection.
• Round Robin: The new connection is assigned to the first available server.
• Random: The new connection is assigned to a server at random.
• Domain: The new connection is assigned to a server based on domain names.
Address Ranges
An Address Range object stipulates the range of IP addresses used in the network
from the first to the last IP address.
This object is used when the networks themselves do not have IP address-net mask
alignment, so an Address Range is necessary for the implementation of:
• NAT, and
• VPN
Dynamic Objects
A dynamic object is a "logical" object where the IP address will be resolved
differently per VPN-1 module using the dynamic_objects command.
The following are the predefined Dynamic Objects:
• LocalMachine-all-interfaces: The DAIP machine interfaces (static and dynamic)
are resolved into this object.
• LocalMachine: The external interface (dynamic) of the ROBO gateway (as
declared in cpconfig when configuring the ROBO gateway).
• InternalNet:The internal interface of the ROBO gateway (as declared in cpconfig
when configuring the ROBO gateway).
• AuxiliaryNet: The auxiliary interface of the ROBO gateway (as declared in
cpconfig when configuring the ROBO gateway).
404
VoIP Domains
• DMZNet: The DMZ interface of the ROBO gateway (as declared in cpconfig
when configuring the ROBO gateway).
For more information see the CLI Administration Guide.
VoIP Domains
There are five types of VoIP Domain objects:
• VoIP Domain SIP Proxy
• VoIP Domain H.323 Gatekeeper
• VoIP Domain H.323 Gateway
• VoIP Domain MGCP Call Agent
• VoIP Domain SCCP CallManager
In many VoIP networks, the control signals follow a different route through the
network than the media. This is the case when the call is managed by a signal
routing device. Signal routing is done in SIP by the Redirect Server, Registrar,
and/or Proxy. In SIP, signal routing is done by the Gatekeeper and/or Gateway.
Enforcing signal routing locations is an important aspect of VoIP security. It is
possible to specify the endpoints that the signal routing device is allowed to
manage. This set of locations is called a VoIP Domain. For more information, refer
to the Firewall and SmartDefense Administration Guide.
406
Chapter 18
Overview of VPN
In This Chapter
407
The Connectivity Challenge
408
The Basic Check Point VPN Solution
What is VPN
Check Point’s UTM-1 is an integrated software solution that provides secure
connectivity to corporate networks, remote and mobile users, branch offices and
business partners on a wide range of open platforms and security appliances.
Figure 18-3 shows the variety of applications and appliances suitable for UTM-1,
from hand-held PDAs and wireless laptops to mission critical networks and servers:
UTM-1 Components
UTM-1 is composed of:
• VPN endpoints, such as Gateways, clusters of Gateways, or remote client
software (for mobile users) which negotiate the VPN link.
• VPN trust entities, for example the Check Point Internal Certificate Authority.
The ICA is part of the UTM-1 suite used for establishing trust for SIC
connections between Gateways, authenticating administrators and third party
servers. The ICA provides certificates for internal Gateways and remote access
clients which negotiate the VPN link.
• VPN Management tools. SmartCenter Server and SmartDashboard.
SmartDashboard is the SmartConsole used to access the SmartCenter Server
Management. The VPN Manager is part of SmartDashboard. SmartDashboard
enables organizations to define and deploy Intranet, and remote Access VPNs.
410
The Basic Check Point VPN Solution
VPN Communities
There are two basic community types - Mesh and Star. A topology is the collection
of enabled VPN links in a system of Gateways, their VPN domains, hosts located
behind each Gateway and the remote clients external to them.
In a Mesh community, every Gateway has a link to every other Gateway, as shown in
Figure 18-4:
Figure 18-4 UTM-1 Gateways in a Mesh community
In a Star community, only Gateways defined as Satellites (or “spokes”) are allowed
to communicate with a central Gateway (or “Hub”) but not with each other:
412
The Basic Check Point VPN Solution
414
Chapter 19
Introduction to
Site to Site VPN
In This Chapter:
415
The Need for Virtual Private Networks
Confidentiality
Only the communicating parties must be able to read the private information
exchanged between them.
Authentication
The communicating parties must be sure they are connecting with the intended
party.
Integrity
The sensitive data passed between the communicating parties is unchanged, and
this can be proved with an integrity check.
416
The Check Point Solution for VPN
How it Works
In Figure 19-8, host 1 and host 6 need to communicate. The connection passes in
the clear between host 1 and the local Gateway. From the source and destination
addresses of the packet, the Gateway determines that this should be an encrypted
connection. If this is the first time the connection is made, the local Gateway
initiates an IKE negotiation with the peer Gateway in front of host 6. During the
negotiation, both Gateways authenticate each other, and agree on encryption
methods and keys. After a successful IKE negotiation, a VPN tunnel is created.
From now on, every packet that passes between the Gateways is encrypted
according to the IPSec protocol. IKE supplies authenticity (Gateways are sure they
are communicating with each other) and creates the foundation for IPSec. Once the
tunnel is created, IPSec provides privacy (through encryption) and integrity (via
one-way hash functions).
After a VPN tunnel has been established (Figure 19-8), packets are dealt with in
the following way:
• A packet leaves the source host and reaches the Gateway.
• The Gateway encrypts the packet.
• The packet goes down the VPN tunnel to the second Gateway. In actual fact,
the packets are standard IP packets passing through the Internet. However,
because the packets are encrypted, they can be considered as passing through
a private “virtual” tunnel.
• The second Gateway decrypts the packet.
• The packet is delivered in the clear to the destination host. From the hosts
perspective, they are connecting directly.
418
The Check Point Solution for VPN
VPN Communities
Creating VPN tunnels between Gateways is made easier through the configuration
of VPN communities. A VPN community is a collection of VPN enabled Gateways
capable of communicating via VPN tunnels.
To understand VPN Communities, a number of terms need to be defined:
• VPN Community member. Refers to the Gateway that resides at one end of a
VPN tunnel.
• VPN domain. Refers to the hosts behind the Gateway. The VPN domain can be
the whole network that lies behind the gateway or just a section of that
network. For example a Gateway might protect the corporate LAN and the DMZ.
Only the corporate LAN needs to be defined as the VPN domain.
• VPN Site. Community member plus VPN domain. A typical VPN site would be
the branch office of a bank.
• VPN Community. The collection of VPN tunnels/links and their attributes.
• Domain Based VPN. Routing VPN traffic based on the encryption domain
behind each Gateway in the community. In a star community, this allows
satellite Gateways to communicate with each other through center Gateways.
• Route Based VPN. Traffic is routed within the VPN community based on the
routing information, static or dynamic, configured on the Operating Systems of
the Gateways.
Figure 19-9 VPN Terminology
The methods used for encryption and ensuring data integrity determine the type of
tunnel created between the Gateways, which in turn is considered a characteristic
of that particular VPN community.
VPN Topologies
The most basic topology consists of two Gateways capable of creating a VPN tunnel
between them. SmartCenter Server’s support of more complex topologies enables
VPN communities to be created according to the particular needs of an
organization. SmartCenter Server supports two main VPN topologies:
• Meshed
• Star
420
The Check Point Solution for VPN
A satellite Gateway cannot create a VPN tunnel with a Gateway that is also defined
as a satellite Gateway.
Central Gateways can create VPN tunnels with other Central Gateways only if the
Mesh center gateways option has been selected on the Central Gateways page of the
Star Community Properties window.
Choosing a topology
Which topology to choose for a VPN community depends on the overall policy of the
the organization. For example, a meshed community is usually appropriate for an
Intranet in which only Gateways which are part of the internally managed network
are allowed to participate; Gateways belonging to company partners are not.
A Star VPN community is usually appropriate when an organization needs to
exchange information with networks belonging to external partners. These partners
need to communicate with the organization but not with each other. The
organization’s Gateway is defined as a “central” Gateway; the partner Gateways are
defined as “satellites.”
For more complex scenarios, consider a company with headquarters in two
countries, London and New York. Each headquarters has a number of branch
offices. The branch offices only need to communicate with the HQ in their country,
not with each other; only the HQ’s in New York and London need to communicate
directly. To comply with this policy, define two star communities, London and New
York. Configure the London and New York Gateways as “central” Gateways.
Configure the Gateways of New York and London branch offices as “satellites.” This
allows the branch offices to communicate with the HQ in their country. Now create
a third VPN community, a VPN mesh consisting of the London and New York
Gateways.
Figure 19-12Two stars and mesh
422
The Check Point Solution for VPN
In this solution, Gateways in the Washington mesh are also defined as satellites in
the London star. In the London star, the central Gateways are meshed. Gateways in
Washington build VPN tunnels with the London Gateways using DES. Internally, the
Washington Gateways build VPN tunnels using 3DES.
The London and New York Gateways belong to the London-NY Mesh VPN
community. To create an additional VPN community which includes London, New
York, and Paris is not allowed. The London and New York Gateways cannot appear
“together” in more than one VPN community.
Two Gateways that can create a VPN link between them in one community can
appear in another VPN community provided that they are incapable of creating a
link between them in the second community. For example:
424
The Check Point Solution for VPN
In Figure 19-15, The London and New York Gateways appear in the London-NY
mesh. These two Gateways also appear as Satellite Gateways in the Paris Star VPN
community. In the Paris Star, satellite Gateways (London and NY) can only
communicate with the central Paris Gateway. Since the London and New York
satellite Gateways cannot open a VPN link between them, this is a valid
configuration.
426
The Check Point Solution for VPN
Note - If both Domain Based VPN and Route Based VPN are configured, then Domain
Based VPN will take precedence.
Table 19-2
Source Destination VPN Service Action
Any Any Community_A HTTP Accept
The connection is matched only if all the conditions of the rule are true, that is - it
must be an HTTP connection between a source and destination IP address within
VPN Community A. If any one of these conditions is not true, the rule is not
matched. If all conditions of the rule are met, the rule is matched and the
connection allowed.
It is also possible for a rule in the Security Policy Rule Base to be relevant for both
VPN communities and host machines not in the community. For example:
Figure 19-16 Access control in VPN communities
428
The Check Point Solution for VPN
The rule in the Security Policy Rule base allows an HTTP connection between any
internal IP with any IP:
Table 19-3
Source Destination VP Service Action
N
Any_internal_machine Any Any HTTP Accept
In Figure 19-16, an HTTP connection between host 1 and the Internal web server
behind Gateway 2 matches this rule. A connection between the host 1 and the web
server on the Internet also matches this rule; however, the connection between host
1 and the internal web server is a connection between members of a VPN
community and passes encrypted; the connection between host 1 and the Internet
web server passes in the clear.
In both cases, the connection is simply matched to the Security Policy Rule;
whether or not the connection is encrypted is dealt with on the VPN level. VPN is
another level of security separate from the access control level.
Excluded Services
In the VPN Communities Properties window Excluded Services page, you can select
services that are not to be encrypted, for example Firewall control connections.
Services in the clear means “do not make a VPN tunnel for this connection”. For
further information regarding control connections, see: “How to Authorize Firewall
Control Connections in VPN Communities” on page 442. Note that Excluded
Services is not supported when using Route Based VPN.
430
Configuring Site to Site VPNs
Note - There is nothing to configure on the VPN page, regarding certificates, since
internally managed Gateways automatically receive a certificate from the internal CA.
432
Configuring Site to Site VPNs
c. On the General page, select Accept all encrypted traffic if you need all traffic
between the Gateways to be encrypted. If not, then create appropriate rules
in the Security Policy Rule Base that allows encrypted traffic between
community members.
d. On the Participating Gateways page, add the Gateways created in step 1.
A VPN tunnel is now configured. For more information on other options, such as
VPN Properties, Advanced Properties, and Shared Secret, see the IPSEC and IKE
chapter in the VPN Administration Guide.
3. If you did not select Accept all encrypted traffic in the community, build an
access control policy, for example:
Table 19-4
Source Destination VPN Service Action
Any Any Meshed Any Accept
community
Where “Meshed community” is the VPN community you have just defined.
434
Configuring a VPN with External Gateways Using PKI
Note - Configuring a VPN using PKI and certificates is considered more secure than using
pre-shared secrets.
Although an administrator may choose which community type to use, the Star
Community is more natural for a VPN with externally managed gateways. The
Internal gateways will be defined as the central gateways while the external ones
will be defined as the satellites. The decision whether to mesh the central, internal
Gateways or not depends on the requirements of the organization. The diagram
below shows this typical topology.
Note that this is the Topology from the point of view of the administrator of
Gateways A1 and A2. The Administrator of Gateways B1 and B2 may well also
define a Star Topology, but with B1 and B2 as his central Gateways, and A1 and
A2 as satellites.
436
Configuring a VPN with External Gateways Using PKI
• In the Topology page, define the Topology, and the VPN Domain. If the VPN
Domain does not contain all the IP addresses behind the gateway, define
the VPN domain manually by defining a group or network of machines and
setting them as the VPN Domain.
2. If the ICA certificate is not appropriate for this VPN tunnel, then in the VPN
page, generate a certificate from the relevant CA.
3. Define the Network Object(s) of the externally managed gateway(s).
• If it is not a Check Point Gateway, define an Interoperable Device object
from: Manage > Network Objects... > New... > Interoperable Device...
• If it is a Check Point Gateway, In the Network Objects tree, right click and
select New > Check Point > Externally Managed Gateway....
4. Set the various attributes of the peer gateway. In particular, be sure to do the
following:
• In the General Properties page of the Gateway object, select VPN (for an
Externally Managed Check Point Gateway object only).
• in the Topology page, define the Topology and the VPN Domain using the
VPN Domain information obtained from the peer administrator. If the VPN
Domain does not contain all the IP addresses behind the gateway, define
the VPN domain manually by defining a group or network of machines and
setting them as the VPN Domain.
• In the VPN page, define the Matching Criteria. specify that the peer must
present a certificate signed by its own CA. If feasible, enforce details that
appear in the certificate as well.
5. Define the Community. The following details assume that a Star Community
was chosen, but a Meshed Community is an option as well. If working with a
Meshed community ignore the difference between the Central Gateways and the
Satellite Gateways.
• Agree with the peer administrator about the various IKE properties and set
them in the VPN Properties page and the Advanced Properties page of the
community object.
• Define the Central Gateways. These will usually be the internally managed
ones. If there is no another Community defined for them, decide whether or
not to mesh the central gateways. If they are already in a Community, do
not mesh the central Gateways.
• Define the Satellite Gateways. These will usually be the external ones.
6. Define the relevant access rules in the Security Policy. Add the Community in
the VPN column, the services in the Service column, the desired Action, and the
appropriate Track option.
7. Install the Security Policy.
438
Configuring a VPN with External Gateways Using a Pre-Shared Secret
Note - Configuring a VPN using PKI and certificates is considered more secure than using
pre-shared secrets.
Although an administrator may choose which community type to use, the Star
Community is more natural for a VPN with externally managed gateways. The
Internal gateways will be defined as the central gateways while the external ones
will be defined as the satellites. The decision whether to mesh the central, internal
Gateways or not depends on the requirements of the organization. The diagram
below shows this typical topology.
Note that this is the Topology from the point of view of the administrator of
Gateways A1 and A2. The administrator of Gateways B1 and B2 may well also
define a Star Topology, but with B1 and B2 as his central Gateways, and A1 and
A2 as satellites.
440
Configuring a VPN with External Gateways Using a Pre-Shared Secret
• in the Topology page, define the Topology and the VPN Domain using the
VPN Domain information obtained from the peer administrator. If the VPN
Domain does not contain all the IP addresses behind the gateway, define
the VPN domain manually by defining a group or network of machines and
setting them as the VPN Domain.
4. Define the Community. The following details assume that a Star Community
was chosen, but a Meshed Community is an option as well. If working with a
Mesh community ignore the difference between the Central Gateways and the
Satellite Gateways.
• Agree with the peer administrator about the various IKE properties and set
them in the VPN Properties page and the Advanced Properties page of the
community object.
• Define the Central Gateways. These will usually be the internally managed
ones. If there is no another Community defined for them, decide whether or
not to mesh the central gateways. If they are already in a Community, do
not mesh the central Gateways.
• Define the Satellite Gateways. These will usually be the external ones.
5. Agree on a pre-shared secret with the administrator of the external Community
members. Then, in the Shared Secret page of the community, select Use Only
Shared Secret for all External Members. For each external peer, enter the
pre-shared secret.
6. Define the relevant access rules in the Security Policy. Add the Community in
the VPN column, the services in the Service column, the desired Action, and the
appropriate Track option.
7. Install the Security Policy.
442
How to Authorize Firewall Control Connections in VPN Communities
Note - Even though control connections between the SmartCenter Server and the Gateway
are not encrypted by the community, they are nevertheless encrypted and authenticated
using Secure Internal Communication (SIC).
444
Chapter 20
Introduction to Remote
Access VPN
In This Chapter
445
Need for Remote Access VPN
446
The Check Point Solution for Remote Access
VPN-1 SecuRemote — Check Point’s Remote Access VPN solution — enables you
to create a VPN tunnel between a remote user and your organization’s internal
network. The VPN tunnel guarantees:
• Authenticity, by using standard authentication methods
• Privacy, by encrypting data
• Integrity, by using industry-standard integrity assurance methods
SecuRemote/SecureClient extends VPN functionality to remote users, enabling
users to securely communicate sensitive information to networks and servers over
the VPN tunnel, using LAN, wireless LAN and various dial-up (including
broadband) connections. Users are managed either in the internal database of the
UTM-1 Gateway or via an external LDAP server.
After a SecuRemote user is authenticated, a transparent secured connection is
established.
SecuRemote works with:
• UTM-1 Gateways.
• VPN-1 UTM Edge Gateways
Security Features
• A Desktop Security Policy.
• Logging and Alerts
• Secure Configuration Verification (SCV)
Connectivity Features
• Office mode addresses (see: “Office Mode” on page 475).
• Visitor mode (see: “Resolving Connectivity Issues” on page 571.)
• Hub mode.
Management Features
• Automatic software distribution.
• Advanced packaging and distribution options
• Diagnostic tools
448
The Check Point Solution for Remote Access
If the client is behind the Gateway (for example, if the user is accessing the
corporate LAN from a company office), connections from the client to destinations
that are also behind the LAN Gateway are not encrypted.
450
The Check Point Solution for Remote Access
Connection Mode
The remote access clients connect with Gateways using Connect mode.
During connect mode, the remote user deliberately initiates a VPN link to a specific
Gateway. Subsequent connections to any host behind other Gateways will
transparently initiate additional VPN links as required.
Connect mode offers:
• Office mode, to resolve routing issues between the client and the Gateway. See,
“Office Mode” on page 475.
• Visitor mode, for when the client needs to tunnel all client to Gateway traffic
through a regular TCP connection on port 443.
• Routing all traffic through Gateway (Hub mode), to achieve higher levels of
security and connectivity.
• Auto connect, when an application tries to open a connection to a host behind
a Gateway, the user is prompted to initiate a VPN link to that Gateway. For
example, when the e-mail client tries to access the IMAP server behind Gatway
X, SecureClient prompts the user to initiate a tunnel to that Gateway.
• User profiles (Location Profiles). See: “User Profiles” on page 451.
User Profiles
Mobile users are faced with a variety of connectivity issues. During the morning
they find themselves connected to the LAN of a partner company; during the
evening, behind some kind of NATing device employed by the hotel where they are
staying.
Different user profiles are used to overcome changing connectivity conditions.
Users create their own profiles, or the network administrator creates a number of
profiles for them. If the administrator creates a profile, the profile is downloaded to
the client when the user updates the site topology. The user selects which profile to
work with from a list. For example, a profile that enables UDP encapsulation in
order to cope with some NATing device, or a profile that enables Visitor mode when
the remote client must tunnel the VPN connection over port 443. The policy server
used to download the Desktop Security Policy is also contained in the profile.
452
The Check Point Solution for Remote Access
Digital Certificates
Digital Certificates are the most recommended and managable method for
authentication. Both parties present certificates as a means of proving their
identity. Both parties verify that the peer’s certificate is valid (i.e. that it was signed
by a known and trusted CA, and that the certificate has not expired or been
revoked).
Digital certificates are issued either by Check Point’s Internal Certificate Authority
or third-party PKI solutions. Check Point’s ICA is tightly integrated with VPN and is
the easiest way to configure a Remote Access VPN. The ICA can issue certificates
both to UTM-1 gateways (automatically) and to remote users (generated or
initiated).
Using the ICA, generate a certificate and transfer it to the user “out-of-band.”
Alternatively, initiate the certificate generation process on SmartCenter Server. The
process is completed independently by the user. The administrator can also initiate
a certificate generation on the ICA management tool (the only option available if
users are defined on an LDAP server).
It is also possible to use third-party Certificate Authorities to create certificates for
authentication between UTM-1 Gateways and remote users. The supported
certificate formats are PKCS#12, CAPI, and Entrust.
Users can also be provided with a hardware token for storing certificates. This
option offers the advantage of higher level of security, since the private key resides
only on the hardware token.
As part of the certificate validation process during the IKE negotiation, both the
client and the Gateway check the peer’s certificate against the Certificate
Revocation List (CRL) published by the CA which issued the certificate. If the client
is unable to retrieve a CRL, the Gateway retrieves the CRL on the client’s behalf
and transfers the CRL to the client during the IKE negotiation (the CRL is digitally
signed by the CA for security).
Pre-Shared Secret
This authentication method has the advantage of simplicity, but it is less secure
than certificates. Both parties agree upon a password before establishing the VPN.
The password is exchanged “out-of-band”, and reused multiple times. During the
authentication process, both the client and Gateway verify that the other party
knows the agreed-upon password.
Note - Passwords configured in the pre-shared secret tab are used in hybrid mode IKE and
not in pre-shared secret mode. Pre-shared secret IKE mode is used for working with 4.1
Clients.
454
The Check Point Solution for Remote Access
For additional information regarding authentication methods that are not based on
certificates or pre-shared secrets see: The Authentication chapter in the FireWall
and SmartDefense Administration Guide.
Advanced Features
Remote Access VPN supports other advanced features such as:
• Resolving connectivity and routing issues. See: “Office Mode” on page 475,
and “Resolving Connectivity Issues” on page 571.
• IP-per-user/group.
• L2TP clients.
Alternatives to SecuRemote/SecureClient
To avoid the overhead of installing and maintaining client software, Check Point
also provides the SSL Network Extender, a simple-to-implement thin client
installed on the user’s machine via a web browser. The browser connects to an SSL
enabled web server and downloads the thin client as an ActiveX component.
Installation is automatic.
456
VPN for Remote Access Considerations
There are two main difference between user management on the internal database,
and user management on a SmartDirectory (LDAP) server. Firstly, user management
in the SmartDirectory (LDAP) server is done externally and not locally. Secondly, on
a SmartDirectory (LDAP) server templates can be modified and applied to users
dynamically. This means that user definitions are easy to change and to manage;
and changes are instantaneous or “live”. Changes that are applied to a
SmartDirectory (LDAP) template are reflected immediately for all users who are
using that template.
458
VPN for Remote Access Configuration
The following configuration assumes you are working in the Simplified mode. If not,
go to Policy > Global Properties >VPN, select Simplified mode to all new Security
Policies and create a new Security Policy.
Establishing Remote Access VPN requires configuration on both the Gateway side
(via SmartCenter server) and remote user side.
For the Gateway side, the administrator needs to:
1. Define the Gateway
2. Decide how to manage users
3. Configure the VPN community and its participants
4. Set appropriate access control rules in the Security Policy Rule Base
5. Install the policy on the Gateway
On the remote client side, the user needs to:
1. Define a site
2. Register to the internal CA to receive a certificate (if required)
3. Connect to the site.
For more information see the SecuRemote/SecureClient Guide.
460
VPN for Remote Access Configuration
462
VPN for Remote Access Configuration
Note - The DN on the certificate must include the user’s LDAP branch. Some PKI solutions
do not include (by default) the whole branch information in the subject DN, for example the
DN only includes the common name. This can be rectified in the CA configuration.
464
VPN for Remote Access Configuration
For users with certificates, it is possible to specify that only certificates with a
specified suffix in their DN are accepted. This feature is enabled by default,
and is required only if:
• Users are defined in the internal database, and
• The user names are not the full DN.
All certificates DN’s are checked against this suffix.
Note - If an hierarchy of Certificate Authorities is used, the chain certificate of the user
must reach the same root CA that the Gateway trusts.
466
VPN for Remote Access Configuration
Table 20-5
Source Destination VPN Service Action Track
Any SMTP_SRV Remote_Access_Community SMTP Accept Log
468
VPN for Remote Access Configuration
2. Select Renew users internal CA certificates and specify a time period. The time
period is the number of days before the user’s certificate is about to expire in
which the client will attempt to renew the certificate.
3. Install the Security Policy.
4. Instruct the user to update the site’s topology.
Revoking Certificates
The way in which certificates are revoked depends on whether they are managed
internally or externally, via LDAP.
470
VPN for Remote Access Configuration
4. If you want the encryption and data integrity algorithms of the user to be taken
from the Global Properties definitions, select Defined in the Remote Access VPN
page of the Global Properties window. If you want to customize the algorithms
for this user, select Defined below and select the appropriate encryption and
data integrity algorithms.
SoftID operates the same as the passcode device but consists only of software that
sits on the desktop.
The Advanced view displays the tokencode and passcode with COPY buttons,
allowing the user to cut and paste between softID and SecureClient.
472
VPN for Remote Access Configuration
In this window, the remote user needs to enter the Token Serial Number and PIN.
If the remote user does not enter a PIN number, the following window appears:
If the token requires a passphrase, the remote user sees this window:
474
Chapter 21
Office Mode
In This Chapter
The Need for Remote Clients to be Part of the LAN page 476
Office Mode Solution page 477
Office Mode Considerations page 489
Configuring Office Mode page 490
475
The Need for Remote Clients to be Part of the LAN
476
Office Mode Solution
Note - A remote user with SecuRemote only is not supported in Office Mode.
A Closer Look
The following steps illustrate the process taking place when a remote user
connected through Office Mode wishes to exchange some information with
resources inside the organization:
• The user is trying to connect to some resource on the LAN, thus a packet
destined for the internal network is to be sent. This packet is routed through
the virtual interface that Office Mode had set up, and bears the source IP
address allocated for the remote user.
• The packet is encrypted and builds a new encapsulating IP header for it. The
source IP of the encapsulating packet is the remote client’s original IP address,
and its destination is the IP address of the UTM-1 Gateway. The encapsulated
packet is then sent to the organization through the Internet.
478
Office Mode Solution
• The UTM-1 Gateway of the organization receives the packet, decapsulates and
decrypts it, revealing the original packet, which bears the source IP allocated
for the remote user. The Gateway then forwards the decapsulated packet to its
destination.
• The internal resource gets a packet seemingly coming from an internal address.
It processes the packet and sends response packets back to the remote user.
These packets are routed back to the (internal) IP address assigned to the
remote user.
• The gateway gets the packet, encrypts and encapsulates it with the remote
users’ original (routable) IP address and returns the packet back to the remote
user:
Figure 21-23Packets routed correctly to the remote client.
In Figure 21-23:
• The remote host uses the Office mode address in the encapsulated packet and
10.0.0.1 in the encapsulating header.
• The packet is NATed to the new source address: 192.168.17.5
• The Gateway decapsulates the NATed IP address and decrypts the packet. The
source IP address is the Office Mode address.
• The packet is forwarded to the internal server, which replies correctly.
Assigning IP Addresses
The internal IP addresses assigned by the gateway to the remote user can be
allocated using one of the following methods:
• IP Pool
• DHCP Server
IP Pool
The System Administrator designates a range of IP addresses to be utilized for
remote client machines. Each client requesting to connect in Office Mode is
provided with a unique IP address from the pool.
480
Office Mode Solution
DHCP Server
A Dynamic Host Configuration Protocol (DHCP) server can be used to allocate IP
addresses for Office Mode clients. When a remote user connects to the Gateway
using Office Mode, the Gateway requests the DHCP server to assign the user an IP
address from a range of IP addresses designated for Office Mode users.
UTM-1 Gateway DHCP requests can contain various client attributes that allow
DHCP clients to differentiate themselves. The attributes are pre configured on the
client side operating system, and can be used by different DHCP servers in the
process of distributing IP addresses. UTM-1 Gateways DHCP request can contain
the following attributes:
• Host Name
• Fully Qualified Domain Name (FQDN)
• Vendor Class
• User Class
RADIUS Server
A RADIUS server can be used for authenticating remote users. When a remote user
connects to a Gateway, the username and password are passed on to the RADIUS
server, which checks that the information is correct, and authenticates the user.
The RADIUS server can also be configured to allocate IP addresses.
Note - Authentication and IP assignment must be performed by the same RADIUS server.
482
Office Mode Solution
Anti Spoofing
With Anti Spoofing, a network administrator configures which IP addresses are
expected on each interface of the UTM-1 Gateway. Anti-spoofing ensures IP
addresses are only received or transmitted in the context of their respective gateway
interfaces. Office Mode poses a problem to the anti-spoofing feature, since a client
machine can connect and authenticate through several interfaces, e.g. the external
interface to the Internet, or the wireless LAN interface; thus an Office Mode IP
address may be encountered on more than one interface. Office Mode enhances
Anti Spoofing by making sure an encountered Office Mode IP address is indeed
assigned to the user, authenticated on the source IP address on the IPSec
encapsulating packet, i.e. the external IP.
Note - When Office Mode per Site is activated, Office Mode Anti-Spoofing is not enforced.
484
Office Mode Solution
In this scenario:
• The remote user makes a connection to Gateway 1.
• Gateway 1 assigns an Office Mode IP address to the remote user.
• While still connected to Gateway 1, the remote user can make a connection to
hosts behind Gateway 2 using the Office Mode IP address issued by Gateway 1.
The Solution
There are two ways to implement this feature, depending on whether IP addresses
are allocated by a DHCP server or IP Pool.
DHCP Server
If Office Mode addresses are allocated by a DHCP server, proceed as follows:
1. Open the Check Point object from the Objects Tree.
2. In the Object Properties > Remote Access >Office Mode page:
• Enable Office Mode (either for all users or for the relevant group)
• Select a DHCP server and under MAC address for DHCP allocation, select
calculated per user name
3. Install the Policy on the Module.
4. On the Module, run the following command to obtain the MAC address assigned
to the user.
vpn macutil <username>
5. On the DHCP Server make a new reservation, specifying the IP address and
MAC address, assigning the IP address for the exclusive use of the given user.
486
Enabling IP Address per User
ipassignment.conf File
The $FWDIR/conf/ipassignment.conf file on the Module, is used to implement the
IP-per-user feature. It allows the administrator to assign specific addresses to
specific users or specific ranges to specific groups when they connect using Office
Mode or L2TP clients.
For an explanation of the file’s syntax, see the comments (the lines beginning with
the # character) in the sample file below.
488
Office Mode Considerations
Before configuring Office Mode the assumption is that standard VPN Remote
Access has already been configured. For more details on how to configure VPN
Remote Access, see “Introduction to Remote Access VPN” on page 445.
Before starting the Office Mode configuration, you must select an internal address
space designated for remote users using Office Mode. This can be any IP address
space, as long as the addresses in this space do not conflict with addresses used
within the enterprise domain. It is possible to choose address spaces which are not
routable on the Internet, such as 10.x.x.x.
The basic configuration of Office Mode is using IP pools. The configuration of
Office Mode using DHCP for address allocation can be found in “Office Mode —
DHCP Configuration” on page 496.
490
Configuring Office Mode
2. Open the Gateway object through which the remote users will connect to the
internal network and select the Remote Access > Office Mode page. Enable Office
Mode for either all users or for a certain group.
It is possible to specify which WINS and DNS servers Office Mode users should
use. To specify WINS and/or DNS servers, continue to step 3. Otherwise skip to
step 6.
Note - WINS and DNS servers should be set on the SmartCenter machine only when IP
pool is the selected method.
3. Create a DNS server object, by selecting Manage > Network Objects > New >
Node > Host and specify the DNS machine’s name, IP address and subnet
mask. Repeat this step if you have additional DNS servers.
4. Create a WINS server object, by selecting Manage > Network objects > New >
Node > Host and specify the WINS machine’s name, IP address and subnet
mask. Repeat this step if you have additional WINS servers.
5. In the Check Point Gateway — Remote Access > Office Mode page, in the IP Pool
section click the “optional parameters” button.
• In the IP Pool Optional Parameters window, select the appropriate objects for
the primary and backup DNS and WINS servers.
• In the Domain name field, specify the suffix of the domain where the
internal names are defined. This instructs the Client as per what suffix to
add when it addresses the DNS server (e.g. example.com).
6. Install the Policy.
7. Make sure that all the internal routers are configured to route all the traffic
destined to the internal address space you had reserved to Office Mode users
through the UTM-1 Gateway. For instance, in the example above it is required
to add routes to the class C sub network of 10.130.56.0 through the gateway’s
IP address.
In addition to the steps mentioned for the gateway side configuration, a few
configuration steps have to be performed on the client side in order to connect to
the gateway in Office Mode.
See: “Office Mode Configuration on SecureClient” on page 499.
492
Configuring Office Mode
In this scenario:
• (10.10.5.0, 10.10.5.129), (10.10.9.0, 10.10.9.255), and (70.70.70.4,
70.70.70.90) are the VPN remote clients source IP address ranges
• (1.1.1.5, 1.1.1.87), (1.1.1.88, 1.1.1.95), and (8.8.8.6, 8.8.8.68) are the
Office Mode IP addresses that will be assigned to the remote users whose
source IP falls in the range defined on the same line.
• For example: A user with a source IP address between 10.10.10.5.0 and
10.10.5.129, will receive an Office Mode address between 1.1.1.5 and
1.1.1.87.
IP Assignment Based on Source IP Address is enabled using a flag in the
\FWDIR\conf\objects_5_0.C file. Add the following flag:
om_use_ip_per_src_range (followed by value)
One of the following values should be applied to the flag:
• [Exclusively] - If the remote hosts IP is not found in the source range, remote
user does not get an Office Mode IP address.
• [True] - If the remote hosts IP is not found in the source IP range, the user will
get an Office Mode IP address using another method.
• [False] (default)- The flag is not used.
494
Configuring Office Mode
496
Configuring Office Mode
• Changes to the Broadcast Address section and the Network Properties — NAT
tab are not necessary.
• Close the network object properties window.
6. Return to the Gateway object, open the Remote Access > Office Mode page. In
the Additional IP addresses for Anti-Spoofing, select the network object you have
created with the IP address range you have set aside for Office Mode on the
DHCP server.
7. Install the policy.
8. Make sure that all the internal routers are configured to route all the traffic
destined to the internal address space you had reserved to Office Mode users
through the UTM-1 Gateway. For instance, in the example above it is required
to add routes to the class C sub network of 10.130.56.0 through the gateway’s
IP address.
In addition to the steps mentioned for the gateway side configuration, a few
configuration steps have to be performed on the client side in order to connect to
the gateway in Office mode. See “Office Mode Configuration on SecureClient” on
page 499.
4. In the Office Mode Method section, select From the RADIUS server used to
authenticate the user.
5. Click OK.
498
Configuring Office Mode
2. In the Office Mode section, select Use first allocated Office Mode IP address for all
connections to the Gateways of the site.
3. Click OK.
500
Chapter 22
SecuRemote/SecureClient
In This Chapter
501
The Need for SecureClient
502
The Check Point Solution
How it works
SecuRemote/SecureClient provides secure connectivity by authenticating the
parties and encrypting the data that passes between them. To do this, VPN
SecuRemote/SecureClient takes advantage of standard Internet protocols for strong
encryption and authentication. Authentication means that both parties identify
themselves correctly. Encryption ensures that only the authenticated parties can
read the data passed between them. In addition, the integrity of the data is
maintained, which means the data cannot be altered during transit.
504
Blocking Unverified SCV Connections
Selective Routing
A VPN tunnel setup requires a configuration of a VPN domain for each participant
Gateway. The Selective Routing feature was designed to offer flexibility to define
different encryption domains per VPN site-to-site communities and Remote Access
(RA) Communities.
In this scenario:
• Gateways 1 & 2 are connected via a site-to-site VPN.
• Each Gateway has its own encryption domain.
• Gateway 1 is also used by SecuRemote/SecureClient users.
• Using Selective Routing, a Remote Access (RA) encryption domain is
configured on Gateway 1 that will grant access only to Server 1 and FileServer
1.
506
Selective Routing
In this case, the remote hosts are granted access to part of the encryption domain.
SecuRemote/SecureClient users will only be able to access servers within the
encryption domain that is permitted to them. The users will be denied access to
Server 2 and FileServer 2.
In this scenario:
• SecureClient users connect to Gateway 1.
• Gateway 1 has an encrypted domain that includes an external resource.
• Gateway 1 offers the SecureClient users access to external resources such as
the Internet in addition to the VPN domain.
In the scenario depicted in Figure 22-31, an external resource is a part of the RA
Encryption domain. Therefore, whenever the external resource is accessed by a
remote host, the connection to that resource will be initiated by Gateway 1.
The Gateway also has the ability to transfer traffic from the SecureClient users to
servers on the DMZ.
In this scenario:
• Gateways 1 & 2 are connected via a site-to-site VPN.
• Each Gateway has its own encryption domain.
• Gateway 1 is used by SecureClient users.
In this case, the encryption domain for remote users extends beyond one Gateway.
Gateway 1 relays SecureClients encrypted traffic destined to Server 2 and
FileServer 2 which are located behind Gateway 2. As a result, SecureClient users
do not need to re-authenticate when accessing the resources behind Gateway 2.
This also allows for logging all the SecureClient activity to other resources behind
other Gateways.
Note - For remote hosts to successfully access resources behind Gateway 1, either:
all Office Mode IP’s must be part of Gateway 2’s encryption domain, or
508
Desktop Security Policy
Prepackaged Policy
SecureClient can be pre-packaged to include a default policy by:
1. Open SC tar.gz
2. Placing the policy files in the tar.gz directory (local.scv local.dt local.lp, etc.).
3. In the install section of product.ini, specifying initialpolicy.bat
4. Re-packaging the client using packing tool (or running setup from the tar.gz)
5. Installing SC from the generated package/tar.gz directory. The policy becomes
active when the client is started for the first time.
510
Enable Logging
Enable Logging
Enabling logging will locally save all the activity on a remote host. This information
is useful in tracking problems and troubleshooting. The information saved in the
log files may contain confidential information and should only be sent back to the
system administrator.
The Enable Logging feature can also be included in a Prepackaged Policy.
512
Switching Modes
Switching Modes
The VPN-1 SecureClient product has two views, compact and extended. The
compact view is recommended for users that do not require multiple sites and
profile management. The extended view offers profile management and multiple
VPN-1 Server definitions.
514
Configuring SecureClient
Configuring SecureClient
In This Chapter
Configuring block_scv_client_connections
To block a user that becomes unverified, set the attribute
block_scv_client_connections to true in the in the local.scv file.
516
Configuring SecureClient
6. From the drop down menu, select the object that will represent the Remote
Access VPN domain.
7. Click OK.
518
Configuring SecureClient
NOTE: The default location is a hidden folder in windows. If you need to locate
this folder, then in Control panel > Folder Options > View select Show hidden files
and folders.
4. Close the location window. The file has been saved automatically.
520
Configuring SecureClient
522
Add HTML Help to Package
524
Chapter 23
SSL Network Extender
In This Document:
525
Introduction to the SSL Network Extender
526
How the SSL Network Extender Works
In This Section:
Office Mode
Office Mode is a Check Point remote access VPN solution feature. It enables a
UTM-1 gateway to assign a remote client an IP address. This IP address is used
only internally for secure encapsulated communication with the home network, and
therefore is not visible in the public network. The assignment takes place once the
user connects and authenticates. The assignment lease is renewed as long as the
user is connected. The address may be taken either from a general IP address pool,
or from an IP address pool specified per user group, using a configuration file.
528
Commonly Used Concepts
Visitor Mode
Visitor Mode is a Check Point remote access VPN solution feature. It enables
tunneling of all client-to-Gateway communication through a regular TCP connection
on port 443. Visitor mode is designed as a solution for firewalls and Proxy servers
that are configured to block IPsec connectivity.
530
Commonly Used Concepts
Overview
Integrity Secure Browser (ISB) protects all session-specific data, accumulated on
the client side, during browsing. End-users can now utilize Check Point’s
proprietary secure browser that enables data protection during user-sessions, and
enables cache wiping, after the sessions have ended.
During user-sessions, ISB will safeguard data in:
• Password and Form fields
• URL history
• cached files
• cookies
• registry entries
• recently-used files
Upon termination of a given user-session, ISB will wipe out all of the
aforementioned information, pertaining to that particular session, leaving no data
for spyware to view, use, or trace.
ISB safeguards browser-specific data by redirecting and caching the data in its own
private cache, instead of saving the data in publicly available space, as other
browsers do. After the user session expires/terminates, ISB wipes its cache.
In addition, ISB also warns users of potentially unsafe actions that they could
perform unwittingly. For example, ISB issues a popup warning whenever users try to
copy information into a clipboard, or save temporary files to public space, on the
disk.
Users attempting to access the SSL Network Extender will be presented with a
choice: to use ISB, or to continue using their current browser. Once the user has
selected ISB, a new secure session will be opened utilizing ISB. If the user selects
to continue using his/her current browser, a new session will be opened utilizing
that browser.
In order to use ISB on a particular machine, it has to be downloaded and installed
on that machine. Download, installation and invocation of ISB are done
automatically and transparently (to the user) if he/she is using Internet Explorer for
the initial connection to the SSL Network Extender.
On subsequent connections to the SSL Network Extender, i.e. when ISB has been
installed previously, users will still be prompted to select between ISB and their
current browser.
Note - Users will be prompted to select between ISB and their current browser if they try
to connect using a non-ISB browser.
Known Limitations
Known limitations are listed below:
1. Forced client-side ISB usage is not enforced at this time. At present, client-side
ISB usage is optional.
2. ISB is not yet capable of uploading files to a site.
3. Since ISB wipes out its cache, the user’s browser preference can not be saved.
Users must, therefore, select anew each time he/she attempts to connect to the
SSL Network Extender.
Known Issues
Known issues are listed below:
1. It is not advisable to open more than ten ISB widows in one session as it may
cause the ISB not to respond.
2. Some content-rich sites may cause ISB not to respond, although this is quite
unlikely.
3. Using ISB with some anti-spyware software may cause ISB installation failure.
532
Special Considerations for the SSL Network Extender
In This Section:
Pre-Requisites
The SSL Network Extender pre-requisites are listed below:
Client-side pre-requisites
The SSL Network Extender client-side pre-requisites are listed below:
• Remote client must be running Windows 2000 Pro/XP Home Edition and Pro.
• Remote client must use Internet Explorer version 5.0 or higher (must allow
ActiveX).
• First time client installation, uninstall and upgrade requires administrator
privileges on the client computer.
Server-side pre-requisites
The SSL Network Extender server-side pre-requisites are listed below:
• The SSL Network Extender is a server side component, which is part of a
specific Enforcement Module, with which the SSL Network Extender is
associated. It may be enabled on the gateway, already configured to serve as a
Remote Access SecureClient Gateway.
• The specific VPN-1 Enforcement Module must be configured as a member of
the VPN-1 Remote Access Community, and configured to work with Visitor
Mode. This will not interfere with SecureClient functionality, but will allow
SecureClient users to utilize Visitor Mode.
• The same access rules are configured for both SecureClient and SSL Network
Extender users.
• If you want to use Integrity Clientless Security (ICS), you must install the ICS
server. Customers can download the ICS server from
http://www.checkpoint.com/products/clientless/index.html along with its
documentation.
Features
The SSL Network Extender features are listed below:
• Easy installation and deployment.
• Intuitive and easy interface for configuration and use.
• The SSL Network Extender mechanism is based on Visitor Mode and Office
Mode.
• Automatic proxy detection is implemented.
• Small size client: Download size of SSL Network Extender package < 300K;
after installation, size of SSL Network Extender on disk is approximately 650K.
• All UTM-1 authentication schemes are supported: Authentication can be
performed using a certificate, Check Point password or external user databases,
such as SecurID, LDAP, RADIUS and so forth.
• At the end of the session, no information about the user or gateway remains on
the client machine.
• Extensive logging capability, on the gateway, identical to that in VPN-1
SecuRemote/SecureClient.
• High Availability Clusters and Failover are supported.
• SSL Network Extender Upgrade is supported.
• The SSL Network Extender supports the RC4 encryption method.
• Users can authenticate using certificates issued by any trusted CA that is
defined as such by the system administrator in SmartDashboard.
• SSL Network Extender is now supported on IPSO.
• Integrity Clientless Security prevents threats posed by Malware types, such as
Worms, Trojan horses, Hacker's tools, Key loggers, Browser plug-ins, Adwares,
Third party cookies, and so forth.
• SSL Network Extender can be configured to work in Hub Mode. VPN routing for
remote access clients is enabled via Hub Mode. In Hub mode, all traffic is
directed through a central Hub.
534
Configuring the SSL Network Extender
In This Section:
Server-Side Configuration
The SSL Network Extender requires only server side configuration
In This Section:
7. If you are working with SecurePlatform, you may perform the following actions:
536
Configuring the SSL Network Extender
• You can change the webui port, by running the following command:
webui enable <port number> (for example, webui enable 444)
• You can disable the webui completely, by running the following command:
webui disable
8. To change a Voyager port on Nokia platform, run:
voyager –e x –S <port number> (x represents the encryption level.)
For more information, run: voyager –h
9. Select Remote Access > Office Mode.
10. Configure Office Mode, as described in the “Office Mode” chapter. (For a
description of Office Mode, refer to “Office Mode” on page 528.)
Note - You must configure each Gateway that will be using the SSL Network Extender.
1. Select Remote Access > SSL Network Extender. The SSL Network Extender window
is displayed.
538
Configuring the SSL Network Extender
3. Enter the user’s name, and click Initiate to receive a Registration Key, and
send it to the user.
When the user attempts to connect to the SSL Network Extender, without
having a certificate, the Enrollment window is displayed, and he/she can create
a certificate for his/her use by entering the Registration Key, received from
the system administrator.
For a description of the user login experience, refer to “Downloading and
Connecting the Client”.
Note - The system administrator can direct the user to the URL,
http://<IP>/registration.html, to allow the user to receive a Registration Key and
create a certificate, even if they do not wish to use the SSL Network Extender, at this time.
3. You can determine whether the SSL Network Extender will be upgraded
automatically, or not. Select the client upgrade mode from the drop-down list.
The options are:
• Do not upgrade: Users of older versions will not be prompted to upgrade.
• Ask user: (Default) Ask user whether or not to upgrade, when the user
connects.
• Force upgrade: Every user, whether users of older versions or new users will
download and install the newest SSL Network Extender version.
Note - The Force Upgrade option should only be used in cases where the system
administrator is sure that all the users have administrator privileges. Otherwise, the user
will not be able to connect to and use the SSL Network Extender.
540
Configuring the SSL Network Extender
• Keep installed: (Default) Do not uninstall. If the user wishes to uninstall the
SSL Network Extender, he/she can do so manually.
• Ask user whether to uninstall: Ask user whether or not to uninstall, when
the user disconnects.
• Force uninstall: Always uninstall automatically, when the user disconnects.
For a description of the user disconnect experience, refer to “Uninstall on
Disconnect”.
Note - The Uninstall on Disconnect feature will not ask the user whether or not to
uninstall, and will not uninstall the SSL Network Extender, if a user has entered a
suspend/hibernate state, while he/she was connected.
6. You can determine whether the Integrity Clientless Security (ICS) will be
activated, or not. When ICS is activated, users attempting to connect to the
SSL Network Extender will be required to successfully undergo an ICS scan
before being allowed to access the SSL Network Extender. Select the desired
option from the drop-down list. The options are:
• None
• Integrity Clientless Security
Upgrading ICS
542
Configuring the SSL Network Extender
8. Configure the Session Timeout period. Once authenticated, remote users are
assigned an SSL Network Extender session. The session provides the context in
which the SSL Network Extender processes all subsequent requests until the
user logs out, or the session ends due to a time-out.
Note - The default value is 8 hours. The minimum is 10 minutes, and the maximum is 24
hours.
Five minutes before the specified session time (timeout) has elapsed, the user may
be prompted for his/her credentials, depending upon authentication settings, and
once the credentials are accepted, the timeout interval is initialized. If the user has
not provided credentials before the timeout has elapsed, the user is disconnected
from the server and will need to reconnect the client manually.
9. Configure the keep-alive packets transmission frequency. The keep-alive
packets inform NAT devices or HTTP proxies, via which the user is connected,
that the user connection is still active.
10. Click OK. The SSL Network Extender Global Properties window is displayed.
11. Click OK.
Note - A Load Sharing Cluster must have been created before you can configure use of
sticky decision function.
4. Select Use Sticky Decision Function. When the client connects to the cluster, all
its traffic will pass through a single gateway. If that member gateway fails, the
client will reconnect transparently to another cluster member and resume its
session.
5. Select Gateway Cluster Object > Remote Access > Office Mode. When defining
Office Mode, for use with Load Sharing Clusters, only the Manual (using IP pool)
method is supported.
544
Configuring the SSL Network Extender
Disabling a Skin
1. Enter the specific skin subdirectory, under custom, that is to be disabled and
create a file named disable. This file may be empty.
2. If the specific skin does not exist under custom, create it and then create a file
within it named disable.
3. Install Policy. The next time that the user connects to the SSL Network
Extender portal, this skin will not be available to him/her.
Example
cd $FWDIR/conf/extender/skin/custom
mkdir skin1
touch disable
Install Policy.
Creating a Skin
1. Enter the custom subdirectory.
2. Create a folder with the desired skin name.
Note - Verify that this name is not already used in chkp. If it is, the new skin definition
will override the existing skin definition (as long as the new skin definition exists). Once you
have deleted the new skin definition, the chkp skin definition will once again be used.
Each skin folder must contain the following five style sheets:
• help_data.css: The main OLH page uses this style sheet.
• help.css: The inner frame on the OLH page uses this style sheet.
• index.css: The ISB and ICS pages, and the main SSL Network Extender
portal page use this style sheet.
• style.css: All login pages use this style sheet.
• style_main.css: The main SSL Network Extender Connection page, Proxy
Authentication page and Certificate Registration page use this style sheet.
Note - It is recommended that you copy the aforementioned files from another chkp skin,
and then modify them as desired.
546
Configuring the SSL Network Extender
Example
Add your company logo to the main SSL Network Extender portal page.
cd $FWDIR/conf/extender/skin/custom
mkdir <skin_name>
cd <skin_name>
copy ../../chkp/skin2/* .
Place logo image file in this directory
Edit index.css.
Goto .company_logo and replace the existing URL reference with a reference to the
new logo image file.
Save.
Install Policy.
Disabling a Language
1. Enter the specific language subdirectory, under custom, that is to be disabled
(if it exists) and create a file named disable. This file may be empty.
2. If the specific language does not exist under custom, create it and then create
a file within it named disable.
3. Install Policy. The next time that the user connects to the SSL Network
Extender portal, this language will not be available to him/her.
Adding a Language
1. Enter the custom subdirectory.
2. Create a folder with the desired language name.
Note - Verify that this name is not already used in chkp. If it is, the new language
definition will override the existing language definition (as long as the new language
definition exists). Once you have deleted the new language definition, the chkp language
definition will once again be used.
Example
cd $FWDIR/conf/extender/language
mkdir custom
cd custom
mkdir <language_name>
cd <language_name>
copy ../../chkp/english/messages.js
Edit the messages.js file and translate the text bracketed by quotation marks.
Save.
In custom/english/messages.js, add a line as follows:
<language_name>=”translation of language_name”;
548
Configuring the SSL Network Extender
Install Policy.
Modifying a Language
1. Enter the custom subdirectory.
2. Create a folder with a language name that matches the chkp language folder to
be modified.
3. Create an empty messages.js file, and insert only those messages that you
want to modify, in the following format:
<variable_name>=”<desired text>”;
Note - It is strongly recommended to perform a backup before replacing the SSL Network
Extender package.
• Update the SSL Network Extender version number in the slim_ver.txt file in
$FWDIR/conf.
• Configure the client upgrade mode via SmartDashboard (Global Properties).
• Install Policy
550
SSL Network Extender User Experience
This section describes the user experience, including downloading and connecting
the SSL Network Extender client, importing a client certificate, and uninstall on
disconnect.
Note - You must have Administrator rights to install or uninstall software on Windows XP
Professional, as well as on the Windows 2000 operating systems.
552
SSL Network Extender User Experience
The site’s security certificate has been issued by an authority that you have not
designated as a trusted CA. Before you connect to this server, you must trust
the CA that signed the server certificate. (The system administrator can define
which CAs may be trusted by the user.) You can view the certificate in order to
decide if you wish to proceed.
Note - The administrator can direct the user to the URL, http://< mngmt IP>:18264, to
install this CA certificate, thereby establishing trust, and avoiding future displays of this message. The
Install this CA Certificate link is shown in the following figure.
3. You will be presented with a choice: to use ISB, or to continue using your
current browser. Once you have selected the ISB, a new secure session will be
opened utilizing the ISB. If you select to continue using your current browser, a
new session will be opened utilizing that browser.
It is highly recommended that you use Check Point’s proprietary secure browser
that enables data protection during user-sessions, and enables cache wiping,
after the sessions have ended.
4. You can select a different language from the Language drop-down list. If you
change languages, while connected to the SSL Network Extender portal, you
will be informed that if you continue the process you will be disconnected, and
must reconnect.
5. You can select a different skin from the Skin drop-down list. You can change
skins, while connected to the SSL Network Extender portal.
6. Click Continue.
7. If this is the first time that the user attempts to access the SSL Network
Extender, the Server Confirmation window appears:
Figure 23-41Server Confirmation window
The user is asked to confirm that the listed ICS server is identical to the
organization’s site for remote access.
8. If the user clicks Yes, the ICS client continues the software scan. Moreover, if
the Save this confirmation for future use checkbox is selected, the Server
Confirmation window will not appear the next time the user attempts to login.
9. If the user clicks No, an error message is displayed and the user is denied
access.
554
SSL Network Extender User Experience
Once the user has confirmed the ICS server, an automatic software scan takes
place on the client's machine. Upon completion, the scan results and directions
on how to proceed are displayed.
Figure 23-42Scan Results
ICS not only prevent users with potentially harmful software from accessing your
network, but also require that they conform to the corporate antivirus and firewall
policies, as well. A user is defined as having successfully passed the ICS scan only
if he/she successfully undergoes scans for Malware, Anti Virus, and Firewall. Each
malware is displayed as a link, which, if selected, redirects you to a data sheet
describing the detected malware. The data sheet includes the name and a short
description of the detected malware, what it does, and the recommended removal
method/s.
The options available to the user are configured by the administrator on the ICS
server. The options are listed in the following table:
11. Enter the User Name and Password and click OK. Figure 23-52 is displayed.
Note - If user authentication has been configured to be performed via a 3rd party
authentication mechanism, such as SecurID or LDAP, the Administrator may require the
user to change his/her PIN, or Password. In such a case, an additional Change Credentials
window is displayed, before the user is allowed to access the SSL Network Extender.
556
SSL Network Extender User Experience
13. If the authentication scheme, configured, is Certificate with Enrollment, and the
user does not already have a certificate, the Enrollment window is displayed:
Note - It is strongly recommended that the user set the property Do not save encrypted
pages to disk on the Advanced tab of the Internet Properties of Internet Explorer. This will
prevent the certificate from being cached on disk.
14. The user enters his/her Registration Key, selects a PKCS#12 Password and
clicks Enroll. The PKCS#12 file is downloaded. The user should open the file
and utilize the Microsoft Certificate Import wizard.
558
SSL Network Extender User Experience
It is strongly recommended that the user enable Strong Private Key Protection.
The user will then be prompted for consent/credentials, as configured, each
time authentication is required. Otherwise, authentication will be fully
transparent for the user.
4. Enter your password, click Next twice. If the user enabled Strong Private Key
Protection, the Importing a New Private Exchange Key window appears:
Figure 23-48Importing a New Private Exchange Key window
5. If you click OK, the Security Level is assigned the default value Medium, and
the user will be asked to consent each time his/her certificate is required for
authentication.
6. If you click Set Security Level, the Set Security Level window appears:
9. Click OK.
10. Close and reopen your browser. You can now use the certificate that has now
been imported for logging in.
11. If the system administrator configured the upgrade option, the Upgrade
Confirmation window is displayed:
Figure 23-51Upgrade Confirmation window
12. If you click OK, you must reauthenticate and then a new ActiveX is installed.
13. If you click Cancel, the SSL Network Extender connects normally. (The Upgrade
Confirmation window will not be displayed again for a week.) The SSL Network
Extender window appears. A Click here to upgrade link is displayed in the
window, enabling the user to upgrade even at this point. If you click on the
link, you must reauthenticate before the upgrade can proceed.
560
SSL Network Extender User Experience
14. If you are connecting to the SSL gateway for the first time, a VeriSign
certificate message appears, requesting the user’s consent to continue
installation.
Figure 23-52VeriSign Certificate Message
15. Click Yes. At first connection, the user is notified that the client will be
associated with a specific gateway, and requested to confirm.
Figure 23-53Client associated with specific gateway
You may work with the client as long as the SSL Network Extender Connection
window, shown below, remains open, or minimized (to the System tray).
Figure 23-55Client connected
562
SSL Network Extender User Experience
Once the SSL Network Extender is initially installed, a new Windows service named
Check Point SSL Network Extender and a new virtual network adapter are added.
This new network adapter can be seen by typing ipconfig /all from the Command
line.
Note - The settings of the adapter and the service must not be changed. IP assignment,
renewal and release will be done automatically.
Both the virtual network adapter and the Check Point SSL Network Extender service
are removed during the product uninstall.
Note - The Check Point SSL Network Extender service is dependent on both the virtual
network adapter and the DHCP client service. Therefore, the DHCP client service must not
be disabled on the user’s computer.
There is no need to reboot the client machine after the installation, upgrade, or
uninstall of the product.
18. When you finish working, click Disconnect to terminate the session, or when the
window is minimized, right-click the icon and click Disconnect. The window
closes.
Uninstall on Disconnect
If the administrator has configured Uninstall on Disconnect to ask the user whether
or not to uninstall, the user can configure Uninstall on Disconnect as follows.
To set Uninstall on Disconnect:
1. Click Disconnect. The Uninstall on Disconnect window is displayed, as shown in
the following figure.
Figure 23-56Uninstall on Disconnect
564
SSL Network Extender User Experience
566
Troubleshooting
Troubleshooting
Tips on how to resolve issues that you may encounter are listed in the following
table:
568
Troubleshooting
570
CHAPTER
24
Resolving Connectivity Issues
In This Chapter
571
The Need for Connectivity Resolution Features
572
Other Connectivity Issues
Hide NAT not only changes the IP header but also the port information contained in
the UDP header. In Figure 24-59, the UDP packet is too long so the remote client
fragments the packet. The first fragment consists of the IP header plus the UDP
574
During IKE phase I
header and some portion of the data. The second fragment consists of only the IP
header and the second data fragment. The NATing device does not know how to
wait for all the fragments, reassemble and NAT them.
When the first fragment arrives, the NAT device successfully translates the address
information in the IP header, and port information in the UDP header and forwards
the packet. When the second fragment arrives, the NATing device cannot translate
the port information because the second packet does not contain a UDP header;
the packet is dropped. The IKE negotiation fails.
Note - If the UTM-1UTM-1 peers authenticate each other using pre-shared secrets, large
UDP packets are not created; however, certificates are more secure, and thus
recommended.
IKE over TCP solves the fragmentation problem of long packets, but in phase II
there are times when the Gateway needs to initiate the connection to the remote
client. (Only the remote client initiates phase I, but either side can identify the
need for a phase II renewal of keys; if the Gateway identifies the need, the Gateway
initiates the connection.)
If the Gateway initiates the connection, the Gateway knows the IP address of the
NATing device, but cannot supply a port number that translates to the remote client
behind the NATing device. (The port number used during previous connections is
only temporary, and can quickly change.) The NATing device cannot forward the
connection correctly for the remote client; the connection initiated by the Gateway
fails.
It is possible to use IKE over TCP, but this demands a TCP connection to be always
open; the open session reserves the socket on the Gateway, taking up valuable
system resources. The more reasonable solution is to keep open the port on the
NATing device by sending UDP “keep alive” packets to the Gateway, and then
performing IKE phase II in the usual way. However, there is still a need to shorten
the UDP packets to prevent possible fragmentation.
576
During IPSec
During IPSec
NAT traversal (UDP Encapsulation for Firewalls and
Proxies)
Having successfully negotiated IKE phases I and II, we move into the IPSec stage.
Data payloads encrypted with (for example) 3DES and hashed (for integrity) with
MD5, are placed within an IPSec packet. However, this IPSec packet no longer
contains a TCP or UDP header. A hide NAT device needs to translate the port
information inside the header. The TCP/UDP header has been encrypted along with
the data payload and can no longer be read by the NATing device.
A port number needs to be added; UDP Encapsulation is a process that adds a
special UDP header that contains readable port information to the IPSec packet:
Figure 24-60UDP Encapsulation:
The new port information is not the same as the original. The port number 2746 is
included in both the source and destination ports. The NAT device uses the source
port for the hide operation but the destination address and port number remains
the same. When the peer Gateway sees 2746 as the port number in the destination
address, the Gateway calls a routine to decapsulate the packet.
packet, the TCP/IP stack of the operating system queries the local interface to
obtain its MTU. The IP layer of the TCP/IP stack compares the MTU of the local
interface with the size of the packet and fragments the packet if necessary.
When a remote client is communicating across multiple routers with a Gateway, it
is the smallest MTU of all the routers that is important; this is the path MTU
(PMTU), and for remote access clients there is a special IPSec PMTU discovery
mechanism to prevent the OS of the client from fragmenting the IPSec packet if
the IPSec packet is too large.
However, the PMTU between the remote client and the Gateway will not remain
constant, since routing across the Internet is dynamic. The route from Gateway to
client may not be the same in both directions, hence each direction may have its
own PMTU. VPN handles this in two ways:
• Active IPSec PMTU
• Passive IPSec PMTU
578
NAT and Load Sharing Clusters
Note - From the system administrator’s perspective, there is nothing to configure for PMTU;
the IPSec PMTU discovery mechanism, both active and passive, runs automatically.
For the connection to survive a failover between cluster members, the “keep alive”
feature must be enabled in Global Properties > Remote Access > Enable Back
connections from gateway to client
This is also true if the NATing is performed on the Gateway cluster side.
580
Visitor Mode
Visitor Mode
Visitor Mode tunnels all client-to-Gateway communication through a regular TCP
connection on port 443.
Figure 24-63Visitor Mode
All required VPN connectivity (IKE, IPsec, etc.) between the Client and the Server
is tunneled inside this TCP connection. This means that the peer Gateway needs to
run a Visitor Mode (TCP) server on port 443.
Note -
• Even if the remote location’s Gateway in Figure 24-63 is not a Check
Point product (a Gateway from another vendor) Visitor mode will still
tunnel a connection through it.
• While in Visitor Mode, you can not define a new site.
• Topology update takes place only if the last connection used a profile that
enabled Visitor Mode.
Number of Users
To obtain optimal performance of the Visitor Mode server:
• Minimize the number of users allowed Visitor Mode if performance degrades
• Increase the number of sockets available on the OS by editing the appropriate
values, for example the socket descriptor on Linux systems
Note - All partner Gateways must agree on the same allocated port, since the visitor Mode
server on the peer Gateway will be listening on only one port.
582
Visitor Mode
Interface Resolution
For interface resolution in a Visitor Mode environment, it is recommended to use
static IP resolution or dedicate a single interface for Visitor Mode.
Note - Visitor mode is only supported for Internet Explorer 4.0 and up.
584
Configuring IKE Over TCP
586
Configuring NAT Traversal (UDP Encapsulation)
Selecting UDP encapsulation on the Gateway means that the Gateway supports
both encapsulated VPN traffic and traffic that is not encapsulated.
Note - Microsoft L2TP IPSec clients cannot work with Check Point gateways when UDP
encapsulation is required.
Server Configuration
To enable the TCP tunnelling feature on UTM-1:
On the Gateway object running the Visitor Mode Server, Remote Access page >
Visitor Mode section, select Support Visitor Mode.
• If port 443 is the assigned port for TCPT server, do not change the tcp https
default in the Allocated Port section.
• If a customized port (other than the default port) is agreed upon, from the
drop-down menu select the service that corresponds to this port. If the chosen
port is not represented by a pre-defined service in SmartDashboard, create this
service.
• In Allocated IP Address the default is All IPs. To avoid port conflicts, select the
appropriate routable valid IP for the Visitor Mode server. If the server has
Dynamic Interface Resolving Configuration... enabled (on the VPN - Advanced
page) it is recommended to allocate a specific address for visitor mode instead
of All IPs.
Note - When Visitor Mode is activated on the Gateway, the RDP interface discovery
mechanism does not work. A Visitor Mode handshake is used instead.
588
Configuring Remote Clients to Work with Proxy Servers
Now Secure Client can read any of the settings shown in Figure 24-65 but only if:
• SecureClient is connected to a LAN or WLAN (not dial-up)
• Secure Domain Logon (SDL) is not enabled.
Note - Visitor mode attempts to connect to the proxy server without authenticating. If a
user name and password is required by the proxy, the error message “proxy requires
authentication appears”.
590
Configuring Remote Clients to Work with Proxy Servers
When SC replaces the proxy file, it generates a similar plain script PAC file
containing the entire VPN domain IP ranges and DNS names (to be returned as
“DIRECT”). This file is stored locally, since the windows OS must receive this
information as a plain script PAC file. This file replaces the automatic configuration
script as defined in Internet Explorer:
On the Gateway
1. Global Properties > SmartDashboard Customization
2. Click Configure
3. Select either:
• ie_proxy_replacement. If option is selected, windows proxy replacement is
always performed, even if visitor mode is not enabled.
• ie_proxy_replacement_limit_to_tcpt. If this option is selected, then proxy
replacement takes place only when visitor mode is enabled.
When SecureClient performs an update, the policy regarding windows proxy
replacement is downloaded and put into effect.
On SecureClient
Alternatively, these two properties can be set in the userc.c file on the remote
client:
:ie_proxy_replacement (true)
:ie_proxy_replacement_limit_to_tcpt (true)
592
THIRD PARTY TRADEMARKS AND COPYRIGHTS AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
Entrust is a registered trademark of Entrust Technologies, Inc. in the United IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
States and other countries. Entrust’s logos and Entrust product and service THE POSSIBILITY OF SUCH DAMAGE.
names are also trademarks of Entrust Technologies, Inc. Entrust
Technologies Limited is a wholly owned subsidiary of Entrust Technologies, The following statements refer to those portions of the software copyrighted
Inc. FireWall-1 and SecuRemote incorporate certificate management by Eric Young. THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS''
technology from Entrust. AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
Verisign is a trademark of Verisign Inc. FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
The following statements refer to those portions of the software copyrighted INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
by University of Michigan. Portions of the software copyright © 1992-1996 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
Regents of the University of Michigan. All rights reserved. Redistribution and SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
use in source and binary forms are permitted provided that this notice is BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
preserved and that due credit is given to the University of Michigan at Ann LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
Arbor. The name of the University may not be used to endorse or promote (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
products derived from this software without specific prior written permission. THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
This software is provided “as is” without express or implied warranty. SUCH DAMAGE. Copyright © 1998 The Open Group.
Copyright © Sax Software (terminal emulation only).
The following statements refer to those portions of the software copyrighted
The following statements refer to those portions of the software copyrighted by Jean-loup Gailly and Mark Adler Copyright (C) 1995-2002 Jean-loup Gailly
by Carnegie Mellon University. and Mark Adler. This software is provided 'as-is', without any express or
implied warranty. In no event will the authors be held liable for any damages
Copyright 1997 by Carnegie Mellon University. All Rights Reserved. arising from the use of this software. Permission is granted to anyone to use
this software for any purpose, including commercial applications, and to alter
Permission to use, copy, modify, and distribute this software and its it and redistribute it freely, subject to the following restrictions:
documentation for any purpose and without fee is hereby granted, provided
that the above copyright notice appear in all copies and that both that 1. The origin of this software must not be misrepresented; you must not claim
copyright notice and this permission notice appear in supporting that you wrote the original software. If you use this software in a product, an
documentation, and that the name of CMU not be used in advertising or acknowledgment in the product documentation would be appreciated but is
publicity pertaining to distribution of the software without specific, written not required.
prior permission.CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO
THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF 2. Altered source versions must be plainly marked as such, and must not be
MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CMU BE LIABLE misrepresented as being the original software.
FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR 3. This notice may not be removed or altered from any source distribution.
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH The following statements refer to those portions of the software copyrighted
THE USE OR PERFORMANCE OF THIS SOFTWARE. by the Gnu Public License. This program is free software; you can
redistribute it and/or modify it under the terms of the GNU General Public
The following statements refer to those portions of the software copyrighted License as published by the Free Software Foundation; either version 2 of the
by The Open Group. License, or (at your option) any later version. This program is distributed in
the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY the implied warranty of MERCHANTABILITY or FITNESS FOR A
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE PARTICULAR PURPOSE. See the GNU General Public License for more
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR details.You should have received a copy of the GNU General Public License
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE OPEN along with this program; if not, write to the Free Software Foundation, Inc.,
GROUP BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, 675 Mass Ave, Cambridge, MA 02139, USA.
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE The following statements refer to those portions of the software copyrighted
OR OTHER DEALINGS IN THE SOFTWARE. by Thai Open Source Software Center Ltd and Clark Cooper Copyright (c)
2001, 2002 Expat maintainers. Permission is hereby granted, free of charge,
The following statements refer to those portions of the software copyrighted to any person obtaining a copy of this software and associated
by The OpenSSL Project. This product includes software developed by the documentation files (the "Software"), to deal in the Software without
OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). restriction, including without limitation the rights to use, copy, modify, merge,
publish, distribute, sublicense, and/or sell copies of the Software, and to
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND permit persons to whom the Software is furnished to do so, subject to the
ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT following conditions: The above copyright notice and this permission notice
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND shall be included in all copies or substantial portions of the Software. THE
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
GDChart is free for use in your applications and for chart generation. YOU
U.S. Headquarters: 800 Bridge Parkway, Redwood City, CA 94065, Tel: (650) 628-2000 Fax: (650) 654-4233, info@CheckPoint.com
International Headquarters: 3A Jabotinsky Street, Ramat Gan, 52520, Israel, Tel: 972-3-753 4555 Fax: 972-3-575 9256, http://www.checkpoint.com
MAY NOT re-distribute or represent the code as your own. Any re- 2. Redistributions in binary form must reproduce the above copyright notice,
distributions of the code MUST reference the author, and include any and all this list of conditions and the following disclaimer in the documentation and/
original documentation. Copyright. Bruce Verderaime. 1998, 1999, 2000, or other materials provided with the distribution.
2001. Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000,
2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41- 3. The name "PHP" must not be used to endorse or promote products
RR02188 by the National Institutes of Health. Portions copyright 1996, derived from this software without prior written permission. For written
1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating permission, please contact group@php.net.
to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner. Portions
relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs. Portions 4. Products derived from this software may not be called "PHP", nor may
relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson "PHP" appear in their name, without prior written permission from
(ellson@graphviz.org). Portions relating to gdft.c copyright 2001, 2002 John group@php.net. You may indicate that your software works in conjunction
Ellson (ellson@graphviz.org). Portions relating to JPEG and to color with PHP by saying "Foo for PHP" instead of calling it "PHP Foo" or "phpfoo"
quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C)
1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. 5. The PHP Group may publish revised and/or new versions of the license
This software is based in part on the work of the Independent JPEG Group. from time to time. Each version will be given a distinguishing version
See the file README-JPEG.TXT for more information. Portions relating to number. Once covered code has been published under a particular version
WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den of the license, you may always continue to use it under the terms of that
Brande. Permission has been granted to copy, distribute and modify gd in version. You may also choose to use such covered code under the terms of
any context without fee, including a commercial application, provided that any subsequent version of the license published by the PHP Group. No one
this notice is present in user-accessible supporting documentation. This other than the PHP Group has the right to modify the terms applicable to
does not affect your ownership of the derived work itself, and the intent is to covered code created under this License.
assure proper credit for the authors of gd, not to interfere with your
productive use of gd. If you have questions, ask. "Derived works" includes all 6. Redistributions of any form whatsoever must retain the following
programs that utilize the library. Credit must be given in user-accessible acknowledgment:
documentation. This software is provided "AS IS." The copyright holders
disclaim all warranties, either express or implied, including but not limited to "This product includes PHP, freely available from <http://www.php.net/>".
implied warranties of merchantability and fitness for a particular purpose,
with respect to this code and accompanying documentation. Although their THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS
code does not appear in gd 2.0.4, the authors wish to thank David Koblas, IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT
David Rowley, and Hutchison Avenue Software Corporation for their prior NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
contributions. AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS
Licensed under the Apache License, Version 2.0 (the "License"); you may BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
not use this file except in compliance with the License. You may obtain a EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
copy of the License at http://www.apache.org/licenses/LICENSE-2.0 LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
The curl license HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
COPYRIGHT AND PERMISSION NOTICE OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 1996 - 2004, Daniel Stenberg, <daniel@haxx.se>.All rights
reserved. This software consists of voluntary contributions made by many individuals
on behalf of the PHP Group. The PHP Group can be contacted via Email at
Permission to use, copy, modify, and distribute this software for any purpose group@php.net.
with or without fee is hereby granted, provided that the above copyright For more information on the PHP Group and the PHP project, please see
<http://www.php.net>. This product includes the Zend Engine, freely
notice and this permission notice appear in all copies. available at <http://www.zend.com>.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY This product includes software written by Tim Hudson (tjh@cryptsoft.com).
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR Copyright (c) 2003, Itai Tzur <itzur@actcom.co.il>
PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO
EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR All rights reserved.
ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN Redistribution and use in source and binary forms, with or without
CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS modification, are permitted provided that the following conditions are met:
IN THE SOFTWARE.
Redistribution of source code must retain the above copyright notice, this list
Except as contained in this notice, the name of a copyright holder shall not of conditions and the following disclaimer.
be used in advertising or otherwise to promote the sale, use or other dealings
in this Software without prior written authorization of the copyright holder. Neither the name of Itai Tzur nor the names of other contributors may be
used to endorse or promote products derived from this software without
The PHP License, version 3.0 specific prior written permission.
Copyright (c) 1999 - 2004 The PHP Group. All rights reserved. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
Redistribution and use in source and binary forms, with or without INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
modification, is permitted provided that the following conditions are met: MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, The material in document is provided with "RESTRICTED RIGHTS." Software
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT and accompanying documentation are provided to the U.S. government
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; ("Government") in a transaction subject to the Federal Acquisition
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS Regulations with Restricted Rights. The Government's rights to use, modify,
reproduce, release, perform, display or disclose are
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING restricted by paragraph (b)(3) of the Rights in Noncommercial Computer
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF Software and Noncommercial Computer Soft-ware Documentation clause at
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DFAR 252.227-7014 (Jun 1995), and the other restrictions and terms in
DAMAGE. paragraph (g)(3)(i) of Rights in Data-General clause at FAR 52.227-14,
Alternative III (Jun 87) and paragraph (c)(2) of the Commer-cial
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
Computer Software-Restricted Rights clause at FAR 52.227-19 (Jun 1987).
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal Use of the material in this document by the Government constitutes
in the Software without restriction, including without limitation the rights to acknowledgment of NextHop's proprietary rights in them, or that of the
use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies original creator. The Contractor/Licensor is NextHop located at 1911
of the Software, and to permit persons to whom the Software is furnished to Landings Drive, Mountain View, California 94043. Use, duplication, or
do so, subject to the following conditions: The above copyright notice and this disclosure by the Government is subject to restrictions as set forth in
permission notice shall be included in all copies or substantial portions of the applicable laws and regulations.
Software.
Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty Disclaimer
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY Warranty
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR THE MATERIAL IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED. TO THE
OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR FULLEST EXTENT POSSIBLE PURSUANT TO THE APPLICABLE LAW,
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR NEXTHOP DISCLAIMS ALL WARRANTIES,
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
Copyright © 2003, 2004 NextHop Technologies, Inc. All rights reserved. PURPOSE, NON INFRINGEMENT OR OTHER VIOLATION OF RIGHTS.
NEITHER NEXTHOP NOR ANY OTHER PROVIDER OR DEVELOPER OF
Confidential Copyright Notice MATERIAL CONTAINED IN THIS DOCUMENT WARRANTS OR MAKES ANY
REPRESEN-TATIONS REGARDING THE USE, VALIDITY, ACCURACY, OR
Except as stated herein, none of the material provided as a part of this RELIABILITY OF, OR THE RESULTS OF THE USE OF, OR OTHERWISE
document may be copied, reproduced, distrib-uted, republished, RESPECTING, THE MATERIAL IN THIS DOCUMENT.
downloaded, displayed, posted or transmitted in any form or by any means,
including, but not lim-ited to, electronic, mechanical, photocopying, Limitation of Liability
recording, or otherwise, without the prior written permission of NextHop
Technologies, Inc. Permission is granted to display, copy, distribute and UNDER NO CIRCUMSTANCES SHALL NEXTHOP BE LIABLE FOR ANY
download the materials in this doc-ument for personal, non-commercial use DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
only, provided you do not modify the materials and that you retain all copy- DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR PROFIT,
right and other proprietary notices contained in the materials unless ARISING OUT OF THE USE, OR THE INABILITY TO USE, THE MATERIAL IN
otherwise stated. No material contained in this document may be "mirrored" THIS DOCUMENT, EVEN IF NEXTHOP OR A NEXTHOP AUTHORIZED
on any server without written permission of NextHop. Any unauthorized use REPRESENTATIVE HAS ADVISED OF THE POSSIBILITY OF SUCH
of any material contained in this document may violate copyright laws, DAMAGES. IF YOUR USE OF MATERIAL FROM THIS DOCUMENT RESULTS
trademark laws, the laws of privacy and publicity, and communications IN THE NEED FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT
regulations and statutes. Permission terminates automatically if any of these OR DATA, YOU ASSUME ANY COSTS THEREOF. SOME STATES DO NOT
terms or condi-tions are breached. Upon termination, any downloaded and ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
printed materials must be immediately destroyed. CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION
MAY NOT FULLY APPLY TO YOU.
Trademark Notice
Copyright © ComponentOne, LLC 1991-2002. All Rights Reserved.
The trademarks, service marks, and logos (the "Trademarks") used and
displayed in this document are registered and unregistered Trademarks of BIND: ISC Bind (Copyright (c) 2004 by Internet Systems Consortium, Inc.
NextHop in the US and/or other countries. The names of actual companies ("ISC"))
and products mentioned herein may be Trademarks of their respective
owners. Nothing in this document should be construed as granting, by Copyright 1997-2001, Theo de Raadt: the OpenBSD 2.9 Release
implication, estoppel, or otherwise, any license or right to use any Trademark
displayed in the document. The owners aggressively enforce their intellectual PCRE LICENCE
property rights to the fullest extent of the law. The Trademarks may not be
used in any way, including in advertising or publicity pertaining to distribution PCRE is a library of functions to support regular expressions whose syntax
of, or access to, materials in and semantics are as close as possible to those of the Perl 5 language.
Release 5 of PCRE is distributed under the terms of the "BSD" licence, as
this document, including use, without prior, written permission. Use of specified below. The documentation for PCRE, supplied in the "doc"
Trademarks as a "hot" link to any website is prohibited unless establishment directory, is distributed under the same terms as the software itself.
of such a link is approved in advance in writing. Any questions concerning
the use of these Trademarks should be referred to NextHop at U.S. +1 734 Written by: Philip Hazel <ph10@cam.ac.uk>
222 1600.
University of Cambridge Computing Service, Cambridge, England. Phone:
U.S. Government Restricted Rights
+44 1223 334714.
* Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
* Neither the name of the University of Cambridge nor the names of its
contributors may be used to endorse or promote products derived from this
software without specific prior written permission.
597
network object Integrated Firewalls 402 switching the active log
management 388 Internal Certificate Authority file 318, 335
policy management 389 SIC 254 Log File 366
Files Internal Certificate Authority Log Server 310, 319
transfer to remote (ICA) 449, 453, 456 configuration 337
devices 370 IP addresses, private and log servers 319
Filter 314 public 120 Log Switch 318
configuration 326 IPSec 411, 417, 449, 478, 489, configuration 335
Fingerprint schedule 335
512, 573, 577, 578, 581
SmartCenter server Logical Server 403
authentication 239 Login
Fingerprint scrambling 168 bi-directional
fw.log 318
FW1_clntauth 107
L authentication 238
login
fwauthd.conf 107 L2TP 512 SIC 238
LDAP 259 Logs
group 261 maintaining 335
G License 364
attaching 375
Gateway Cluster 395
central 375
exporting 383 M
finding expired 383
local 375 macutil 486
Malicious Activity Detection
H management 361
obsolete 377 (MAD) 168
removing from Malicious Code Protector 214
HFA 367 repository 382 Match 64
Hide NAT 123 updates 361 Mesh Community 412, 420,
Hosts file 399 upgrading 375 422, 432, 433, 437
Hot Fix Accumulators 371 viewing properties 382 Meshed Community 433, 441
Hotfixes 369 License Expiration 377
Monitoring System Status 324
HTTP License Management 379
Monitor-only 218
concurrent connections 228 License Repository 362, 363,
considerations 225
Sessions 222 364, 375, 378, 379, 380, for all active protections 218
Hub Mode 510 383 per Web server 219
Hybrid Mode 452, 454, 465 Licenses 46, 363 Multicast
Licenses Repository 365 addressing 70
Licensing configuration 78
I Web Intelligence 230
lmhosts file 399
protocols 70
securing 69
Load Balancing 404 Multi-License File 377
IGMP 70
IKE 449 Local License 375, 377, 379
Image Management 43 Log
Implied Networks 295 cyclic logging 318, 336
downtime 319
N
Implied Rules
export 318
definition 66 file maintenance 318 NAT
when to edit 75 local 319, 336 anti-spoofing 130
Installation log server 319 arp commands 132
targets 276 purge 336 automatic and manual 124
Installation Target remote file management 319 bidirectional 127
configuring 282 definition 120
598
disabling in VPNs 132 overview 398 definition 314
Hide address 134 properties 399 intersecting queries 285
Hide NAT 123 OSPF 70 network object 278
Hide NAT for all internal predefined 314
networks 125 rule 277
Hide, planning for 133 Rule Base 283
IP pools 150 P
port translation
configuring 139 Package Management 368
understanding 130 Package Repository 362, 363, R
private and public 364, 369, 370
addresses 120 Packages 363, 364, 370 RADIUS Server 454, 457, 481,
Rule Base 126 distribute 371 497, 498
rule match 126 upgrade 370 Reboot
Static NAT 122 Packages Repository 365 VPN-1 373
static routes 130 PIM (Protocol-Independent Remote Access Community 450
Static, planning for 133 Multicast) 70 Remote Access Connectivity
understanding Resolution 572
PKCS#12 453
automatic 128 Active IPSec PMTU 578
Navigator 291 Policy
adding to a policy Allocating Customized
Network Objects Management Ports 582
package 283
FAQs 388 Configuring IKE Over
Policy Management
Nokia 371 TCP 585
FAQs 389
Null Matches 326 Configuring NAT Traversal
Policy Package 266
(UDP Encapsulation) 586
adding a policy 283 Configuring Remote Clients
advanced security 266 to work with Proxy
O desktop security 266, 274
file operations 275
Servers 589
Configuring Small IKE phase
Objects installation target 282 II Proposals 586
installation targets 276 Configuring Visitor
Address Range 404
overview 266, 274 Mode 588
configuring 244
QoS 266, 274 IKE Over TCP 575
dynamic 404
query network object 278 IPSec Path Maximum
gateway 394
query rules 277 Transmission Units 577
group 402
rule section title 277 NAT Related Issues 574
Host 395
security and address NAT traversal 577
in SmartDashboard 241
translation 274 Passive IPSec PMTU 579
management operations 243
uninstall 268 Proxy Servers 582
managing 240
user database 266 Small IKE Phase II
overview 392
VPN manager 274 Proposals 576
VoIP domain 405
web access 274 UDP Encapsulation 577
Objects Tree
Port scan 169 Visitor Mode in a MEPed
sorting 278
Protection scope 216 environment 584
Office Mode 476
IP Per User 489 with SecurePlatform/
ipassignment.conf File 487, Nokia 584
494
Per Site 499
Q Remote Devices
upgrade 370
Online Updates 215 Remote Firewalls 360
Query
Operation Status 366 Remote Gateways 360
all records 314
OPSEC 361, 369 Remote Upgrade 361
configuration 329
OSE Devices custom 314 Repository 365
RFC 1918 120
599
Route Based VPN 427 SKU 378 deploying on a dedicated
Routers SmartCenter server 352
anti-spoofing management 344 deploying on SmartCenter
capabilities 400 policy versions 345 server 353
Rule version control limiting access 354
section titles 277 operations 346 supported browsers 356
track 321 SmartCenter Server troubleshooting 356
Rule Base. See Security Rule backup and restore 348 SmartUpdate
Base fingerprint 239 centralized policy
SmartDashboard 392 management 361
SmartDefense command line 385
architecture 164 Operation Status pane, using
S DoS attack protection 167 the 364
overview 361
Malicious Activity Detection
Screened Software Types 529 (MAD) 168 SmartView Tracker 311
Secure Internal Communication sequence verifier 160 active 313
(SIC) 363, 368 subscription service 163 alert command
updating 175 configuration 341
SecuRemote/SecureClient
SmartDefense Profiles 173 audit 313
Configuration 515 block intruder 320, 340
Desktop Security Policy 509 Configuring 179
Logging 174 custom commands 320,
Enable Logging 511 339
NAT Traversal Tunneling 512 Profile Cloning 173
SmartMap filter 314, 326
Prepackaged Policy 509 fw.adtlog 313
SCV Granularity for VPN adjust 290
fw.log 313, 318
Communities 504 connections 293
local logging 319
Selective Routing 506 Connectivity Clouds 295
log 313
SecurePlatform 371, 374 customize 290
log export 318
SecurID 449 enable 289
log switch 318, 335
Security Levels 218 folders 297
modes 313
Security Policy 64 Global Arrange 291
null matches 326
Incremental Arrange 292
Security Rule Base overview 311
integration with Rule
basic rules 74 purge 336
Base 300
elements 65 query 314, 329
Internet 295
match 64 remote file management 336
launching 290
using X11 in 75 resolving IP addresses 325
magnification 290
Sequence verifier 160 track options 321
Navigator 291
Services view options 324
output 306
X11 75 working with 319
overview 288
Show 326 Snapshot 374
scrolling 291
SIC 238 select mode 292 Sort 278
ICA, Internal Certificate solution 288 objects list pane 278
Authority 254 toggling 289 Spoofed Reset Protection 173
initialize, Configuration troubleshooting 303 SSL Network Extender
Tool 254 view 289 Configuration 535
reset Trust state 256 working with Network Objects Introduction 526
Secure Internal and Groups 292 Special Considerations 533
Communication 253 SmartPortal Star Community 412, 419, 421,
test SIC status 255 client side requirements 356 433, 435, 437, 439, 441
the solution 254 commands 354 Stateful Inspection 63, 214
troubleshooting 256 configuration 355 Static NAT 122
Trust states 255 connecting to 356 Stop Operation 373
Single Management Console 361 Successive Events 173
600
T Visitor Mode 448, 451, 573,
581, 582, 583, 584, 588,
590, 592
Template 261
VoIP Domains 405
administrator 260
configuring 264 VPN Communities 395, 412,
user 260 419, 420, 424, 428, 431,
Topology 432, 442, 467
network, definition 257 SCV Granularity 504, 515
Tracking vpn macutil 486
basic configuration 323 VPN-1 361
column 309 reboot 373
options 321 UTM Edge/Embedded
overview 309 Gateway 395
rules 321
Troubleshooting
SmartCenter FAQs 388
SmartPortal 356 W
Web
N-tier architecture 212
U vulnerabilities 212
Web and SSH Clients 45
Uninstall on Disconnect 564 Web Intelligence
UNIX 370 connectivity
Upgrade 42 Implications 225
all packages 370 Licensing 230
licenses 375 performance
status 377 implications 228
Upgrade All Packages 367 security levels 218
Upgrades Technologies 214
uninstallation 373 Web Server View 217
User Wireless Hot Spot 510, 518
configuring 261
database 260
managing in LDAP 259
managing in
X
SmartDashboard 260
template 260 X11 service, using in Rule
types 261 Base 75
User Center 363
Users Database 260
install 268
UTM Edge/Embedded
Gateway 395
V
Version Control Operations 346
Version Diagnostics 348
601
602