You are on page 1of 313

Security Engineering

2013 Edition

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties
Preface

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 2
Training Blades and Certification

2 WAYS to EXTEND CCSA / CCSE for 1 YEAR

Take and pass


any 2 Training
Blades OR
+
AppControl Introduction to Gaia

Attend and pass


1 Instructor-led Based on a 2 day course
class
Advanced IPS

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 3
Certification Renewal Examples

CCSA Certification CCSE Certification


Extension Options Extension Options

Training Blades: Instructor Led Training


• Application Control • Advanced IPS
• Data Loss Prevention • SmartConsole Managed
• Introduction to Gaia VSX
• Intrusion Prevention • P1 Managed VSX
• Threat Prevention • Endpoint
OR OR
CCSA exam CCSE exam

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 4
Check Point Certified Security Expert

Key Course Elements

 Advanced and in-depth explanation of FireWall-1


technology

 Key tips and techniques for troubleshooting FireWall-1


 Advance upgrading concepts and practices
 Cluster firewall and management concepts and
practices

 Software acceleration features


 Advanced VPN implementations
2
 Reporting tools options and features
©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 5
CCSE Course Chapters

1. Advanced Upgrading
2. Advanced Firewall
3. Clustering and Acceleration
4. Advanced User Management
5. Advanced IPsec VPN and Remote Access
6. Auditing and Reporting

3/4

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 6
Lab Topology

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 7
Check Point 3D Security

 Policies that support business needs and transform


security into a business process

 Security that involves People in policy definition,


education and incident remediation

 Enforce, consolidate and control all layers of


security- network, data, application, content and user

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 8
Check Point 3D Security

 Security is a process
– A network is never 100% secure
– IT security policy must be transparent
– Challenges to IT involve security, deployment, management,
and compliance
– Security products are tools to avoid risk

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 9
Check Point 3D Security

IT security best practices:

1. Perform a risk assessment


2. Develop and enforce a policy
3. Address known vulnerabilities
4. Control and monitor devices
5. Conduct audits

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 10
Deployment Scenario

Alpha Corp

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 11
Upgrading

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 12
Upgrading

Learning Objectives

 Perform a backup of a Security Gateway


and Management Server
 Upgrade and troubleshoot a Management
Server using database migration
 Upgrade and troubleshoot a clustered
Security Gateway deployment

10

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 13
Upgrading

Backup Schedule

 Snapshot – before major changes


 Backup – every few months
 upgrade_export/migrate export – every month, before
upgrade or migration
 Test backups

11

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 14
Upgrading

Gaia Snapshot Image Management

 With Gaia snapshot image management you can:


– Make a new image
– Revert to a locally stored image
– Delete an image
– Export a local image
– Export an existing image
– Import an exported image
– View an image list

11

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 15
Upgrading

Upgrade Tools

 Backs Check Point configuration independent of


hardware, OS and Check Point version.
 Backup Check Point configuration settings on
management station.
 Intended for upgrades or migration of database
information to new systems with hardware changes.
 Smaller file – dependent on size of Policy
 Can be initiated on live system 12

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 16
Upgrading

Backup Schedule Recommendations

 Snapshot – once before major changes


 Backup – every couple of months
 Upgrade_export/migrate export – every month
 Test your backups

12

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 17
Upgrading

Upgrade Tools

 migrate.conf
 migrate
 pre_upgrade_verifier.exe
 upgrade export
 cp_merge

12

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 18
Upgrading

Performing Upgrades

 Before upgrading – valid support contract


 Upgrade SMS before any gateways
 Process verifies a contract file on server

13

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 19
Upgrading

Upgrading Security Gateways

 Upgrade by:
– SmartUpdate
– Local Upgrade

14

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 20
Upgrading

Upgrading Security Management Server

 Upgrade by:
– Upgrading Production Security Management Server
– Migrate and Upgrade to a New Security Management
Server

14

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 21
Upgrading

Upgrading Full High Availability

 Upgrade by:
– Upgrade one machine and synchronize second
(minimal downtime)
– Upgrade with clean installation on one machine and
synchronize second (system downtime)

16

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 22
Upgrading

Minimal Effort Upgrade

 Each Cluster member treated as individual gateway


 Network downtime
 Distributed deployment upgrade procedure

16

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 23
Upgrading

Upgrading with Minimal Downtime

 Check status of cluster members


 Failover to second cluster member
 Change second cluster member to Active
 Upgrade primary cluster member
 Install policy on cluster object
 Upgrade second cluster member
 Synchronize 16

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 24
Upgrading

Lab Practice

 Lab 1: Upgrade to Check Point R76

18

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 25
Upgrading

Review Questions

1. When should snapshots be performed?

18

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 26
Upgrading

Review Questions

1. When should snapshots be performed?


– At least once, and before major changes, such as
upgrades.

18

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 27
Upgrading

Review Questions

2. To run advanced upgrade or migration, what tool is


used?

18

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 28
Upgrading

Review Questions

2. To run advanced upgrade or migration, what tool is


used?
Migrate.

18

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 29
Upgrading

Review Questions

3. What is a critical task for both Snapshots and


Backups?

18

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 30
Upgrading

Review Questions

3. What is a critical task for both Snapshots and


Backups?
– Testing your backups with either the backup,
upgrade_export, or migrate export files.

18

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 31
Advanced Firewall

20

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 32
Advanced Firewall

Learning Objectives

 Using knowledge of Security Gateway


infrastructure, including chain modules,
packet flow, and kernel tables, to describe
how to perform debugs on firewall
processes

20

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 33
Advanced Firewall

FireWall-1 Infrastructure

 Check Point security components:


– GUI clients
– Security Management
– Security Gateway

21

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 34
Advanced Firewall

GUI Clients

 SmartConsole Applications:
– SmartView Tracker
– SmartEvent
– SmartReporter
– SmartDashboard
 Admin Tools:
– Configure
– Manage & Monitor
– Perform Maintenance
– Generate Reports
– Enforce Policy 21

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 35
Advanced Firewall

Management

 Management Component processes:


– FWM
– FWD
– CPD
– CPWD

21

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 36
Advanced Firewall

Security Gateway

22

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 37
Advanced Firewall

User and Kernel Mode Processes

23

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 38
Advanced Firewall

The CPD Core Process

 Check Point Daemon (CPD):


1. Secure Internal Communication (SIC)
2. Status
3. Transferring messages between processes
4. Policy Installation

24

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 39
Advanced Firewall

FWM

 FWM is available on management products


– GUI Client communication
– DB manipulation
– Policy compilation
– Management HA

24

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 40
Advanced Firewall

FWD

 FWD
– Forwards logs
– Related to policy installation
– Command line tool communication

25

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 41
Advanced Firewall

FWSSD

 FWSSD
– Child process of FWD
– Maintains Security Servers
– Activated features

25

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 42
Advanced Firewall

CPWD

 CPWD (WatchDog)
– Invokes and monitors critical processes
– Check Point daemons
– Restart attempts
– Processes monitored:
– cpd, fwd, fwm
– cpwd_admin utility used to show process
status, and to configure cpwd

25

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 43
Advanced Firewall

Inbound and Outbound Packet Flow

26

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 44
Advanced Firewall

Inbound FW CTL Chain Modules

27

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 45
Advanced Firewall

Outbound Chain Modules

28

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 46
Advanced Firewall

Columns in a Chain

29

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 47
Advanced Firewall

Stateful Inspection

30

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 48
Advanced Firewall

Stateful Inspection
1. Packets pass
through the NIC to
the inspection
module. The
Inspection Module
inspects the
packets and their
data.

31

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 49
Advanced Firewall

Stateful Inspection

2. Packets are
matched to the
policy rule, one
rule at a time.
Packets that do
not match any
rule are
dropped.

31

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 50
Advanced Firewall

Stateful Inspection

3. Logging and/or alerts that have


been defined are activated.

31

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 51
Advanced Firewall

Stateful Inspection

4. Packets that pass


inspection are moved
through the TCP/IP stack
to their destination.

31

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 52
Advanced Firewall

Stateful Inspection

5. For packets that do not


pass inspection and are
rejected by the rule
definition, an
acknowledgement is sent.

31

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 53
Advanced Firewall

Stateful Inspection

6. The packets that do not


pass inspection and do not
apply to any of the rules,
are dropped without
sending an
acknowledgement.

31

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 54
Advanced Firewall

Kernel Tables

 Kernel tables store information on firewall function


 To view Kernel tables: fw tab –t <tablename>
 To view table names on SecurePlaform:
fw tab | grep –e “----” | more

32

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 55
Advanced Firewall

Kernel Tables

 Most traffic information I saved in the Kernel tables


 To view Kernel tables: fw tab –t
 Tables can be:
– Created
– Deleted
– Modified
– Read

32

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 56
Advanced Firewall

Connections Tables

 Connections table = approved connections list


 For every recorded connection, is a matching
reversed entry
 Prevents returning packets on same connection from
being blocked

33

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 57
Advanced Firewall

Connections Tables

 Enhanced performance
 Allow server replies
 Stateful Featues
– Streaming apps
– Sequence verification and translation
– Hide NAT
– Logging, accounting, monitoring
– Client and server id
– Data connections 33

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 58
Advanced Firewall

Connections Table Format

34

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 59
Advanced Firewall

Check Point FireWall Key Features

 Packet Inspection Flow


 CoreXL
 Policy Installation
 Network Address Translation
 Security Servers

35

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 60
Advanced Firewall

Packet Inspection Flow

35

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 61
Advanced Firewall

Packet Inspection Flow

36

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 62
Advanced Firewall

Policy Installation Flow

 Installation
 Verification
 Conversion
 Code generation
 CPTA
 Commit

38

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 63
Advanced Firewall

Policy Installation Process Flow

39

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 64
Advanced Firewall

How NAT Works

41

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 65
Advanced Firewall

Hide NAT Process

 Packet arrives at inbound interface


 Packet inspected by Security Policy
 If accepted, packet entered in connections table
 First packet matched against NAT rules
 If match found, packet is translated
 Packet arrives at TCP/IP stack
 Packet is routed to outbound interface 42

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 66
Advanced Firewall

Hide NAT Process

42

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 67
Advanced Firewall

Security Servers

 Firewall acts as a proxy, and user-mode processes


are employed to manage:
– Application layer enforcement
– User, Client, Session authentication

43

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 68
Advanced Firewall

How a Security Servers Works

 Client initiates a connection to a server


 Firewall kernel signals FWD process using a trap
 FWD spawns the FWSSD child service running the Security
Server

 Security Server binds to a socket – manages connection


 FWD waits for connections on ports of other servers, starting
corresponding servers

 FWD also talks to child processes on other server


43

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 69
Advanced Firewall

How a Security Servers Works

 In the file structure the real_port is the port being


bound to
 If “real_port” is 0, a high random port will be
assigned
 $FWDIR/conf/fwauthd.conf file structure:
<logical_ports> <server>
<real_ports> <opt args>

43

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 70
Advanced Firewall

Basic FireWall-1 Administration

 Configuration file structure – main sub-grouping of


configuration files divided into directories under /opt:
– Cpsuite-R76
– CPshrd-R76
– CPvsxngxcmp
– CPedgecmp

44

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 71
Advanced Firewall

Basic FireWall-1 Administration

 /lib and /conf directories store definitions files


 $FWDIR/lib/*.def stores rulebase and protocol definitions
 $FWDIR/conf/fwauth.NDB stores user definitions
 $FWDIR/conf/fwauthd.conf stores security server
configurations

 $FWDIR/conf/classes.C defines fields for objects in


objects_5_0.C

 $FWDIR/database stores specific object entries on a


gateway 44

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 72
Advanced Firewall

Basic FireWall-1 Administration

 Two ways to view and edit database files


– dbedit
– GUIdbedit.exe

44

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 73
Advanced Firewall

Common Commands

 cpconfig
 cplic print
 cpstart
 cpstop

45

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 74
Advanced Firewall

What is FW Monitor?

 FW Monitor is a packet analyzer


 Provides kernel level inspection
 Works for OSI layer-3 and above
 Syntax is same for all platforms
 Supports CAP output used in Ethereal and
Wireshark

46

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 75
Advanced Firewall

What is FW Monitor?

46

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 76
Advanced Firewall

C2S Connections and S2C Packets

 FW Monitor captures packets entering and leaving


the firewall kernel
 FW Monitor records when the packet enters and
leaves inbound and outbound chains
 Packet must traverse and be inspected by both
firewall chains
 Once fw monitor is executed, parameters will be
displayed in fw monitor – with the same filter
executed on all interfaces in all directions 47

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 77
Advanced Firewall

C2S Connections and S2C Packets

5247

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 78
Advanced Firewall

fw monitor

 Running fw monitor without filters can create


excessive output
 Use filter expressions to specify packets to be
captured and limit amount of output
 General syntax:
fw monitor –e “accept <expression>;”

48

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 79
Advanced Firewall

Lab Practice

 Lab 2: Core CLI Elements of Firewall Administration

49

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 80
Advanced Firewall

Review Questions

1. The core process CPD allows what main functions?

54

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 81
Advanced Firewall

Review Questions

1. The core process CPD allows what main functions?


– SIC (Secure Internal Communication) functionality –
ports 18xxx are used for this communication
– Status – pull AMON status from the
GW/Management using Smart Event Transferring
messages between FW-1 processes.
– Policy installation – received the policy (on the GW)
and pushes it forward to relevant processes and the
Kernel.

49

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 82
Advanced Firewall

Review Questions

2. The firewall’s kernel consists of two completely


separate logical parts representing the process of a
packet coming into and out from the firewall, these
are referred to as...?

49

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 83
Advanced Firewall

Review Questions

2. The firewall’s kernel consists of two completely


separate logical parts representing the process of a
packet coming into and out from the firewall, these
are referred to as...?
– Inbound and Outbound

49

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 84
Clustering and Acceleration

51

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 85
Clustering and Acceleration

Learning Objectives

 Build, test and troubleshoot a ClusterXL Load Sharing


deployment on an enterprise network.

 Build, test and troubleshoot a ClusterXL High Availability


deployment on an enterprise network.

 Build, test and troubleshoot a management HA deployment


on an enterprise network.

 Configure, maintain and troubleshoot SecureXL and


CoreXL acceleration solutions on the corporate network
traffic to ensure noted performance enhancement on the
firewall.

 Build, test and troubleshoot a VRRP deployment on


52
an enterprise network.

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 86
Clustering and Acceleration

VRRP

 VRRP (Virtual Routing Redundancy Protocol)


– Two or more gateways work together as one
– Configurable for high availability and/or load sharing

 Additional functionality of Check Point VRRP


– Prevents “black holes”

53

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 87
Clustering and Acceleration

VRRP vs ClusterXL

 VRRP and ClusterXL – mutually exclusive


 Advantages of ClusterXL
– Transparent failover
– Higher performance
– Easy deployment
– Cost-effective

53

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 88
Clustering and Acceleration

VRRP vs ClusterXL

 Advantages of VRRP
– Minimum failover time
– Supports 255 virtual routers
– Minimum service disruptions during failover
– Election of multiple virtual routers for load balancing
– Addresses failover at router level
– Avoids configuration changes in end nodes if router fails
– No need for router discovery protocol for failover operation
– Multi access LAN technology support

53

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 89
Clustering and Acceleration

Simple VRRP Configuration

54

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 90
Clustering and Acceleration

VRRP in More Than One VRID

55

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 91
Clustering and Acceleration

Multiple VIRDs in Active-Active Configuration

56

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 92
Clustering and Acceleration

VRRP Configurations

 VRRP (Simple Monitored Circuit VRRP)


– Basic parameters
– Applicable for most environments

 Advanced VRRP
– Necessary to monitor each interface individually
– Can change the VMAC (Virtual MAC Address assignment
mode

56

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 93
Clustering and Acceleration

Monitored Circuit VRRP

 Eliminates “black holes” caused by asymmetric routes.


 Done by reducing priority over interfaces
 All interfaces are monitored
 If one interface fails, master releases priority over all
interfaces
 Backup takes over all interfaces and becomes master

57

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 94
Clustering and Acceleration

Troubleshooting VRRP

 Enable traces to log error and event information


– All routers of a VRRP group must have same system time
– All routers of a VRRP group must have same Hello Interval
– The Priority Delta must be sufficiently large
– If different encryption accelerator cards, select
encryption/authentication algorithms supported by both
– VRIDs must be same on all routers in VRRP group
– If interface shows in initialize state, IP address may be invalid
– If SNMP Get lists incorrect IP address, may be incorrect Policy

57

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 95
Clustering and Acceleration

Firewall Policies

 Firewall policies must be configured to accept VRRP


packets.
 Multicast destination for VRRP – 224.0.0.18
 Firewalls in same VRRP group will take on Master state if
policy does not accept packets.

58

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 96
Clustering and Acceleration

Clustering and Acceleration

 SecureXL + ClusterXL + CoreXL = Open Performance


Architecture.

60

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 97
Clustering and Acceleration

Clustering Terms

 Active Up
 Critical Device
 Failure
 Failover
 High Availability (HA)
 Hot Standby
 Cluster Control Protocol
61

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 98
Clustering and Acceleration

ClusterXL

 Organizational needs vs. available resources


 Maintaining dependability of VPN connections critical to
business
 ClusterXL infrastructure ensures no data loss in case of
system failure – load sharing and HA
– High availability ensures redundancy for transparent
failover between machines
– Load Sharing provides reliability and enhances
performance
62

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 99
Clustering and Acceleration

ClusterXL

 Installed in a distributed configuration


 Licensing allows up to three ClusterXL clusters managed
by one Security Management Server
 ClusterXL uses unique physical IP and MAC addresses
for Cluster members
 ClusterXL cluster is represented by a virtual IP address
 Cluster members must synchronize clocks to function
properly
62

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 100
Clustering and Acceleration

Cluster Synchronization

 Cluster members are aware of connections through


other Cluster members via State Synchronization
 Every IP based service including TCP and UDP is
synchronized
 State Synchronization is used by ClusterXL and third-
party OPSEC certified clustering products

63

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 101
Clustering and Acceleration

Cluster Synchronization

 State Synchronization works in two modes:


– Full synchronization
– Delta synchronization

 Full synchronization – initial transfer of state information


 Delta synchronization – update transfer of state
information

60

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 102
Clustering and Acceleration

Synchronized-Cluster Restrictions

 Restrictions to synchronizing cluster members:


– Only cluster members on same platform
– Cluster members must be same software version
– User Auth connections will be lost if cluster member fails
– State of connections using resources in a Security Server
cannot be synchronized
– Account information is accumulated in each Cluster
member, and lost if that member fails before that
information is reported to the SMS

64

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 103
Clustering and Acceleration

Securing the Sync-Interface

 Synchronization network carries sensitive Security Policy


information.
 To secure the synchronization interface:
– Use a dedicated sync network
– Connect the physical network interface of cluster members
directly with cross-over cables or dedicated hub or switch

64

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 104
Clustering and Acceleration

To Synchronize or Not to Synchronize

 Certain types of connections do not require sync:


– Connections solely between cluster members
– Service that puts significant load on network
– Service that opens many short connections

 Bi-directional stickiness is employed for all connections


 For TCP services – HTTP or None – you can configure
to delay connections to only sync if connection exists
after x seconds (SecureXL devices)
65

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 105
Clustering and Acceleration

ClusterXL: Load Sharing

 In Load-Sharing Gateway Cluster, all cluster members


are active – performance advantage
 Load-Sharing deployment modes:
– Multicast
– Unicast

66

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 106
Clustering and Acceleration

Multicast Load Sharing

 ClusterXL Load Sharing Multicast mode


– Every member receives all packets
– ClusterXL decision algorithm decides which member
performs enforcement
– Other members drop the packet
– Only routers or layer 3 switches accepting multicast MAC
addresses in response to ARP requests with unicast IP
addresses are supported

66

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 107
Clustering and Acceleration

Unicast Load Sharing

 ClusterXL Load Sharing Unicast mode


– One machine called the Pivot receives all traffic
– Pivot redistributes traffic to other machines in cluster
– Pivot machine is chosen automatically by ClusterXL
– Pivot machine is only machine in communication with
router
– Pivot functions as cluster router
– Pivot mode is based on unicast addresses only, and works
with all routers and Layer 3 switches

66

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 108
Clustering and Acceleration

Packet Travel – Unicast LS Cluster

1. Router sends ARP request Cluster IP Address

2. Pivot returns ARP reply with own unicast MAC


address

3. Router sends packet to the Pivot

4. Pivot forwards packet to designated Cluster member

5. Cluster member receives packet, sends to


destination

6. Return packet first reaches Pivot, which assigns to


Cluster member

7. Packet forwarded Cluster member for inspection

8. Cluster member sends packet to destination


67

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 109
Clustering and Acceleration

Sticky Connections

 Sticky connections – handled either direction – by single


cluster member
 High Availability mode – all connections routed though
same cluster member
 Load Sharing mode – connections can be made sticky
by enabling Sticky Decision Function

68

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 110
Clustering and Acceleration

Sticky Decision Function

 Sticky connections – handled either direction – by single


cluster member
 High Availability mode – all connections routed though
same cluster member
 Load Sharing mode – connections can be made sticky
by enabling Sticky Decision Function

68

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 111
Clustering and Acceleration

Maintenance Tasks and Tools

 Perform a manual failover of the FW Cluster


– Best practice for initiating failovers:
cphaprob –d STOP –s problem –t 0 register

– Puts current machine into problematic state


– Running cphaprob list will show a STOP entry

– To remove the problematic “STOP”


cphaprob –d STOP unregister

70

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 112
Clustering and Acceleration

Maintenance Tasks and Tools

 Perform a manual failover of the FW Cluster - alternate


– Via the command:
$FWDIR/bin/clusterXL_admin down

– Perform on active cluster member to initiate failover to the


standby cluster member

– To normalize the environment:


$FWDIR/bin/clusterXL_admin up

70

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 113
Clustering and Acceleration

Advanced Cluster Configuration Examples

Example 1 – Setting CCP to use Broadcast


– ClusterXL Control Protocol – multicast by default
– More efficient than broadcast
– If connection switch not able to forward multicast, change
mode to broadcast:
cphaconf set_ccp broadcast
– Traffic will be on UDP Port 8116
– Will survive reboot but as precaution add command to
/etc/rc.local file
– For verification: cphaprob –a if can be executed
– For Verizon Wireless CCP must be set to Broadcast
71

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 114
Clustering and Acceleration

Advanced Cluster Configuration Examples

Example 2 – Multicast MAC Addresses


– To find the multicast MAC address of a cluster on the
Security Gateway run:
cphaconf debug_data

– Output is written to:


– /var/log/messages under the Multicast table section
of each cluster member

68

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 115
Clustering and Acceleration

Management HA

 Security Management Server = system database -


(objects, users, policy information)
 Important to maintain a backup incase of server failure
 Backup Management Server needs to be able to take
over – or fetching of Security Policy and retrieval of the
CRL cannot take place

72

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 116
Clustering and Acceleration

Management HA

 In Management HA the Active SMS has one or more


backup Standby SMS
 These SMS must be same OS and version
 First installed SMS is designated as Primary SMS
 Subsequent SMS installed are designated as Secondary
 Once manually synchronized either SMS can function as
Active SMS

72

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 117
Clustering and Acceleration

The Management HS Availability Environment

 The Secondary SMS is created with empty databases


 The Active SMS populates the Secondary SMS
databases
 The Secondary SMS is ready when:
– It is represented on the Primary SMS by a network object
– SIC has been initialized between it and the Primary SMS
– Manual synchronization has been completed with the
Primary SMS

72

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 118
Clustering and Acceleration

Active vs. Standby

 All management operations are done on the Active SMS


 If the Active SMS is down the Standby SMS must be
made active by the System Admin manually
 Standby and Active SMS are synchronized so databases
are up-to-date
 Gateways can fetch Security Policy and retrieve a CRL
from both the Active and Standby SMS

73

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 119
Clustering and Acceleration

What Data is Backed Up?

 For Management HA to function properly – backed up:


– Databases (such as Objects and Users)
– Certificate information (such as Certificate Authority data
and CRL
– Last installed Security Policy

73

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 120
Clustering and Acceleration

Synchronization Modes

 Two ways to perform synchronizations


– Manual synchronization by System Admin
– Automatic synchronization at set intervals

73

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 121
Clustering and Acceleration

Synchronization Status

 Synchronization status is the status of peer SMSs


– Never been synchronized
– Synchronized
– Lagging
– Advanced
– Collision

74

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 122
Clustering and Acceleration

SecureXL: Security Acceleration

 SecureXL accelerates multiple intensive security


operations
 SecureXL offloads firewall operations to performance-
optimized software or hardware
 Dramatically increases throughput

75

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 123
Clustering and Acceleration

What SecureXL Does

 SecureXL records certain attributes of packets and


packet flows validated by the firewall
 Future validation of related packets and connections is
delegated to the SecureXL API
– Done at hardware interrupt level on x86
– Supervises execution of code in network processors in IP
security appliances

75

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 124
Clustering and Acceleration

Packet Acceleration

 Packets establishing new TCP or UDP connection table


entry are handled in “slowpath”
 Once first packet validated by firewall, further packets
are handled at the OS’s interrupt–level code
 These packets are forwarded directly from the driver
level without added firewall application overhead
 Only packets during the specific TCP/UDP connection
can be accelerated
75

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 125
Clustering and Acceleration

Session Rate Acceleration

 In certain high traffic environments SecureXL:


– Improves new connection rate (connections per second)
– Improves connection setup/teardown rate (sessions per second)

 Extension of SecureXL one-time validation to a range or block


 Once a packet flow is validated and established, a template of that
flow, with source port masked off is saved creating a global match

 New connection setup packets that match, avoid a round trip to the
firewall application.

 Security is not impacted – the OS tracks the state of the new


connection using stateful inspection 76

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 126
Clustering and Acceleration

Masking the Source Port

76

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 127
Clustering and Acceleration

Application Layer Protocol – An Example with HTTP

 Protocol accounting for most Internet traffic is HTTP


 Web pages consist of multiple HTTP components
 Using HTTP 1.0, each component is downloaded using a separate
TCP connection involving substantial overhead in connection setup
and tear-down and proactive firewall connection tracking

 Between the Web Client and a Web Server, TCP connections are
initiated by the Web Client sending an HTTP request

 The Web Server responds by sending the HTTP component

77

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 128
Clustering and Acceleration

Application Layer Protocol – An Example with HTTP

 HTTP Requests (->)


– Each packet from the Web client requesting an HTTP
component from the Web Server has the same source
address, destination address, destination port (80), and
protocol (HTTP).
– Only source port, assigned by the Web client per
connection differs, to create a unique socket address at
the Client for each HTTP request, via separate TCP
connection

77

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 129
Clustering and Acceleration

Application Layer Protocol – An Example with HTTP

 HTTP Component (<-)


– Going the other direction, each packet from the Web
server building the Web page on the Web client has the
same source address, destination address, source port
(80), and protocol (HTTP)
– Only the destination port differs (assigned by the client OS
to that connection

77

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 130
Clustering and Acceleration

Application Layer Protocol – An Example with HTTP

 Once a connection with flow to port 80 is approved by


the firewall application for the web client a template is
created and stored
 All subsequent connection setups carrying those
additional requests can share that template approval
 Establishing those subsequent connections does not
involve a round trip to the firewall, resulting in faster
processing

77

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 131
Clustering and Acceleration

Application Layer Protocol – An Example with HTTP

 At the client Firewall, once a connection with flow to port


80 is approved by the firewall application, all subsequent
connections can share the same approval.
 Establishing those subsequent connections does not
involve a round-trip to the firewall
 SecureXL accelerates subsequent connection
establishment through both firewalls when multiple
connections share the same source address, destination
address, destination (server) port and protocol
78

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 132
Clustering and Acceleration

HTTP 1.1

 HTTP version 1.1 improves protocol performance by


permitting persistent and pipelined server connections
 The server can keep the connection alive after sending
the end of a component, avoiding the need to create a
new connection to send the next component
 While HTTP 1.1 is significantly less connection intensive,
HTTP 1.0 remains the protocol that generates most of
the new connection requests in enterprise and Internet
traffic
78

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 133
Clustering and Acceleration

Factors that Preclude Acceleration

 SDF (Sticky Decision Function)


 QoS
 Connection to or from the module
 Connection requires Security Servers (AUTH, AV, URLF, AS)
 Connections that have a Handler: ICMP, FTP, H323, etc.
 Some IPS features
 IP ID, TTL, DNS Protocol enforcement
 Multicast packets 79

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 134
Clustering and Acceleration

Factors that Preclude Templating (Session


Acceleration)

 Time objects
 Dynamic objects
 Domain objects
 Source port ranges
 IPS features no supported in Acceleration
 NAT
 Encrypted Connections

79

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 135
Clustering and Acceleration

Packet Flow

80

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 136
Clustering and Acceleration

VPN Capabilities

 SecureXL adds VPN routing capabilities and enhanced


connectivity support to VPNs in dynamic routing
environments:
– VPN Link Selection
– Dynamic VPN Routing
– Wire Mode Connections

81

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 137
Clustering and Acceleration

CoreXL: Multicore Acceleration

 CoreXL introduces advanced core-level load balancing


 Multi-core CPU support allows the sharing of traffic among cores of
a single system

 Joining multi-core CPU with SecureXL acceleration, can deliver


more than 10 Gbps of intrusion prevention throughput

 CoreXL replicates the firewall kernel on each processor core, and


handles traffic concurrently – with each instance a complete and
independent inspection kernel.

82

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 138
Clustering and Acceleration

Supported Platforms and Features

 CoreXL is supported on SecurePlatform, Gaia, IP, and Crossbeam


platforms. It does not support Check Point Suite with the following
features:
– Check Point QoS
– Traffic view in SmartView Monitor
– Firewall-1 GX
– Route-based VPN
– IP Pool NAT
– IPv6
– Overlapping NAT
– SMTP resource
82

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 139
Clustering and Acceleration

Default Configuration

 CoreXL – the number of kernel instances is based on the total


number of cores in the system:

83

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 140
Clustering and Acceleration

Processing Core Allocation

 CoreXL software architecture includes the Secure Network


Distributor. SND is responsible for:
– Processing incoming traffic from the network interfaces
– Securely accelerating packets
– Distributing non-accelerated packets among kernel
instances

83

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 141
Clustering and Acceleration

Processing Core Allocation

 Traffic entering NIC is directed to processing core running SND


 Setting a kernel instance or process to run on a particular core is
called the instance’s or process’s affinity with that core

 Default affinity setting for all interfaces is Automatic


 Automatic affinity = affinity is reset every 60 seconds, and balanced
between available cores

 Any processing core running a kernel instance is considered


unavailable, and will not be set as the affinity for any interface

83

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 142
Clustering and Acceleration

Processing Core Allocation

 In some cases, SND cores can be overloaded due to


high traffic
 Manual sim affinity can alleviate this:
– sim affinity -1 and the /proc/interrupts file to see
affinity distributions

 Each busy interface should be assigned its own IRP and


distributed among SND cores
 Refer to sk33250 on how to edit sim affinity
84

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 143
Clustering and Acceleration

Allocating Processing Cores

 In some cases, it may be advisable to change the


distribution of kernel instances, SDN, and other
processes among the cores.
 This is done by changing affinities of NICs and/or
processes
 If you change affinities of interfaces or other processes,
you need to set the number of kernel instances and
ensure that the instances run on other processing cores

84

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 144
Clustering and Acceleration

Adding Processing Cores to the Hardware

 Increasing number of processing cores on hardware


does not automatically increase kernel instances
 If kernel instances are not increased, CoreXL does not
utilize some of the processing cores
 After upgrading hardware, increase number of kernel
instances using cpconfig

84

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 145
Clustering and Acceleration

Adding Processing Cores to the Hardware

 Reinstalling the gateway will change the number of


kernel instances if you have upgraded the hardware to
increase processing cores, or the number of kernel
instances was changed.
 Use cpconfig to reconfigure the number of kernel
instances

85

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 146
Clustering and Acceleration

Adding Processing Cores to the Hardware

 In clustering deployment, changing number of kernel


instances is treated as a version upgrade
 Follow directions in the Upgrade Guide, and perform
either a Minimal Effort Upgrade, or a Zero Downtime
Upgrade
 Substitute the instance number change for the version
upgrade in the procedure
 A Full Connectivity Upgrade cannot be performed when
changing number of kernel instances
85

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 147
Clustering and Acceleration

Allocating an Additional Core to the SND

 In some cases, the default configuration of instances


and SND is not optimal – where the load of the SND
may be disproportionate to that of kernel instances:
– Most traffic of type accelerated by Performance Pack
– ClusterXL Load Sharing Deployment
– IPS features disabled

 If the SND is slowing traffic, and there are enough cores


to reduce kernel instances, allocate an additional core to
the SND

85

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 148
Clustering and Acceleration

Allocating a Core for Heavy Logging

 If gateway performing heavy logging:


– Allocate a processing core to the fwd daemon

 This will reduce the number of cores available for kernel


instances

85

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 149
Clustering and Acceleration

Packet Flows with SecureXL Enabled

 Acceleration path
– Packet handled by
Secure XL

 Medium path
– Packet handled by
Secure XL, except for
IPS processing

 Firewall path
– SecureXL unable to
process packet
86

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 150
Clustering and Acceleration

Lab Practice

 Lab 3: Migrating to a Clustering Solution

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 151
Clustering and Acceleration

Review Questions

1. What is the main advantage of Monitored-circuit


VRRP?

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 152
Clustering and Acceleration

Review Questions

1. What is the main advantage of Monitored-circuit


VRRP?
– Eliminates “black holes” caused by asymmetric
routes when one interface on the master fails

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 153
Clustering and Acceleration

Review Questions

2. What two modes does State Synchronization work


in?

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 154
Clustering and Acceleration

Review Questions

2. What two modes does State Synchronization work


in?
– Full synchronization
– Delta synchronization

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 155
Clustering and Acceleration

Review Questions

3. What does Check Point recommend for security the


synchronization interface?

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 156
Clustering and Acceleration

Review Questions

3. What does Check Point recommend for security the


synchronization interface?
– Using a dedicated sync network
– Connecting the physical network interfaces of
the cluster members directly using a cross-over
cable

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 157
Clustering and Acceleration

Review Questions

4. In a Management HA environment, how do you


know when the Secondary SMS is ready?

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 158
Clustering and Acceleration

Review Questions

4. In a Management HA environment, how do you


know when the Secondary SMS is ready?
– It is represented on the Primary SMS by a
network object
– SIC has been initialized between it and the
Primary SMS
– Manual synchronization has been completed
with the Primary SMS for the first time

87

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 159
Advanced User Management

89

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 160
Advanced User Management

Learning Objectives

 Using an external user database such as LDAP,


configure User Directory to incorporate user
information for authentication services on the
network.

 Manage internal and external user access to


resources for Remote Access or across a VPN

 Troubleshoot user access issues found when


implementing Identity Awareness

90

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 161
Advanced User Management

Active Directory OU Structure

 Active Directory – database technology based on Lightweight


Directory Access Protocol (LDAP)
 Based on objects and containers set up in a hierarchical
structure
 Each tier of the hierarchy is made up of containers containing
objects or a container containing other containers and
objects

91

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 162
Advanced User Management

Active Directory OU Structure

 Each object or entry in the directory is made up of a set of attributes with


an attribute type or description and one or more values

 Set of rules that govern the types of objects in the directory, and their
associations is called the schema

 Each object has a unique identifier, its Distinguished Name (DN)


 This is a Relative Distinguished Name, constructed from some attributes
in the object, followed by the parent entry’s DN

91

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 163
Advanced User Management

Active Directory OU Structure

 The container is called an Organizational unit (OU).


 OU’s are tiers in the hierarchy, and contain objects in three
categories:
– Resources
– Services
– Users

91

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 164
Advanced User Management

Active Directory OU Structure

 AD hierarchies are nested within each other, stemming from


a root level.
 Example: atlantiscorp.cp.local sub-OU’s:
– sales.atlantiscorp.cp.local
– finance.alantiscorp.cp.local
– mis.atlantiscorp.cp.local

 Each are distinct containers at their own level and are part of the
enterprise container: atlantiscorp.cp.local

 A user in MIS could have an AD designation of:


– CN=Boucher\\,Eric,OU=MIS,DC=atlantiscorp,DC=cp,DC=local 92

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 165
Advanced User Management

Active Directory OU Structure

92

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 166
Advanced User Management

Using LDAP Servers with Check Point

 The Security Management Server supports LDAP


 No user management infrastructure in place?
– Choose between managing Domains internally, or
implementing LDAP
– Large user count – use an external user management
database such as LDAP

 LDAP advantages:
– SMS performance enhanced
– LDAP database available for other applications
93

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 167
Advanced User Management

Using LDAP Servers with Check Point

 To manage users on User Directory (LDAP) server – special


license required
 Integrate SMS and Security Gateways with User Directory to:
– Query user information
– Enable User management
– Enable CRL retrieval
– Authenticate users

93

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 168
Advanced User Management

LDAP User Management with User Directory

 Integrated with Check Point Security Management, LDAP is


User Directory (LDAP)
 Security Management Server and Security Gateway function
as User Directory clients
 SMS manages user information in the User Directory (LDAP)
server
 Security Gateway queries it for user information, retrieving
CRLs and for authentication
94

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 169
Advanced User Management

LDAP User Management with User Directory

 Differences between internal users and User Directory


(LDAP):
– User management on User Directory server is done externally
– User Directory server template can be modified and applied to
users dynamically

94

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 170
Advanced User Management

LDAP User Management with User Directory

 User Directory (LDAP) features:


– Based on client/server model
– Each entry has a unique DN
– Default port numbers are TCP 389, TCP 636
– Each LDAP server is an Account Unit
– High Availability
– Compartmentalization
– Encrypted and non-encrypted connections
– Support multiple LDAP vendors using Profiles

94

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 171
Advanced User Management

Defining an Account Unit

 An Account Unit is an interface between client and server


 Each account unit represents one or more branches of each
User Directory (LDAP) server
 An Account Unit represents the location of users in the LDAP

95

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 172
Advanced User Management

Configuring Active Directory

 User Management Wizard for configuring Active Directory


 User Management Wizard has two parts:
– Quick setup of AD
– Users, Groups, LDAP Groups and Authentication Servers
Management

 RADIUS server is configured in Wizard as well

95

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 173
Advanced User Management

Schemas

 LDAP Schema defines types of objects and object attributes


 Default schema includes user definitions for that proprietary
LDAP server
 Check Point schema complements structure of information in
LDAP server, includes SMS and Gateway specific
information
 Check Point schema can be used to enhance object
definitions for more granular user authentication
95

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 174
Advanced User Management

Multiple User Directory (LDAP) Servers

 With Multiple User Directory (LDAP) Servers – query from


clients made to servers based on priority defined:
– By Gateway
– By Account Unit

96

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 175
Advanced User Management

Authentication Process Flow

96

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 176
Advanced User Management

Limitations of Authentication Flow

 Some limitations to keep in mind:


– Authentication method is set on user record - internal database
– Authentication schema cannot be set on user record – LDAP
database – without extending the schema
– Predefined search order – 1st internal database, then LDAP
servers – slows search down – conflicting user information
– All LDAP servers searched simultaneously – cannot determine
which account unit to search

97

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 177
Advanced User Management

User Directory (LDAP) Profiles

 User Directory profiles designed to normalize different LDAP


vendor’s dissimilar object repositories, schema, and object
relations
 Four default profiles:
– OPSEC_DS
– Netscape_DS
– Novell_DS
– Microsoft_AD

97

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 178
Advanced User Management

Troubleshooting User Authentication and User


Directory (LDAP

 User Authentication problems? Verify configuration.


1. Make sure that Global properties > Smart Directory (LDAP) >
Use Smart-Directory(LDAP) for Security Gateways is checked.
2. Verify that your AU (Account Unit) is configured for user
management, i.e., User management is checked on the General
tab of the AU.
3. Configure the correct User Directory profile. Which LDAP server are
you using? Is it one of our supported OPSEC servers?
Verify that your OPSEC LDAP server is supported on http://
www.opsec.com/solutions/
sec_authentication.html.
98

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 179
Advanced User Management

Troubleshooting User Authentication and User


Directory (LDAP

4. Check the AU object is configured correctly, i.e., profile, correct


branches and
5. Check the LDAP group objects configuration. How did you
configure the LDAP groups? If you selected the option:
All Account-Unit’s Users or Only Sub Tree - the groups defined
on the LDAP server are irrelevant
Only Group in branch - the group must point to a group on the
LDAP server. Is it a dynamic group?
6. Where do you use authentication? The relevant LDAP groups
should be used in the authorizations of the product that uses
authentication. For example, when using Endpoint Connect, the
user groups should be defined on the Remote Access object.
98

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 180
Advanced User Management

Troubleshooting User Authentication and User


Directory (LDAP

 Once configuration is verified – debug:.


– Run TDERROR_ALL_AU=5 on the process that performs the
authentication.
– In this case, it depends on item number 4 above
– for example, it would be the vpnd process for Endpoint
Connect.
– Try to authenticate with the problematic user (and with a user
that authenticated successfully if you have one), and save the
log file.

98

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 181
Advanced User Management

Troubleshooting User Authentication and User


Directory (LDAP

 Once configuration is verified – debug:.


– A capture of a successful and unsuccessful login will help you
in investigating the problem
– Be sure your AU object is configured not to work with SSL so
that you have a clear connection
– When you have the capture, try to see which attributes are
being used to query for group membership..

98

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 182
Advanced User Management

Common Configuration Pitfalls

 When troubleshooting User Directory (LDAP):


– The Use User Directory (LDAP) checkbox is unchecked in Global
Properties.
– Getting the bind credentials for the LDAP AU is wrong. Incorrect
credentials are not flagged at the time the AU is created.
– The option, User Management is unchecked on the General tab of the
AU.
– Allowed authentication schemes may be configured on the SG, but
the corresponding scheme is not selected in the AU properties.

99

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 183
Advanced User Management

Common Configuration Pitfalls

 When troubleshooting User Directory (LDAP), cont.:


– The AUs are assigned to the SG, but the AU is not selected.
– The LDAP schema is not extended and the AU is not assigned with
an authentication scheme.
– Even if the schema is extended, the authentication schema on the
user record could still be undefined. It will remain undefined even
though the AU defines a scheme.
– If the generic template is used and a password is defined on it.

99

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 184
Advanced User Management

Some LDAP Tools

 ldapsearch
For example: ldapsearch -D cn=administrator,
cn=users,dc=boaz,dc=com -w zubur1! -b
cn=users,dc=boaz,dc=com -h 20.20.20.100
'(&(objectclass=user)(sAMAccountName=zaza) )'
mobile otherMobile.

 ldapcmd (per process, commands: cacheclear, cachetrace,log


on/off)

 Ldapmodify
For example: ldapmodify -c -h <host> -D <Admin FQDN> -w
<password> -f <schema ldif file>
99

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 185
Advanced User Management

Troubleshooting User Authentication

 A set of libraries in the /CPShared directory is linked to the


application process. The processes which perform the
authentication include:
– fwm - SmartDashboard authentication
– vpnd - Remote Access authentication
– cvpnd - SSL VPN user authentication
– Security Servers - user/client/session authentications

100

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 186
Advanced User Management

Troubleshooting User Authentication

 The authentication is mostly performed by the infrastructure


in cpauth. The authentication infrastructure code modules in
the chain include::
– cpauth
The authentication schemes performed by cpauth include:
Username and password (internal database as well as LDAP)
RADIUS
SecurID
TACACS
OS password
– cpldapcl, ldap
100
– ace5sdk
©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 187
Advanced User Management

Troubleshooting User Authentication

 When examining log entries, search for the following


information to help with the debugging:
– Username
– Functions: make_au, au_auth, au_fetchuser,
cpLdapGetUser, cpLdapCheck
– After fetch the user’s set is printed
– Auth starts with au_auth_auth, look for the authentication result
– Often the problem is authorization, not authentication

100

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 188
Advanced User Management

Identity Awareness

 Identity Awareness key features:


– Configurable access roles
– Multiple user identification methods
– Deployment wizard for fast & simple deployment
– Identity sharing

 Identity Awareness uses IP addresses as a means to map


users and machine identities

101

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 189
Advanced User Management

Identity Awareness

 Identity Awareness acquires user identities from Identity


Sources
– AD Query
– Captive Portal

 Once an Identity Source is enable on the Gateway, a


network IP address is mapped to the user
 When traffic arrives from/to the IPs, user and computer name
information is included in the logs
101

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 190
Advanced User Management

Identity Awareness

 Identity Awareness troubleshooting procedures:


1. Verify AD Query Setup
2. Identify users behind an HTTP proxy
3. Verifying there’s a logged on AD user in the source IP
4. Checking the source computer OS and activating captive
portal
5. Using SmartView Tracker for further troubleshooting

102

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 191
Advanced User Management

Enabling AD Query

 Once AD Query is enabled, the Gateway registers to the


Domain Controllers to analyze security logs and map IP on
the network to users and computers
 Detecting all users and computers may take a few hours,
depending on network activity
 To quickly ID a user, lock and unlock the users' computer, to
generate a security event

102

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 192
Advanced User Management

AD Query Setup

 Verify the following conditions:


– Active Directory even logging is setup
– Verify Domain Controllers are configured to audit and authenticate success
events – look for these event numbers
– Windows 2003: events 672, 673, 674
– Windows 2008: events 4624, 4768, 4770
– The LDAP Account Unit is setup
– The gateway connects to all domain controllers
– A firewall/IP devise en route to the domain controller is blocking DCOM
– Check Point Firewall or IPS is blocking DCOM
– Non-English user names
– Users reach the gateway and domain controller with the same endpoint ID
103

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 193
Advanced User Management

Identifying Users Behind an HTTP Proxy

 With an HTTP proxy server between users and Security


Gateway, logs show the proxy as the source IP address, not
user identities
 For Application Control add X-Forward-For HTTP Header, to
the proxy server to resolve the issue:
1. Configure the proxy server to use X-Forward-For HTTP Header
2. In SmartDashboard, on the Identity Awareness page of the gateway
object, check “For Application Control blade, detect users located
behind HTTP proxy using X-Forward-For header”
3. Install the policy
104

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 194
Advanced User Management

Verify Logged On AD User at the Source IP

 Verify computer on the IP is a domain computer, and has a


user logged on
1. Verify the computer is a domain member. From a computer in
the domain, try to access the C$ share on the source IP. For
example, using the Start- >Run command, enter
\\10.0.0.1\C$. When prompted for credentials, enter a
domain administrator credentials. If you successfully opened
the C$ share, it means this is a domain computer.
2. Verify that there's a user logged on. Use a WMI tool such as
WMI Explorer to remotely connect to the IP and query for the
user name.
104

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 195
Advanced User Management

Checking the Source Computer OS

 Cannot connect to source IP C$ share or with WMI Explorer:


– Possible that this computer is not a member of the domain
– Possible that this IP is a domain computer but RPC and
WMI traffic is blocked on network or target computer

105

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 196
Advanced User Management

Checking the Source Computer OS

 To determine the OS at the IP, use remote endpoint profiling


tools such as nmap to detect the OS.
 For example run “nmap –A 10.0.0.1” to detect the OS on
this IP:

105

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 197
Advanced User Management

Checking the Source Computer OS

104105

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 198
Advanced User Management

Using SmartView Tracker

 Track Identity Awareness Login Activity to troubleshoot:


1. Open SmartView Tracker Identity Awareness Login Activity
View
2. Search for log records from source IP missing in logs
– If no logs, search in log files switched already – still no logs? AD
Query failed to ID user – contact support
– If you see Login and AD Query on different gateway, verify
identity sharing configure correctly in Identity Awareness Prop.
– If you see Logout logs despite user was active in duration,
increase the AD Query association time-out
– If you see a Logout log of user, followed by Login log of different
user on same IP, may be Windows service logging in with 106
a user account
©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 199
Advanced User Management

Lab Practice

 Lab 4: Configuring SmartDashboard to Interface with


Active Directory

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 200
Advanced User Management

Review Questions

1. What objects make up an Organizational Unit


container?

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 201
Advanced User Management

Review Questions

1. What objects make up an Organizational Unit


container?
– Resources
– Services
– Users

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 202
Advanced User Management

Review Questions

2. What does an LDAP Schema do?

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 203
Advanced User Management

Review Questions

2. What does an LDAP Schema do?


– Defines the types of objects and object attributes in the
directory

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 204
Advanced User Management

Review Questions

3. How long can it take for an AD Query to map users


and computers to IPs?

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 205
Advanced User Management

Review Questions

3. How long can it take for an AD Query to map users


and computers to IPs?
– AD Query may take up to a few hours to complete the
mapping of users and computers to IPs

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 206
Advanced User Management

Review Questions

4. If you cannot connect to the source IP C$ share or


with WMI Explorer, what is the likely cause?

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 207
Advanced User Management

Review Questions

4. If you cannot connect to the source IP C$ share or


with WMI Explorer, what is the likely cause?
– This IP is a computer that is not a member of the domain

107

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 208
Advanced IPsec VPN and Remote Access

109

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 209
Advanced IPSec VPN and Remote Access

Learning Objectives

 Using our knowledge of fundamental VPN tunnel


concepts, troubleshoot a site-to-site or certificate-
based VPN on a corporate gateway using IKEView,
VPN log files and command-line debug tools.

 Optimize VPN performance and availability by using


Link Selection and Multiple Entry Point solutions.

 Manage and test corporate VPN tunnels to allow for


greater monitoring and scalability with multiple
tunnels defined in a community including other VPN
providers. 110

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 210
Advanced IPSec VPN and Remote Access

IPsec

 IPsec is open standard protocol suite for secure IP


communication, using authentication and encryption
techniques on IP packets:
– Authentication Headers (AH)
– Encapsulating Security Payloads (ESP)
– Security Associations (SA)

111

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 211
Advanced IPSec VPN and Remote Access

Internet Key Exchange (IKE)

 IKE negotiations – two phases


– Phase 1 (Main mode)
– Phase 2 (Quick mode)

 Negotiation process can be observed in ike.elg with IKE


view

112

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 212
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Phase 1

 Phase 1 (Main mode) negotiates encryption methods, and


establishes a key to protect messages of an exchange
– Stage 1: Pears negotiate algorithms, authentication methods,
and Diffie-Hellman groups
– Stage 2: Each gateway generates a DH private key and public
keys and calculates the shared key
– Stage 3: Peers authenticate using the certificate or PSK

111

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 213
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

 The IKE exchange uses six packets for Phase 1 (Main


mode), and three packets for Phase 2 (Quick mode)
 For Main mode packet 1, the initiator 172.24.104.1 provides:
– Encryption algorithm: AES-CBC
– Key length: 256 bit
– Hash algorithm: SHA1
– Authentication method: pre-shared key

111

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 214
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

– 172.24.104.1
– Encryption algorithm:
AES-CBC
– Key length: 256 bit
– Hash algorithm: SHA1
– Authentication
method: pre-shared
key

111

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 215
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

1. Packet 2 is from the responder to agree on one encryption and hash algorithm:

113

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 216
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

2. Packets 3 and 4 perform key exchanges and include a large number never used
before, called a nonce:

112

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 217
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

3. Packets 5 and 6 perform authentication between the peers of the tunnel. The
peer’s IP address shows in the ID field under MM packet 5:

113

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 218
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

4. Packet 6 shows the peer has agreed to the proposal and has authenticated the
initiator:

113

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 219
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

 In Phase 2
– Security Associations are negotiated
– Shared-secret key material is determined
– Additional DH exchange occurs

 Phase 2 failures are often due to misconfigured VPN Domain,


such as:
– Omitted objects
– Duplicate objects
– All IP address behind the gateway
114

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 220
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process

 Phase 2 Stages
– Peers exchange more key material and agree on encryption and
integrity methods for IPSec
– DHC key is combined with the key material to produce the
symmetrical IPSec key
– Symmetric IPSec keys are generated

115

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 221
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

1. Packet 1 proposes either a subnet or host ID, an encryption and hash algorithm,
and ID data:

115

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 222
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

In the ID field, the initiator’s VPN Domain configuration displays. In the following figure,
the VPN Domain for the initiator is the 10.2.4.0/24 network:

116

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 223
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

2. ID field_2 proposes the peer’s VPN Domain configuration. In the figure below, the
VPN Domain for the peer Gateway is the 10.2.2.0/24 network:

116

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 224
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

3. Packet 2 from the responder agrees to its own subnet or host ID, and encryption
and hash algorithm:

117

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 225
Advanced IPSec VPN and Remote Access

IKE Key Exchange Process – Example

4. Packet 3 completes the IKE negotiation:

117

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 226
Advanced IPSec VPN and Remote Access

Remote Access VPNs

 Check Point provides several Remote-Access VPN solutions


 Newest – Endpoint Connect
– Lightweight remote access client
– Native desktop used to launch business applications
– Does not require authentication each time a connection is
initiated

118

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 227
Advanced IPSec VPN and Remote Access

Connection Initiation

 In order for VPN tunnel between the site and remote user, an
IKE negotiation must take place between them
 Peer identities are authenticated (Phase 1):
– Digital Certificates
– Pre-Shared Secrets
– Hybrid Mode
– One-Time Password
– Security Gateway Password
– OS Password
– RADIUS
– TACACS
118
– SAS

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 228
Advanced IPSec VPN and Remote Access

Connection Initiation

 Once authentication is successful, IKE negotiation (Phase 2)


occurs, and VPN tunnel is established

118

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 229
Advanced IPSec VPN and Remote Access

Connection Initiation

 Client connects to gateway with a Connection Mode


 Initial connection is to the gateway, with subsequent
connections to internal resources made though VPN links
 Five connection methods:
– Office Mode
– Visitor Mode
– Hub Mode
– Auto Connect
– User Profile
119

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 230
Advanced IPSec VPN and Remote Access

Link Selection

 Link selection specifies which interfaces are used for incoming


and outgoing VPN Traffic
 Configuration options:
– Probe link for availability
– Use Load Sharing on links to distribute VPN traffic
– Use links based on services to control the bandwidth
– Set up links for remote access

119

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 231
Advanced IPSec VPN and Remote Access

Link Selection

 Link selection is only applicable to locally managed VPN


peers
 A link set to the wrong IP address can damage VPN
connectivity configuration, unless configured to “auto probe”

119

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 232
Advanced IPSec VPN and Remote Access

Multiple Entry Point VPNs

 Multiple Entry Point (MEP) VPNs provide high availability:


– MEP VPNs are not restricted to gateway location
– MEP Security Gateways can be managed by separate
Management Servers
– No state synchronization needed between gateways
– VPN client selects which Gateway site will take over if
connection fails

121

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 233
Advanced IPSec VPN and Remote Access

How Does MEP Work

 MEP VPNs continuously probes IP connections to check


gateway availability
 This is done via Probing Protocol (PP) sending special UDP
RDP packets to port 259 to check if an IP is reachable

121

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 234
Advanced IPSec VPN and Remote Access

Explicit MEP

 Only Star VPN Communities with more than one central


Security Gateway can be defined as explicit MEP VPNs
 Entry point Security Gateways are chosen by:
– First to respond (Gateway closest to source)
– By VPN domain (Gateway closest to destination)
– For Load distribution (random selection)
– MEP rules (from priority list)

121

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 235
Advanced IPSec VPN and Remote Access

Implicit MEP

 Fully or partially overlapped encryption domains – MEP VPNs


can be implicitly defined
 Implicit MEP VPNs select entry-point Security Gateway by:
– First to respond
– Primary-Backup
– Load Distribution

 For remote access MEP VPNs, clients must use Office mode

122

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 236
Advanced IPSec VPN and Remote Access

Tunnel Management

 Two types of VPN tunnel management:


– Permanent Tunnels
– VPN Tunnel Sharing

123

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 237
Advanced IPSec VPN and Remote Access

Permanent Tunnels

 Permanent tunnels are always active and monitored


 Permanent tunnels can only be established between Check
Point Gateways, configured:
– For the entire community
– For a specific Gateway
– For a single VPN tunnel

123

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 238
Advanced IPSec VPN and Remote Access

Tunnel Testing

 Tunnel Test – to test a VPN tunnel is active


 Tunnel Test packet has an arbitrary length – only first byte
contains meaningful data – the type field:
– 1 – Test
– 2 – Reply
– 3 – Connect
– 4 – Connected

124

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 239
Advanced IPSec VPN and Remote Access

Tunnel Testing

 Tunnel Test – requires two Gateways, a pinger and a


responder
 Pinger sends type 1 or type 3 message, responder responds
with type 2 or type 4 message

124

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 240
Advanced IPSec VPN and Remote Access

VPN Tunnel Sharing

 VPN tunnel sharing provides for interoperability and scalability


by controlling the number of VPN tunnels via three settings:
– One VPN Tunnel per each pair of hosts
– One VPN Tunnel per subnet pair
– One VPN Tunnel per Gateway pair

124

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 241
Advanced IPSec VPN and Remote Access

Tunnel Management Configuration

125

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 242
Advanced IPSec VPN and Remote Access

Permanent Tunnel Configuration

 To set VPN tunnels as permanent, use one of the Permanent


Tunnel modes:
– On all tunnels in the Community
– On all tunnels of specific Gateways
– On specific tunnels in the Community

126

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 243
Advanced IPSec VPN and Remote Access

Tracking Options

 Administrators can monitor tunnel status by configuring


alerts
 Alerts can be configured globally or individually on tunnels
 Alert options:
– Log
– Popup Alert
– Mail Alert
– SNMP Trap Alert
– User Defined Alert
126

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 244
Advanced IPSec VPN and Remote Access

Advanced Permanent Tunnel Configuration

 Several attributes allow for customization of tunnel tests and


intervals for permanent tunnels:
1. In SmartDashboard, select Global Properties >
SmartDashboard Customization.
2. Click Configure. The Advanced configuration screen is
displayed.
3. Click VPN Advanced Properties > Tunnel Management to
view the five attributes.
127

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 245
Advanced IPSec VPN and Remote Access

VPN Tunnel Sharing Configuration

 Configuration of VPN Tunnel Sharing can be set on both the


VPN community and Gateway objects.:
– One VPN Tunnel per each pair of hosts
– One VPN Tunnel per subnet pair
– One VPN tunnel per Gateway pair

 If there is a conflict between the tunnel properties of a VPN


Community and a Gateway object that is a member of that
same Community, the “stricter” setting is used.

127

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 246
Advanced IPSec VPN and Remote Access

Troubleshooting

 1st step – are packets traversing the VPN tunnel?


– Use SmartView Tracker logs to confirm packets arriving at
Gateway
– fw monitor can confirm if IKE packets arrive and leave the
Gateway

128

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 247
Advanced IPSec VPN and Remote Access

Troubleshooting

 Run a debug for IKE traffic


– vpn debug on
– Generate traffic from VPN Domain to peer’s VPN Domain
– If ike.elg file does not contain useful information, an invalid
tunnel may have been set up

127

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 248
Advanced IPSec VPN and Remote Access

Troubleshooting

 Use vpn tu to remove site-to-site IKE and/or IPSec keys and


initiate traffic
– Check ike.elg file to identify on which packet the IKE
negotiation fails
– Check relevant configuration parameters
– Look at the vpnd.elg file for other errors

128

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 249
Advanced IPSec VPN and Remote Access

VPN Debug

 vpn debug Command

vpn debug < on [ DEBUG_TOPIC=level ] | off | ikeon [


- s size(Mb) ]| ikeoff | trunc | truncon | truncoff
| timeon [ SECONDS ] | timeoff | ikefail [ -s
size(Mb) ]| mon | moff >

129

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 250
Advanced IPSec VPN and Remote Access

VPN Debug

 VPN debug on|off


– vpn debug on — Turn on vpn debug, and write the output to
the following file: vpnd.elg
– vpn debug on [debug topic]=[debug level] sets the
specified TDERROR topic to the specified level, without affecting
any other debug settings. This may be used to turn specific topics
on or off.
– vpn debug on TDERROR_ALL_ALL=1,2,3,4,5 turns on default
VPN debugging, i.e., all TDERROR output and default VPN topics,
without affecting any other debug settings.
– vpn debug off — Disable vpn debug.
130

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 251
Advanced IPSec VPN and Remote Access

VPN Debug

 VPN debug ikeon|ikeoff


– vpn debug ikeon — Turn on ike debug and write the output to
the following file: ike.elg
– vpn debug ikeoff — Disable ike debug..

130

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 252
Advanced IPSec VPN and Remote Access

VPN Debug

 vpn Log Files


– IKE debugging is written to $FWDIR/log/ike.elg
– VPN debugging is written to $FWDIR/log/vpnd.elg

130

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 253
Advanced IPSec VPN and Remote Access

VPN Debug

 vpn debug trunc


– When the vpn debug on command runs, the output is written
to $FWDIR\log\vpnd.elg file by default

130

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 254
Advanced IPSec VPN and Remote Access

VPN Environmental Variables

 Setting the environment variables is recommended as a method for


debugging, only if there is a VPN tunnel failure:
– Windows – set VPN_DEBUB=1
– Unix – set VPN_DEBUG 1

131

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 255
Advanced IPSec VPN and Remote Access

VPN Command Options

131

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 256
Advanced IPSec VPN and Remote Access

VPN Debug

 vpn tu
– The command vpn tu is short for vpn tunnelutil, and is
useful for deleting IPSec or IKE SAs to a specific peer or user
without interrupting other VPN activities.

 Example
– You have several site-to-site VPN tunnels among Gateways.
– You want to remove the IKE SAs for a particular peer, without
interrupting the other VPNs. How do you do that?
– Run vpn tu from the Gateway Command Line Interface, and select
delete all IPSec and IKE SAs for a given Peer (GW) option.

132

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 257
Advanced IPSec VPN and Remote Access

VPN Debug

 Comparing SAs
1. Enable VPN debugging on both your site and your partner’s site with vpn
debug on trunc.
2. Use vpn tunnelutil (vpn tu) to remove all SAs for either the peer
with which you are about to create the tunnel, or all tunnels.
3. Have your peer initiate the tunnel from its site to yours.
4. Use vpn tunnelutil (vpn tu) to remove all SAs for either the peer
with which you are about to create the tunnel, or all tunnels.
5. Initiate the tunnel from your site to your peer.
6. Disable debugging on both sites.
7. Examine ike.elg and vpnd.elg, as they will now contain records of
the SA sent by your gateway, as well as what was received from your
partner site.
132

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 258
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Quick mode packet 1 fails with error “No Proposal Chosen” from
the peer.
– Cause: Peer does not agree to the proposal field, such as encryption
strength or hash
– A Security Gateway agrees loosely to the proposal, when host or network
based.
– Third part vendors may only agree to proposals with strict adherence to
defined parameters

133

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 259
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Security Gateway proposes supernetted address as VPN


Domain to Cisco (or other) concentrator in phase 2.
– Cisco device only agrees to a VPN Domain that matches its network
– address and subnet mask.
– This issue is known as the Largest possible subnet problem.

133

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 260
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Largest possible subnet problem - troubleshooting.


– Check the Shared Tunnel settings in the Tunnel Management section
of the VPN community. Make sure both sides agree on either host
based or subnet based.

– Interoperable devices do not support the Gateway to Gateway option.

– In GuiDbedit, change the following property to false.


ike_use_largest_possible_subnet

– This will prevent Check Point from supernetting networks in the VPN
domain. The subnets defined in the network object should be used.
133
– Cont…

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 261
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Largest possible subnet problem - troubleshooting. (Cont.)

– Check for multiple network objects in the VPN domain that overlap.
For example, 10.1.1.1/24 and 10.0.0.0/8 are both in the VPN
domain. It is possible that a packet sourced from 10.1.x.x will use
255.0.0.0 for the subnet in phase 2 instead of 255.255.255.0.

– In some cases, particularly when network overlaps exist in the VPN


domain, it is still required to modify the user.def file. See
SecureKnowledge

– solution sk19243 and sk30919 on Check Point’s Web site:


133
https://usercenter.checkpoint.com/support
©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 262
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Example - 1
– Assume you have a site-to-site VPN between two Check Point
Security Gateways.
– They are managed by their own Management Servers.
– You see a lot of IKE Phase 1 failures in SmartView Tracker.
– You run IKE debug on one Gateway and discover only one packet
in Main mode is transferred.
– There is no packet in Main mode after packet 1.
– What might have caused this problem?

134

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 263
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Example - 1
– What might have caused this problem?

– First, check VPN settings (including Encryption Algorithm, key length,


and Hash method) in the Community object.
– Make sure Phase 1 settings are identical on both sides.
– Check Phase 1 settings in the Advanced settings in the Community
object, such as group 1 or group 2, aggressive mode, etc.
– They must be defined identically on both sides.

134

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 264
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Example - 2
– You are configuring a site-to-site VPN from a Check Point Security
Gateway to a Cisco device.
– You see that traffic initiated from the VPN Domain inside the Security
Gateway is dropped with the error, “Packet is dropped as there is no
– valid SA”.
– The Cisco side is sending “Delete SA” to the Security Gateway.
– The IKE debug indicates a Phase 2 (Quick mode) failure.
– What is causing the misconfiguration?

134

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 265
Advanced IPSec VPN and Remote Access

VPN Encryption Issues

 Example - 2
– What is causing the misconfiguration?

– A Quick mode failure usually indicates the VPN Domain is not


configured exactly the same for one or both peers.

– For example, if the Security Gateway’s VPN Domain is a Class B


network, but the same network is defined with a Class C subnet mask
on the Cisco VPN configuration, then this type of error occurs.

134

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 266
Advanced IPSec VPN and Remote Access

Lab Practice

 Lab 5: Configuring Site-to-Site VPNs with Third Party


Certificates
 Lab 6: Remote Access with Endpoint Security VPN

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 267
Advanced IPSec VPN and Remote Access

Review Questions

1. What are the stages of a Phase 2 IKE exchange?

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 268
Advanced IPSec VPN and Remote Access

Review Questions

1. What are the stages of a Phase 2 IKE exchange?


– Peers exchange more key material, and agree on
encryption and integrity methods for IPSec
– The DH key is combined with the key material to produce
the symmetrical IPSec key
– Symmetric IPSec keys are generated

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 269
Advanced IPSec VPN and Remote Access

Review Questions

2. What is the advantage of Link Selection for VPN traffic?

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 270
Advanced IPSec VPN and Remote Access

Review Questions

2. What is the advantage of Link Selection for VPN traffic?


– When high-traffic demands are applied to the gateway and its
performance is impaired, Link Selection provides the means to
specify which interfaces are to be used for incoming and outgoing
VPN traffic

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 271
Advanced IPSec VPN and Remote Access

Review Questions

3. What type of VPN communities can be explicitly defined


as MEP VPNs?

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 272
Advanced IPSec VPN and Remote Access

Review Questions

3. What type of VPN communities can be explicitly defined


as MEP VPNs?
– Only Star VPN Communities using more than one central Security
Gateway can be defined explicitly as MEP VPNs

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 273
Advanced IPSec VPN and Remote Access

Review Questions

4. Quick mode packet 1 fails with error “No Proposal


Chosen” from the peer. What is likely the cause?

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 274
Advanced IPSec VPN and Remote Access

Review Questions

4. Quick mode packet 1 fails with error “No Proposal


Chosen” from the peer. What is likely the cause?
– This failure is usually caused when a peer does not agree to the
proposal fields, such as encryption strength or hash

135

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 275
Auditing and Reporting

137

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 276
Auditing and Reporting

Learning Objectives

 Create Events or use existing event


definitions to generate reports on specific
network traffic using SmartReporter and
SmartEvent in order to provide industry
compliance information to management.
 Using your knowledge of SmartEvent
architecture and module communication,
troubleshoot report generation given
command-line tools and debug-file 138
information.
©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 277
Auditing and Reporting

Auditing and Reporting Process

 Security Administrator role:


– Guided by process and procedures
– Need to document changes on corporate
network
– Compliance with industry standards and
corporate mandates

 Corporate governance
– Efficient auditing and reporting
– Compliance regulatory practices
139

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 278
Auditing and Reporting

Auditing and Reporting

 Implementing audit policies


– Password changes
– Changes to access rights to shares, files, folders, etc.
– Attempts of unauthorized access to computer system resources.
– Attempts of unauthorized access to information held in application systems.
– All internal system activity including logins, file accesses and security
incidents.
– Produce and retain logs recording exceptions and security-related events
– Any attempts of unauthorized changes to IT systems.
– Key system files and critical data for unauthorized changes.
– Changes to Active Directory permissions for user accounts, groups and
computer accounts.
140

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 279
Auditing and Reporting

Auditing and Reporting

 Implementing audit policies (cont.)


– Unauthorized Active Directory access permissions.
– Any changes to users, groups, rights, and user account policies.
– Notifications of group policy changes.
– Authorized users attempts to perform unauthorized activities.
– Permission changes in Active Directory.
– User information, access information, date and time stamp.
– Real-time policy modifications.
– Last access dates for files and applications

140

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 280
Auditing and Reporting

SmartEvent

 SmartEvent - Management Software Blade


 Uses network security information with real-time security event
correlation and management for Check Point Security Gateways and
third-party devices.

 SmartEvent’s unified event analysis identifies critical security events from


the clutter of data, while correlating events across all security systems.

 Its automated aggregation and correlation of data minimizes the time


spent analyzing log data, and also isolates and prioritizes the real
security threats.
141

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 281
Auditing and Reporting

SmartEvent

141

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 282
Auditing and Reporting

SmartEvent

 SmartEvent – available as a software blade, or an appliance


 SmartEvent Appliance bundle:
– SmartEvent
– SmartReporter
– Logging and Status

142

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 283
Auditing and Reporting

SmartEvent Intro

 SmartEvent Intro – security event correlation and management for a


single Check Point Security Software Blade

 Full reporting – part of SmartReporter Software Blade


 Only possible to install one SmartEvent Intro blade per device
 To monitor and correlate firewall events – use full SmartEvent Software
Blade

142

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 284
Auditing and Reporting

SmartEvent Architecture

 Three main components for log consolidation, correlation, and results


analysis:
– Correlation Unit (CU)
– Analyzer Unit
– Analyzer Client

143

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 285
Auditing and Reporting

Example Deployment

143

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 286
Auditing and Reporting

Component Communication Process

144

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 287
Auditing and Reporting

Analyzer Server

144

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 288
Auditing and Reporting

Event Policy User Interface

 Event Policy is fundamental to the workings of SmartEvent

145

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 289
Auditing and Reporting

Event Policy User Interface

 Edit Event Definition

145

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 290
Auditing and Reporting

Event Policy User Interface

146

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 291
Auditing and Reporting

Event Policy User Interface

147

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 292
Auditing and Reporting

Event Policy User Interface

147

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 293
Auditing and Reporting

Event Policy User Interface

148

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 294
Auditing and Reporting

Event Policy User Interface

149

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 295
Auditing and Reporting

Event Policy User Interface

150

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 296
Auditing and Reporting

Event Policy User Interface

151

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 297
Auditing and Reporting

Event Policy User Interface

152

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 298
Auditing and Reporting

Event Policy User Interface

153

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 299
Auditing and Reporting

SmartReporter

 SmartReporter provides:
– High-level view, trends, reports
– Understanding of the details of each event
– Integration with other tools to modify the security policies
– Manage events by state and owner

154

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 300
Auditing and Reporting

SmartReporter

154

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 301
Auditing and Reporting

Consolidation Policy

 Consolidation Policy:
– Similar to a Security Policy in structure and management
– Uses Rule Bases defined via SmartDashboard
– Uses the network objects
– Consolidation rules – store or ignore logs that match rules
– Based on logs, not security issues

155

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 302
Auditing and Reporting

SmartReporter

155

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 303
Auditing and Reporting

Consolidation Policy

 Consolidation is performed at two levels:


– Interval at which the log was created
– Log fields whose original values should be retained

 When several logs match a Rule and are recorded:


– Values of their relevant fields are saved as-is
– Values of their irrelevant fields are merged or consolidated together

 SmartReporter server then can extract the consolidated records that


match a specific report definition

155

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 304
Auditing and Reporting

Report Types

 Two types of reports can be created:


– Standard Reports
– Express Reports

 SmartReporter Standard Reports are supported by two Clients:


– SmartDashboard Log Consolidator
– SmartReporter Client

156

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 305
User Management and Authentication

Lab Practice

 Lab 7: SmartEvent and SmartReporter

157

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 306
User Management and Authentication

Review Questions

1. What does the SmartReporter Consolidation Policy do?

157

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 307
User Management and Authentication

Review Questions

1. What does the SmartReporter Consolidation Policy do?


– The Consolidation Policy goes over your original “raw” log file,
compressing similar events and writing the compressed list of
events into a relational database.

157

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 308
User Management and Authentication

Review Questions

2. What is the difference between a Consolidation Policy, and


a Security Policy?

157

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 309
User Management and Authentication

Review Questions

2. What is the difference between a Consolidation Policy, and


a Security Policy?
– A consolidation Policy is based on logs, as opposed to
connections, and has no bearing on security issues.

157

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 310
User Management and Authentication

Review Questions

3. When is an event reported?

157

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 311
User Management and Authentication

Review Questions

3. When is an event reported?


– When it is created
– Up to five updates
– When it is closed

157

©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties | 312
Security Engineering
2013 Edition

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2013 Check Point Software Technologies Ltd. [Confidential] — For Check Point users and approved third parties

You might also like