Check Point Getting Started Guide: NG Fp3
Check Point Getting Started Guide: NG Fp3
Guide
NG FP3
For additional technical information about Check Point products, consult Check Points SecureKnowledge at
http://support.checkpoint.com/kb/
List of Figures 3
What is Changed by the Upgrade? 56
Minimizing Downtime During Upgrades 57
Remote Upgrade using SmartUpdate 57
After Upgrading 58
Which Components to Install 58
List of Figures 5
6 Check Point Getting Started Guide September 2002
Preface
7
Who Should Use this User Guide
This User Guide is written for system administrators who are responsible for
maintaining network security. It assumes you have a basic understanding and a working
knowledge of:
system administration
the Unix or Windows operating system
the Windows GUI
Internet protocols (IP, TCP, UDP etc.)
Summary of Contents
Chapter 1, Check Point Enterprise Suite Overview describes Check Points Secure
Virtual Network technology and shows how VPN-1/FireWall-1s architecture and
features are used to enforce an enterprise-wide Security Policy.
Chapter 3, Check Point Software Installation describes the installation procedure for
Check Point software products.
Chapter 2, Before Installing VPN-1/FireWall-1 describes how a system must be
prepared before installing VPN-1/FireWall-1.
Chapter 4, Installing and Configuring VPN-1/FireWall-1 describes how to install
VPN-1/FireWall-1.
Chapter 5, VPN-1/FireWall-1 Tutorial is a short tutorial presenting the major
VPN-1/FireWall-1 features.
Chapter 6, Introduction to Virtual Private Networks describes how
VPN-1/FireWall-1s encryption features enable an enterprise to implement a Virtual
Private Network.
Chapter 7, is a step-by-step tutorial for implementing a Virtual Private Network.
Note - For additional technical information about Check Point products, consult Check
Points SecureKnowledge database at http://support.checkpoint.com/kb/
9
What Typographic Changes Mean
The following table describes the typographic changes used in this book.
TABLE P-1 Typographic Conventions
11
Shell Prompts in Command Examples
The following table shows the default system prompt and superuser prompt for the C
shell, Bourne shell, Korn shell and DOS.
TABLE P-3 Shell Prompts
Shell Prompt
C shell prompt machine_name%
C shell superuser prompt machine_name#
Bourne shell and Korn $
shell prompt
Bourne shell and Korn #
shell superuser
prompt
DOS current-directory>
In This Chapter
Overview page 13
VPN-1/FireWall-1 Basic Concepts page 15
VPN-1/FireWall-1 Architecture page 16
Enterprise Security Management page 20
Overview
Securing the Internet
Internet technology is driving a worldwide business revolution. The reach of the
Internet extends deep within the enterprise network, blurring the line between private
and public networks. With critical communications travelling over heterogeneous
networks, security deployments must protect enterprise networks against intrusion and
ensure the privacy and integrity of communications. This requires a complete
enterprise-wide security solution that protects networks, applications, and users all
the elements of the enterprise network. Check Points Secure Virtual Network (SVN)
architecture uniquely delivers end-to-end network security, enabling enterprises to
protect business-critical Internet, intranet and extranet traffic.
VPN-1/FireWall-1 is a key component of SVN architecture and enables network
security to be managed with a single enterprise-wide Security Policy.
VPN-1/FireWall-1 is a comprehensive security platform that provides:
SmartDefense a product unique to Check Point that protects organizations from
known and unknown network attacks.
13
Overview
Access Control
User Authentication
Network Address Translation (NAT)
Virtual Private Networking (VPN)
High Availability
Content Security (anti-virus, URL and Java/ActiveX screening)
Auditing and Reporting
LDAP-based user management
Third-party Device Management
High Availability and Load Sharing
Enterprise security can be extended with Check Points Open Platform for Enterprise
Security (OPSEC), providing central integration and management of complementary
third-party security applications, services and platforms.
Firewall Requirements
Control decisions require that a firewall be capable of accessing, analyzing and utilizing
the following:
1) communication information information from all seven layers in the packet
Communication Layers
5 Session No
No
4 Transport Yes
No
3 Network Is There
Another Send NACK
VPN-1/FireWall-1 Inspection Module Rule?
2 Data Link
Drop the Packet END
1 HW Connection
VPN-1/FireWall-1 Architecture
VPN-1/FireWall-1s scalable, modular architecture enables an organization to define
and implement a single, centrally managed Security Policy. The enterprise Security
Policy is defined at a central management console and downloaded to multiple
enforcement points throughout the network.
toolbars
SmartMap
Details of the objects
selected in the
Objects Tree...
...are displayed in
the Objects List
SmartCenter Server
Policies are defined using the SmartDashboard GUI and saved on the SmartCenter
Server. The SmartCenter Server maintains the Check Point databases, including
network object definitions, user definitions, policies and log files for any number of
enforcement points.
The SmartDashboard GUI and the SmartCenter Server can be deployed on the same
machine or in a Client/Server configuration.
VPN/FireWall Module
The VPN/FireWall Module is deployed on Internet gateways and other network access
points. The Security Policy is compiled on the SmartCenter Server and loaded to the
VPN/FireWall Module, which enforces the policies. The VPN/FireWall Module can be
installed on a broad range of platforms.
1 This Management
Server ...
Management
Server
(BigBen)
GUI
Client
(Tower) Internet
router
Intranet
FireWalled
Gateway
(London)
router
In this configuration the administrator configures and monitors network activity for
several sites from a single desktop machine. The Security Policy is defined on the
SMART Client, while the Check Point database is maintained on the SmartCenter
Server (also called Management Server). The Security Policy is downloaded to three
VPN/FireWall Modules (each on a different platform), which in turn protect three
networks. The connections between the client, server and multiple enforcement points
are secured, enabling true remote management.
Rule Base
A Rule Base is an ordered set of rules against which each communication is checked.
Each rule specifies the source, destination, service and action to be taken for each
communication for example, whether it is permitted or denied. A rule also specifies
how a communication is tracked for example, a specific event can be logged and
then trigger an alert message.
FIGURE 1-4 SmartDashboard window with Security Policy Rule Base
The tabs displayed in the Check Point SmartDashboard depend on the products
licensed. For example, if only VPN-1/FireWall-1 is licensed, then only the Security
Policy Rule Base and Address Translation Rule Base tabs are displayed. (For more
information on the Address Translation Rule Base, see Network Address Translation
on page 29.) If FloodGate-1 is licensed, then the SmartDashboard displays the QoS
Policy tab. For information on FloodGate-1, see Check Point FloodGate-1 Guide.
Properties
Properties specify general aspects of communication inspection, such as authentication
session timeout periods, or how VPN-1/FireWall-1 handles established TCP
connections. Properties are applied to all rules, so there is no need to specify repetitive
details in the Security Policy.
Network Objects
The SmartDashboard enables administrators to define network resources in terms of
simple objects (for example, gateways, networks, routers or services) and their
properties. Each object has a set of attributes, such as name or IP address. Network
objects are easily defined and then used in the Rule Base.
The Network Object Manager allows you to define the entities that are part of the
Security Policy. Only those objects that are explicitly referenced in a Policy must be
defined. These include:
TABLE 1-1 Network Objects that can be explicitly referenced
Users
VPN-1/FireWall-1 enables access privileges to be defined for users on an individual or
group basis. User groups can be created, and access privileges, including allowed sources
and destinations as well as user authentication schemes, can be defined.
Users can be defined either internally in the Check Point internal database, or they can
be defined in an LDAP-compliant database using either a standard LDAP client or the
Check Point LDAP-compatible SMART Client.
FIGURE 1-7 User Properties window - Check Point internal user and LDAP user
Services
The Service Window (FIGURE 1-8) defines the services known to the system and
used in the Security Policy. All network services are screened and controlled, even
those that are not defined. VPN-1/FireWall-1 includes a comprehensive set of
predefined TCP/IP and Internet services, including the following:
Standard arpa-services: Telnet, FTP, SMTP, etc.
Berkeley r-services: rlogin, rsh, etc.
SunRPC services: NIS/yellow pages, NFS, etc.
Advanced Internet protocols such as HTTP, Gopher, Archie and many others
IP services: Internet Control Message Protocol (ICMP), Routing Internet Protocol
(RIP), SNMP, etc.
FIGURE 1-8 Services window
New services can be defined by selecting the service type and setting the services
attributes. Services can be grouped in families and hierarchies to facilitate management.
VPN-1/FireWall-1 includes the following service types:
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Remote Procedure Call (RPC)
Internet Control Message Protocol (ICMP)
Others enables definition of services and protocols that do not conform to the
standard set of attributes. Services are defined using simple expressions and macros.
The Check Point OPSEC framework provides the Log Export Application (LEA) API
for exporting VPN-1/FireWall-1 Log data to other applications (for example,
spreadsheets or databases). Reporting and event-analysis applications are available from
multiple OPSEC partners.
Authentication
VPN-1/FireWall-1 provides local and remote users secure, authenticated access to
network resources. Flexible authentication methods provide access for users of any IP
application or service. Administrators can determine how each individual is
authenticated, which servers and applications are accessible and the times during which
the user is granted access.
VPN-1/FireWall-1 RADIUS
Password Axent Pathways Defender
OS Password TACACS/TACACS+
S/Key Digital Certificates
SecurID tokens
Authentication Methods
Automatic Configuration
NAT properties are defined for specific network objects, such as gateways or networks.
NAT rules are then automatically generated from these properties.
Security Servers
Authentication
Check Point Security Servers provide authentication for users of FTP, HTTP, TELNET
and RLOGIN. If the Security Policy specifies user authentication for any of these
services, the Inspection Module diverts the connection to the appropriate Security
Server. The Security Server challenges the user for a user name and password. If
authentication is successful, the Security Server opens a second connection to the target
server. For more information on VPN-1/FireWall-1 authentication features, see
Authentication on page 27.
Content Security
VPN-1/FireWall-1 provides powerful Content Security for HTTP, SMTP and FTP
connections, including anti-virus checking for transferred files, access control for
specific network resources (for example, URLs, files etc.) and SMTP commands.
Content Security is defined using Resource objects and implemented by the Security
Servers. Check Points OPSEC framework also provides open APIs for integrating
third-party content screening applications.
Content Security is available for HTTP, FTP and SMTP.
HTTP
The HTTP Security Server provides Content Security based on schemes (HTTP,
FTP, GOPHER, etc.), methods (GET, POST, etc.), hosts (for example, *.com),
paths, and queries. A file can be specified that contains a list of IP addresses and
paths to which access will be denied or allowed.
FTP
The FTP Security Server provides Content Security based on FTP commands
(PUT/GET), file name restrictions, and anti-virus checking for files transferred.
SMTP
The SMTP Security Server provides Content Security based on From and To
fields in the mail envelope and header and attachment types. In addition, it provides
a secure SMTP application that prevents direct online connection attacks. The
SMTP Security Server also serves as an SMTP address translator, that is, it can hide
real user names from the outside world by rewriting the From field, while
maintaining connectivity by restoring the correct addresses in the response.
Resources
Resources can be used in a Rule Base in the same way as a service (see FIGURE 1-16
on page 32). When a connection matches a rule with a Resource, the
VPN-1/FireWall-1 Inspection Module diverts the connection to the appropriate
Security Server. The Security Server can then query a third-party server, such as a
URL filtering server, which performs the required content inspection.
VPN-1/FireWall-1 processes the original connection depending on the reply from the
server and the action in the rule.
FIGURE 1-16URI Resource Rule
Anti-virus Inspection
URL Screening
URL screening provides precise control over Web access, allowing administrators to
control access to undesirable or inappropriate Web pages. VPN-1/FireWall-1 checks
Web connection attempts using third-party URL Filtering Protocol (UFP) servers. The
UFP API is used to integrate UFP servers that maintain lists of URLs and their
categories (for example, alcohol, gambling, etc.). URL databases can be updated to
provide current lists of unacceptable sites.
Java and ActiveX Stripping
UserAuthority
Check Point VPN-1/FireWall-1 brings all enterprise applications into one centrally
managed security framework by leveraging Check Points proven networking,
encryption and authentication technologies. VPN-1/FireWall-1 transparently integrates
best of breed authentication mechanisms into enterprise applications, enabling
intelligent authorization decisions based on a connections security context: user
identity and profile information, encryption and authentication parameters, networking
information and desktop security parameters. VPN-1/FireWall-1 is the security glue
that binds applications to network users, Check Point VPN-1/FireWall-1, and OPSEC
applications to create an enterprise-wide Secure Virtual Network (SVN).
Utilizing multiple VPN/FireWall Modules with state table synchronization has the
additional benefit of providing asymmetric routing support. The synchronization of
state information is necessary when packets that are part of the same session travel via
different routes and pass through different gateways. Without accurate state information
on all communications, a VPN/FireWall Module may not recognize a packet that is
part of an authorized session and will drop or reject that packet.
FloodGate-1
Check Point FloodGate-1 is a policy-based enterprise bandwidth management solution
for VPN, Private WAN, and Internet links. It ensures reliable network performance for
business critical traffic such as VPN, ERP, e-commerce, and telephony by prioritizing
them over discretionary traffic. Bandwidth is precisely controlled based on an intuitive
combination of weighted priorities, guarantees, and limits. With FloodGate-1,
organizations can realize the cost savings of shared links, without sacrificing the
performance for critical traffic. FloodGate-1 integrates with Check Point's network
security solutions.
For information on FloodGate-1, see Check Point FloodGate-1 Guide.
The Logical Server handles the connection attempt using one of the following load
balancing algorithms:
Provider-1
Check Point Provider-1 enables MSPs and large enterprises to centrally create and
manage the network Security Policies of multiple corporate sites, while maintaining
secure isolation between individual customer databases.
For information about Check Point Provider-1, see Check Point Provider-1 Guide.
Reporting Module
The optional SmartView Reporter provides powerful log consolidation and reporting,
and includes approximately 20 pre-defined reports. SmartView Reporterenables users to
create custom reports for security audits, activity trending and accounting. Reports can
be formatted as tables or graphs and can be printed, sent by email, or published to a
Web site.
For information about Check Point SmartView Reporter, see Check Point SmartView
Reporter Guide.
Before Installing
VPN-1/FireWall-1
In This Chapter
Overview page 39
Preparing the VPN-1/FireWall-1 Machine page 39
Installation Overview for a New Installation page 42
Upgrading to a New Version of VPN-1/FireWall-1 page 43
Which Components to Install page 46
Overview
This chapter describes how to prepare your system before you install
VPN-1/FireWall-1.
Note - If you are not installing VPN-1/FireWall-1, then proceed to Chapter 3, Check Point
Software Installation.
39
Preparing the VPN-1/FireWall-1 Machine
Routing
2 Confirm that routing is correctly configured on the gateway, as follows:
a Send an ICMP packet (PING) from a host inside your (trusted) network
through the gateway to your router on the other (untrusted) side.
b TELNET from a host inside your (trusted) network through the gateway to a
host on the Internet, to confirm that you can reach that host.
c TELNET from a host on the Internet to a host inside your (trusted) network.
If any of these tests fail, then find out why and solve the problem before continuing.
IP Forwarding
If IP Forwarding is enabled, the gateway will route packets to other IP addresses.
3 On NT, enable the Enable IP Forwarding option in the Protocols > TCP/IP Protocol
Properties > Routing tab (accessible from the Network applet in the Control Panel).
On Solaris2 and HP-UX, disable IP Forwarding in the kernel.
For more information, see IP Forwarding on page 579 of Check Point SmartCenter
Guide.
When you install VPN-1/FireWall-1 on the Solaris2, HP-UX and Windows NT
platforms, VPN-1/FireWall-1 will control IP Forwarding by default, that is, that IP
Forwarding will be enabled only when VPN-1/FireWall-1 is running. This ensures
that whenever the gateway is forwarding packets, VPN-1/FireWall-1 is protecting the
network.
DNS
4 Confirm that DNS is working properly.
The easiest way to do this is to start a Web browser on a host inside the internal
network and try to view Web pages on some well-known sites. If you cant connect,
solve the problem before continuing.
IP Addresses
5 Make a note of the names and IP addresses of all the gateways interfaces.
You will need this information later when you define your Security Policy. Also, if
you are installing a Single Gateway product, you must know the name of the external
interface (the interface connected to the Internet).
NT Use the ipconfig /all command to display information about all the interfaces.
Solaris Use the ifconfig -a command to display information about all the interfaces.
IBM AIX The ifconfig command is available, but it is best to use smit or smitty instead.
HP-UX The ifconfig command is available, but it is best to use lanscan instead.
6 Confirm that gateways name, as given in the hosts (Unix) and hosts (Windows)
files, corresponds to the IP address of the gateways external interface.
This ensures that when you define the gateway as a network object and click on Get
Address in the Gateway Properties window to retrieve its IP address, the IP Address
field will specify the gateways external interface. If you fail to do so, IKE encryption
(among other features) will not work properly.
Note - If you are installing one of the Single Gateway Products, then the SmartCenter
Server, Master and FireWalled Module must all be on the same machine, but you can still
deploy the SMART Clients on a different machine.
Installation
9 In order to protect the computers on which you are installing VPN-1/FireWall-1
components, isolate them from the network so that they are not accessible from
other computers.
Warning - Do not open your network to the outside world before VPN-1/FireWall-1 has
been installed and is protecting your network.
10 Verify that you have the correct version of the software for your OS and platform
for all the VPN-1/FireWall-1 components.
11 If a number of people will be administering the VPN-1/FireWall-1 system, create
a Unix group before you install VPN-1/FireWall-1. Give the group a descriptive
name, such as fwadmin.
12 If VPN-1/FireWall-1 is running, stop it, including the SMART Clients.
Note - The VPN-1/FireWall-1 NG FP3 Boot Security feature may prevent the machine from
completing the reboot following installation. If that is the case, see the instructions in
the Check Point FireWall Guide.
FWDIR directory
VPN-1/FireWall-1 NG FP3 is installed in its own directory and does not overwrite
previous versions of VPN-1/FireWall-1. After a successful installation, the FWDIR
environment variable is changed to point to the 5.0 directory. If you uninstall NG FP3,
the previous version is restored (that is, FWDIR is set to point to the previous version).
VPN-1/FireWall-1 Database
When you upgrade to a new version of VPN-1/FireWall-1, the installation procedure
carries the following elements to the new version:
VPN-1/FireWall-1 database Properties
Key database Encryption Parameters
Rule Base
VPN-1/FireWall-1 attempts to merge your database with its own new database. For
example, you will have the benefit of services defined in the new version and currently
defined services are merged with the services defined in the new version of
VPN-1/FireWall-1. In the case of a name conflict, the old objects (the ones you
defined) will be kept.
The files containing these elements are not simply copied. The files are converted to
the format of the new version of VPN-1/FireWall-1. This means that you cannot copy
these files from a previous version to the new version.
After Upgrading
After upgrading, VPN-1/FireWall-1 loses its state, so you must start the GUI and install
the Security Policy on all VPN/FireWall Modules, even if there has been no change in
the Security Policy.
1 This Management
Server ...
Management
Server
(BigBen)
GUI
Client
(Tower) Internet
router
Intranet
FireWalled
Gateway
(London)
router
TABLE 2-1 lists the VPN-1/FireWall-1 components that must be installed on each
computer.
TABLE 2-1 Components to Install on Each Computer
In This Chapter
49
Starting the Installation Windows
3 Click:
About Evaluation to display the Evaluation window and proceed to step 4 on
page 52, or
About Purchased Products to display the Purchased Products window and
proceed to step 4 on page 52, or
About the contents of this CD to open a page on the Check Point Support
website, or
Next to display the License Agreement window and proceed to step 5 on page 52
4 Click Next.
6 You must accept all the terms of the license agreement (by clicking Yes) before
continuing.
You can view the text of the license agreement by scrolling through it. If you
choose not to accept all these terms, click on No and the installation procedure will
terminate without installing any Check Point software products.
7 Click Yes.
The following explanations relate to the Upgrade Installed products and install new
products option.
9 Click Next.
10 Select the Check Point products you wish to install. For an explanation of each
product, run the mouse over the checkboxes near each option.
11 Click Next.
2 Click Next.
Note - For a list of the OS versions supported by VPN-1/FireWall-1, see the Release Notes
Note - To move between windows, use the hot keys. The available hot keys appear on the
highlighted last line of each installation window.
7 Press Space to read through the agreement, or Esc to get to the confirmation
message. If you Accept the terms of the License Agreement, choose y.
8 Click N (for next) to proceed to the next window.
The Check Point SVN Foundation is now installed (unless it is already installed).
The Check Point SVN Foundation is used by all Check Point NG FP3 products,
and is required for all Check Point NG products other than SMART Clients.
FIGURE 3-12SVN Foundation Installation (UNIX)
Note -
Select a menu item by typing the relevant number.
In a check box menu item you can select more than one item from the list. To
deselect the item, type the number again.
In a radio box menu item you can select only one item from the list.
10 Select the Check Point components you wish to install by typing their number.
Click N (for next) to start the installation.
The installation procedure invokes the individual installation procedures of the
products you have chosen to install.
For information about installing VPN-1/FireWall-1, see Installing
VPN-1/FireWall-1 (UNIX) on page 66.
For information about installing other Check Point products, see the User
Guides for those products.
Installing and
Configuring
VPN-1/FireWall-1
In This Chapter
61
Installing VPN-1/FireWall-1 (Windows)
Note -
SmartUpdate Server component is automatically installed as part of the
VPN-1/FireWall-1 SmartCenter Server.
SmartUpdate Client is installed together with the other SMART Clients (see Installing
SMART Clients Windows on page 54).
2 After completing the initial choices on the Check Point installation CD, the
Selected Products window (FIGURE 4-2) summarizes the products selected for
installation, including VPN-1/FireWall-1
FIGURE 4-2 Selected Products window.
An Installation Status window shows the progress throughout the installation of all
selected products.
4 The installation program checks whether the Check Point SVN Foundation is
installed. If not, it is now installed.
The Check Point SVN Foundation is used by all Check Point NG FP3 products,
and is required for all Check Point NG FP3 products other than SMART Clients.
The installation of VPN-1/FireWall-1 files now begins.
FIGURE 4-3 Installation Progress message
To decide what product to install on this machine, you may find it useful to refer
to FIGURE 2-1 on page 46.
Choosing Enforcement Module will install a VPN/FireWall Module on this
machine.
7 The Backward Compatibility window (FIGURE 4-6, for SmartCenter Server only)
allows you to maintain backward compatibility with previous versions.
VPN-1/FireWall-1 NG FP3 provides backward with VPN/FireWall Modules of
version 4.1.
If you need to manage version 4.1 VPN/FireWall Modules, choose Install with
backward compatibility.
8 Click Next.In the Choose Destination window you can choose a different directory
from the one suggested in the Destination Folder by clicking Browse.
The installation now proceeds, and various progress messages are displayed.
9 Select the Smart Clients to be installed. You can add or remove Smart clients at a
later time. See Installing SMART Clients Windows on page 54)
10 Click Next. The installation now proceeds, and various progress messages are
displayed.
11 Following the product installations, the configuration of VPN-1/FireWall-1 begins
(see Configuring Check Point Products on page 73). The Check Point
Configuration program (cpconfig) configures VPN-1/FireWall-1 by asking a series
of questions.
12 A Thank You message (FIGURE 4-7) appears when all the installations have
been completed.
FIGURE 4-7 Installation complete window
To decide what product to install on this machine, you may find it useful to refer
to FIGURE 2-1 on page 46.
Choosing Primary Management and Enforcement Module will install both a
SmartCenter Server and a VPN/FireWall Module on this machine.
Note - All the options which include a SmartCenter Server will allow you to manage other
VPN/FireWall Modules from this machine.
Obtaining Licenses
All Check Point products require a license to enable their operation. Licenses are not
required on SMART Clients. Both Permanent and Evaluation licenses can be obtained
from the User Center:
http://www.checkpoint.com/usercenter.
Licenses can be either Central or Local. To work with SmartUpdate central license
management, Central licenses are required. Management of licenses for all installed
products is greatly simplified by using Central Licenses and SmartUpdate. Local licenses
are also supported, and these can be imported into SmartUpdate. For more information
about Central and Local Licenses, see Chapter 2, SmartUpdate in the Check Point
SmartCenter Guide.
Evaluation Licenses
If you have a Certificate Key for your Check Point product, then you can obtain an
evaluation license by following the procedure for obtaining a permanent license.
If you do not have a Certificate Key for your Check Point product, then you can
obtain an evaluation license from your Check Point reseller.
Permanent Licenses
To obtain a permanent license, proceed as follows:
1 Find the Certificate Key on the CD cover of the Check Point CD.
2 Obtain a permanent license that can be used with SmartUpdate:
a Login to the User Center http://www.checkpoint.com/usercenter
b In the My Products tab, select the product(s) to be licensed and click New or
Modify License(s).
c Choose Use Central Licenses scheme or Use Local Licenses, and click Continue
to Confirmation.
Installing Licenses
You must have a license to use Check Point products. If you did not enter your
license(s) during the configuration immediately following installation, use the following
procedures for installing your license(s) now.
Licenses are installed on the SmartCenter Server and on the Modules. For embedded
systems, the license must be installed on the SmartCenter Server.
When you install a permanent license, it is best to delete any expired evaluation
licenses. To remove old licenses use the cpconfig configuration application or use the
cplic del command (see cplic db_rm on page 642 of Check Point SmartCenter Guide),
or use the SmartUpdate GUI (see Deleting a License from the License Repository on
page 114 of the Check Point SmartCenter Guide.)
For information on this command, see cplic put... on page 626 of the Check
Point SmartCenter Guide
To install the license remotely from the SmartCenter Server:
hostname# cplic put <object-name><host expiration-date signature SKU/features
For information on this command, see cplic put <object name> ... on page 633
of the Check Point SmartCenter Guide.
expiration date, signature, and SKU/feature are case insensitive.
The variable information (the license string) represents the alphanumeric code
received from the User Center.
2 When you enter your license, you will get a response similar to the following:
Host Expiration SKU
215.157.142.120 26Mar2002 CPSUITE-EVAL-3DES-v50 CK0123456789ab
License file updated
In this example:
The license expires on March 26, 2001.
3 Confirm that you are using the correct licenses by printing the license. The last part
of the response (the part beginning with CK) is the Certificate Key.
Use the cplic print command for a local License (see cplic print on page 630
of the Check Point SmartCenter Guide), and cplic db_print command for a remote
License (see cplic db_print on page 643 of the Check Point SmartCenter Guide).
If the Primary SmartCenter Server is uninstalled, you will need to uninstall all other
Check Point Products on the computer and reinstall them from scratch.
Licenses page 74
The Trial Period page 76
Administrators page 78
SMART Clients page 84
PKCS#11 Token page 86
Key Hit Session/Random Pool page 87
Certificate Authority page 88
Secure Internal Communication page 89
Fingerprint page 93
High Availability page 94
Interfaces page 95
VPN-1 Accelerator Driver page 95
SNMP Extension (Unix only) page 95
Automatic Start of Check Point Modules (Unix only) page 95
Automatic Start of Check Point Modules (Unix only) page 95
Licenses
Use this option to:
view license details
add required licenses for the host
delete licenses from the host (Windows only). On Unix, to delete or overwrite a
license use the cplic del command (see cplic del on page 820).
You do not need a license to run the SMART Client.
Use the cpconfig Licenses option to manage Local licenses only. Central licenses are
managed via SmartUpdate. For details about the differences between Local and Central
Licenses, and for information about centrally managing licenses on remote hosts, see
Chapter 2 Smart Update on page 67 of the Check Point SmartCenter Guide.
Note - For a DAIP Module, do not use cpconfig to installing a license. A DAIP Modules can
use only a Central license, which must be installed using the cplic put command.
Obtaining Licenses
If you have not yet obtained your license(s), see Obtaining Licenses on page 127 of
the Check Point Getting Started Guide. You can add licenses after completing the other
cpconfig configuration options.
After installing the license, you should import the licenses to the Smart Update License
Repository. On Windows platforms, to import one or more licenses from a license file,
proceed as follows:
1 Click on Fetch from File.
FIGURE 4-15Open License File window
The license(s) that belong to this host are added. After installing the license, you should
import the licenses to the Smart Update License Repository (see Adding a License to
the License Repository on page 114).
On Unix platforms, type the details of the license. The license email received from the
User Center contains the license string and an attached license file. On Windows,
proceed as follows:
1 Click on Add to add a license.
The Add License window is displayed.
FIGURE 4-16Add License window
2 The User Center results page and the license email received from the User Center
contains the license installation instructions. To enter the license data, either:
Copy the license string to the clipboard. Copy the string that starts with cplic
put... and ends with the last SKU/Feature, then click Paste License, or
3 Click Calculate, and make sure the result matches the validation code received from
the User Center.
4 Click OK.
To Delete a License
Administrators
FIGURE 4-17Administrators window
In This Section
To Add an Administrator
You must define at least one administrator, otherwise no one will be able to use the
SmartCenter Server you have just installed.
The administrator password should be at least four characters long, with no spaces.
1 Click Add to specify an administrator. The Add Administrator window is displayed.
FIGURE 4-18Add Administrator window
To Delete an Administrator
Concurrent Sessions
In order to prevent more than one administrator from modifying a Security Policy at
the same time, VPN-1/FireWall-1 implements a locking mechanism.
Any number of administrators can view a Security Policy at the same time, but only
one of them can have write permission at any given moment. Upon opening a Security
Policy, an administrator is granted write permission only if both of the following
conditions are true
The administrator has been assigned Read/Write or User Edit privileges.
No other administrator currently has write permission for the Security Policy at this
time.
For example, suppose Bob and Alice are both administrators. Bob has Read/Write
privileges and Alice has User Edit privileges. Suppose no one has the Security
SmartDashboard open. If Alice opens the Security SmartDashboard, she will be granted
User Edit permission. If Bob opens the same Security Policy before Alice closes it on
her workstation, then Bob will not be granted Read/Write permission. Instead, he will
be asked whether he wishes to quit or to open the Security Policy with Read Only
permission.
During the Read Only session, another administrator with Read/Write privileges can
log in and be granted write permission.
3 Add a rule to the Rule Base specifying Client Authentication or Client Encryption
as the Action, for example, the rule shown below:
TABLE 4-2 Rule Base Example
SMART Clients
FIGURE 4-20SMART Clients window
Specify the SMART Clients, that is, the remote computers from which administrators
will be allowed to connect to the SmartCenter Server.
There is no need to define a SMART clients that is on the same machine as the
SmartCenter Server. If no SMART clients are defined, you will be able to manage the
SmartCenter Server you have just installed only from a SMART clients running on the
same machine.
Enter the SMART clientss name and click on Add to add it to the list of allowed
SMART clients. You can add SMART clients using any of the following formats
IP address (For example 1.2.3.4).
Machine name (For example Alice, or Alice.checkpoint.com).
Any (Any IP without restriction).
The connection between the SMART clients and the SmartCenter Server is enabled in
SmartCenter by checking the Accept VPN-1 & FireWall-1 control connections property in
the FireWall-1 Implied Rules page of the Global Properties window.
If the connection between the SMART clients and the SmartCenter Server passes
through a VPN/FireWall Module, then the Security Policy must be re-installed on the
VPN/FireWall Module so that the newly added SMART clients can connect to the
SmartCenter Server.
To remove a SMART clients from the allowed list, select it and click on Remove.
PKCS#11 Token
FIGURE 4-21PKCS#11 Token window
You are asked to enter random keystrokes. The random data collected in this session is
used in various cryptographic operations.
Enter random characters containing at least six different characters. Do not type the
same character twice in succession, and try to vary the delay between the characters.
Keystrokes that are too fast or too similar to preceding keystrokes are ignored.
Keep typing until you hear a beep and the bar is full.
Certificate Authority
FIGURE 4-23Certificate Authority window
Certificate Authority
This option allows you to create an Internal Certificate Authority (ICA) on
SmartCenter Server, and create a Secure Internal Communication (SIC) certificate for
the SmartCenter Server.
SIC certificates are used to authenticate communication between Check Point
communicating components, or between Check Point communicating components and
OPSEC Applications.
Management FQDN
cpconfig tries to resolve the FQDN (fully qualified domain name) of the SmartCenter
Server and supplies this as a default. If this is not the correct FQDN, change the
contents of the Management FQDN field. This may be useful if there is a problem
resolving the FQDN of the SmartCenter Server.
Specifying the correct FQDN ensures that the Certificate Revocation List (CRL) can
be reliably retrieved by a communicating component, so that it can properly
authenticate a certificate.
A fully qualified domain name consists of a host name and a domain name. For
example, www.checkpoint.com is a fully qualified domain name.
The ICA needs the FQDN in order to insert the CRL Distribution Point correctly in
every certificate it issues. Communicating components retrieve the CRL by reading the
certificate and looking for the CRL Distribution Point. The location of the CRL
distribution point is an HTTP address in the form http://FQDN/<CRL_filename>.
To see the location of the CRL applicable for a certificate, in SmartDashboard, edit the
SmartCenter Server object, and in the VPN page, select the certificate and click Edit >
View. The CRL Distribution Point is one of the fields in the certificate.
The Secure Internal Communication window is used to establish trust between this
machine and the Primary SmartCenter Server. Once trust is established this machine
can communicate with other Check Point communicating components. Trust is
established by creating a certificate on the SmartCenter Server and delivering it to this
machine.
Where this is a machine with a dynamically assigned IP address (DAIP Module), the
SmartCenter Server can push a certificate to the DAIP Module if the current IP address
of the DAIP module is known when initializing SIC (in SmartDashboard, in the
Communications window of the DAIP object).
Note - If the Module has dynamic IP address, see Defining a Module with a Dynamic IP
Address on page 482 of the Check Point SmartCenter Guide.
b In the Check Point Gateway General Properties page fill in the Module name
and IP address.
c Check the appropriate product.
Note - For the next step to work, the SVN Foundation and the VPN-1/FireWall-1 services
must be running on the Module, and there must be IP connectivity from the Management
Server to the Module.
Note the difference between the Trust state and the output of the Test SIC Status
button in the SmartDashboard Communication window of the Module: The Trust state
reflects the situation after Module initialization, that is, when an activation key is
exchanged and certificate is sent to the Module. In contrast, Test SIC Status reflects the
SIC status after the Module has the certificate.
The Trust State as reported in cpconfig in the Secure Internal Communication and in the
SmartDashboard in the Communication window can be in one of three states:
2 For the other half of this procedure, see How to Reset the Trust State of the
Module on page 169.
Fingerprint
FIGURE 4-26Fingerprint window
The Fingerprint window shows the fingerprint of the SmartCenter Server. The
fingerprint is text string derived from the certificate of the SmartCenter Server. It is
used to verify the identity of the SmartCenter Server being accessed via the SMART
clients. You should compare this fingerprint to the fingerprint displayed in SmartCenter
the first time a SMART clients connects to this SmartCenter Server.
Note - In a Management High Availability configuration, you can view and save the
Fingerprint. For the...
primary SmartCenter Server in the Fingerprint window once the ICA Initialization
has succeeded (see FIGURE 21-13).
secondary SmartCenter Server in the Secure Internal Communication tab, if the
Trust Status is Trust Established.
1 In the Fingerprint window, click Export to file and save the file.
2 Take the file over to the SMART clients via some non-network means such as a
diskette, or confirm the fingerprint of the SmartCenter Server by fax or telephone.
3 From a SMART clients, make a first time connection to SmartCenter Server. The
Fingerprint of a SmartCenter Server is displayed (see FIGURE 21-14).
4 Make sure the fingerprint of the SmartCenter Server is identical to the fingerprint
displayed in the SMART clients.
Note - You should not make a first-time connection to a SmartCenter Server from a
SMART clients, unless you have the SmartCenter Server fingerprint to hand, and are able
to confirm it is the same as the fingerprint displayed in the SMART clients.
High Availability
FIGURE 4-28High Availability window
Turn on the State Synchronization and the ClusterXL High Availability and Load
sharing capability.
See Chapter 3, ClusterXL in the Check Point FireWall-1 Guide for information on how
to configure a High Availability environment.
Interfaces
A ROBO Gateway is an object which inherits most of its properties and its policy from
the Profile object to which it is mapped. Each ROBO gateway represents a large
number of gateways, which subsequently inherit the properties stipulated by the Profile
object.
Select the IP addresses that represent the interfaces defined for each object from the
drop down list.
Security Benefits
Securing communication allows you to be absolutely sure that
a SMART Client is connecting to a SmartCenter Server to which it is authorized
to connect,
the Security Policy loaded on a VPN/FireWall Module came from the
SmartCenter Server, rather than a machine pretending to be the SmartCenter
Server.
data privacy and integrity have been maintained
Administrative Benefits
As well as enhancing security, SIC substantially eases the administration of large
installations by reducing the number of configuration actions. It is no longer necessary
to perform fw putkey operations between pairs of communicating components. Instead,
it is simply a matter of performing a simple initialization procedure for each component
from the SmartDashboard.
SIC Certificates
Secure Internal Communication for Check Point SVN components uses:
Certificates for authentication, and
Standards-based SSL for encryption.
SIC Certificates uniquely identify Check Point-enabled machines or OPSEC
applications across the VPN-1/FireWall-1 system. For example, a computer may have
one certificate for Check Point products and a certificate for each OPSEC application.
Certificates are created by the Internal Certificate Authority (ICA) on the SmartCenter
Server for communicating components managed by the SmartCenter Server.
For information about certificates and their benefits, see Certificates on page 23 of
Check Point Virtual Private Networks.
Note - VPN certificates (those used for IKE for example), and SIC certificates are used for
different purposes and are managed differently.
VPN certificates are managed from the VPN page of the VPN-1 installed object (see
Workstation Encryption Properties on page 94 of Check Point Virtual Private
Networks)
SIC certificates are managed from the Communication window on the General page
of any Check Point installed object (see Enabling Communication between Modules on
page 22).
Management
Server
Internet
router
Intranet FireWalled
Gateway
router
The ICA creates a certificate for the SmartCenter Server machine during the
SmartCenter Server installation. The ICA itself is created automatically during the
installation procedure (see Installing VPN-1/FireWall-1 (Windows) on page 115 or
Installing VPN-1/FireWall-1 (UNIX) on page 123 of the Check Point Getting Started
Guide)
Certificates for the VPN/FireWall Modules and any other communicating component
are created via a simple initialization from the SmartDashboard (see Enabling
Communication between Modules on page 22). Upon initialization, the ICA creates,
signs, and delivers a certificate to the communicating component. Every Module can
verify the certificate for authenticity.
The SmartCenter Server and the Modules are identified by their SIC name (also known
as the DN).
Full backward compatibility allows a SmartCenter Server to communicate with a
VPN/FireWall Module of version 4.1 or earlier using the legacy shared secret
(fw putkey) method. The two communicating components use the password to create
a shared key which they exchange and use to set up an encrypted secure link between
them.
3 In SmartDashboard, create an object for the Module, and give it a name and an IP
address.
Note - If the Module has dynamic IP address, see Defining a Module with a Dynamic IP
Address on page 482 of the Check Point SmartCenter Guide.
b In the Check Point Gateway General Properties page fill in the Module name
and IP address.
c Check the appropriate product.
Note - For the next step to work, the SVN Foundation and the VPN-1/FireWall-1 services
must be running on the Module, and there must be IP connectivity from the Management
Server to the Module.
Note the difference between the Trust state and the output of the Test SIC Status
button in the SmartDashboard Communication window of the Module: The Trust state
reflects the situation after Module initialization, that is, when an activation key is
exchanged and certificate is sent to the Module. In contrast, Test SIC Status reflects the
SIC status after the Module has the certificate.
The Trust State as reported in cpconfig in the Secure Internal Communication and in the
SmartDashboard in the Communication window can be in one of three states:
Uninitialized The Module is not initialized and therefore cannot communicate
because it has not received a certificate from the Internal Certificate Authority on
the SmartCenter Server.
Initialized but trust not established
Note the difference between the Trust state and the output of the Test SIC Status
button in the SmartDashboard Communication window of the Module: The Trust state
reflects the situation after Module initialization, that is, when an activation key is
exchanged and certificate is sent to the Module. In contrast, Test SIC Status reflects the
SIC status after the Module has the certificate.
The Trust State as reported in cpconfig in the Secure Internal Communication and in the
SmartDashboard in the Communication window can be in one of three states:
This sends the certificate to the Module, and completes the SIC configuration of
the Module.
4 Reinstall the Security Policy on the Module.
negotiation between any two Modules is CRL checking. If one side of the connecting
parties holds a newer CRL, then the other side replaces its own CRL with the newer
one.
To allow a Module that has been reset to communicate, the Module must be re-
initialized.
You can also Reset a Module by deleting the Module object from the
SmartDashboard. Proceed as follows:
a In the SmartDashboard, choose Network Objects from the Manage menu.
b Select the Module object, and click Remove.
3 Install the Security Policy on all Modules. This also deploys the new CRL to all
Modules.
1 Reset the Module (see How to Reset the Trust State of the Module). If you deleted the
Module object from the SmartDashboard:
At a SMART client, connect to the SmartCenter Server and open
SmartDashboard. (In a Management High Availability configuration, connect to the
Active SmartCenter Server.)
2 Continue from Enabling Communication New Module Registration, step a on
page 23
First of all, you must ensure that you have a valid license for the new machine. Once
the license issue is resolved, the simplest procedure is as follows:
1 Install VPN-1/FireWall-1 on the new machine.
If your SmartCenter Server manages VPN/FireWall Modules on other machines, you
must repeat the fwm putkey procedure for all the machines (see Secure Internal
Communications for Distributed Configurations).
2 Make a copy of the Security Policy files from the old machine.
For information on which files to backup, see How do I back up my Security
Policy? on page 107.
3 Restore the Security Policy backup files (see step 2 above) to the new machine.
4 Start the GUI on the new machine to confirm that the Security Policy was
successfully transferred.
5 If the new machine is the FireWalled gateway, then define the new machine as a
gateway.
In the new machines Workstation Properties window, check the Gateway flag.
6 Delete the old machine from the Network Object Manager.
Alternatively, you can leave the old machine, but uncheck the VPN-1 & FireWall-1
Installed flag in its Workstation Properties window.
Question: What Objects are Carried Over from the Previous Version?
VPN-1/FireWall-1 attempts to merge your database with its own new database. For
example, you will have the benefit of services defined in the new version and you will
retain the services you defined in the previous version. In the case of a name conflict,
the old objects (the ones you defined) will be retained.
Question: What files are modified during re-configuration?
After upgrading, VPN-1/FireWall-1 loses its state, so you must start the GUI and install
the Security Policy.
Question: If I change the IP address of a network object, when does the change take
effect?
You must re-install the Security Policy for the change to take effect.
When you re-install a Security Policy, VPN-1/FireWall-1 internal state tables are
cleared, so there is the possibility that some connections may be lost, as follows:
FTP data connections
If you have an open FTP connection and the Security Policy is re-installed before
the FTP server attempts to open the back connection, then the back connection
will be rejected.
UDP connections
An open encrypted session will be dropped if the newly installed Security Policy
allows the session to be unencrypted.
If you are concerned about losing these connections, then you should take care to re-
install your Security Policy during off-peak hours.
Question: If I have an NG management and a 4.1 or 4.0 Module, how do I re-establish
communication between them?
Version 4.0 and 4.1 VPN/FireWall Modules on hosts and gateways managed by an NG
SmartCenter Server, validate communication between them using an authentication
password that is used to set up a secure link.
For this to work, you must have installed the SmartCenter Server with backward
compatibility.
If you have a NG management and a 4.1 or 4.0 Module, and you need to re-establish
communication between them (e.g after installing a new 4.1 Module or adding a log
server to a Module) you need to use the fwm putkey authentication password (the old
way). This is done using either
the cpconfig configuration utility and SmartDashboard, or
the command line
For the configuration depicted in FIGURE 2-1 on page 46 of the Check Point Getting
Started Guide in which BigBen is an NG SmartCenter Server, and Chelsea London and
Paris are 4.0 or 4.1 hosts, you must provide the authentication passwords for three
control links by performing fwm putkey as follows:
TABLE 4-4 VPN-1/FireWall-1 distributed configuration - fwm putkey
If you do not enter the password in the command line (using the -p <password>
syntax), you will be prompted for the password twice, as follows:
fwm putkey Chelsea London Paris
Enter secret key: <password>
Again secret key: <password>
Only after you have done this will the four machines be able to communicate on the
secure links.
Note - If you specify names (rather than IP addresses), all machines must have the same
name resolution for the other side. In this example, all machines must resolve BigBen in
the same way (to the same interface). You can use the -n parameter for the fwm putkey
command on the SmartCenter Server to ensure this. Alternatively, instead of a machines
name, you can specify its IP address (or a comma-separated list of the IP addresses of its
different interfaces).
Question: Is SIC tolerant of Network Address Translation (NAT)? If there is a NAT device
between the SmartCenter Server and the Module, will communication be
affected?
SIC is completely tolerant of NAT because the SIC protocol is based on certificates and
SIC Names and not on IP addresses. A NAT device between the SmartCenter Server
and the Module will not have any effect on their ability to communicate using SIC.
Question: How do I prevent the fingerprint of a SmartCenter Server appearing the first
time a SMART client connects to it?
1 On the SMART client machine, open the Registry Editor (on Windows machines,
use Regedit).
2 Go to the Registry entry;
HKEY_LOCAL_MACHINE\SOFTWARE\CheckPoint\Connection\5.0\
3 Add a new DWORD Value with Name NewServerOK and the Value 1.
Question: How do I prevent the SMART client recognizing a SmartCenter Server to which
it has already connected?
1 On the SMART client machine, open the Registry Editor (on Windows machines,
use Regedit).
2 Go to the Registry entry;
HKEY_LOCAL_MACHINE\SOFTWARE\CheckPoint\Connection\5.0\Known Servers
This entry contains the Names and fingerprints of SmartCenter Servers that the
SMART client recognizes.
3 Select the Name of the SmartCenter Server that the SMART client should no longer
recognize.
4 Click Delete.
Question:
VPN-1/FireWall-1
Tutorial
In This Chapter
Introduction
This chapter presents a detailed step by step guide to installing VPN-1/FireWall-1 and
building and deploying a Security Policy. The configuration used is depicted in
FIGURE 5-1.
The example configuration is relatively simple though it contains many of the
elements found in complex configurations so if you work through the example, you
will become familiar with many of the issues involved in setting up VPN-1/FireWall-1.
113
Building a Security Policy
DMZ
Queen 192.32.42.32
(GUI Client) External (le1)
199.199.199.204 Services
Network
192.32.42.0
Hatter
(Management Server)
199.199.199.212
Rabbit
(external client)
Mail Server FTP Server HTTP Server 24.24.24.24
192.32.42.102 192.32.42.103 192.32.42.104
Installation
The configuration is shown in FIGURE 5-1 on page 114. Installation instructions are
given in Chapter 4, Installing and Configuring VPN-1/FireWall-1.
Install VPN-1/FireWall-1 in the following sequence:
1 Install the VPN/FireWall Module on FWall.
When you configure FWall immediately after the installation, define Hatter as FWalls
Master.
2 Install the SMART Clients on Queen.
3 Install the SmartCenter Server on Hatter.
When you configure Hatter immediately after the installation, define FWall as Hatters
remote VPN/FireWall Module.
4 On Hatter, define Queen as a SMART Clients.
5 On Hatter, define the administrators who will be allowed to manage the Security
Policy.
Security Policy
The Security Policy for this configuration is as follows:
External users can access only the DMZ network (a network that provides external
services such as Mail, FTP and HTTP).
Internal users can access the entire network, including localnet, DMZ and the
Internet.
Users Bob and Alice can TELNET to the FTP Server on the DMZ for
administrative purposes, no matter from which IP addresses they connect.
Enter your user name, password and the name of the server to which to connect. Then
click OK.
The Check Point SmartDashboard window is opened, showing an empty Security Policy
Rule Base (FIGURE 5-3).
toolbars
SmartMap
Details of the objects
selected in the
Objects Tree...
...are displayed in
the Objects List
The SmartDashboard windows title shows the name of the Policy currently displayed.
Depending on your license (the VPN-1/FireWall-1 features your SmartCenter Server is
licensed to implement), you will see some or all of the following tabs in the
SmartDashboard window.
Security Policy
The Security Policy Rule Base is described in Chapter 8, Security Policy Rule Base
of Check Point SmartCenter Guide.
Address Translation
The VPN Manager tab is described in the book Check Point Virtual Private Networks.
Desktop Security Policy
The SecureClient Policy is described in the book Check Point SecureClient User Guide.
WebAccess
The Web Access tab is described in the book Check Point UserAuthority.
Network Objects
The network objects in the example configuration are listed in TABLE 5-2 on
page 115.
Note - There is no need to define the Primary SmartCenter Server (Hatter in this example) as
an network object in the Check Point database, unless you wish to explicitly refer to it in the
Security Policy.
Usually, there is no need to refer to the SmartCenter Server in the Security Policy. Secure
communication is automatically established between the SmartCenter Server and all the
Check Point Modules (VPN/FireWall Module, FloodGate Module, etc.) defined in its database.
In contrast, you must explicitly define all the Check Point Module machines.
Gateway FWall
Note - See TABLE 5-4 on page 183 of Check Point SmartCenter Guide for an explanation of
the different network object types (including Check Point objects).
The first time you create a gateway, you will be asked whether you want to create
it using the wizard or the classical method.
4 In the first wizard window (FIGURE 5-5) fill in the gateways name and IP address
according to TABLE 5-4.
FIGURE 5-5 FWall first gateway creation wizard window
5 In the next wizard window (FIGURE 5-6), check Edit gateways properties.
FIGURE 5-6 FWall last gateway creation wizard window
6 Click Finish.
The General page of FWalls Gateway Properties window (FIGURE 5-7) is
displayed.
8 Click Communication.
9 In the Communication window, enter the one-time password that will be used to
secure the first communication between the SmartCenter Server (Hatter) and
FWall.
Enter the password twice, in Activation Key and then again in Confirm Activation
Key.
The password must be the same password you entered for FWall when you configured
FWall directly after installing the VPN/FireWall Module on it, in the Secure Internal
Communication tab.
10 Click Initialize.
At this point, the SmartCenter Server issues a certificate for FWall, signs it, and
securely transfers it to FWall. This process is known as establishing a trust
relationship between the SmartCenter Server and the Module.
If Trust State is Trust Established, then the operation was successful and Hatter and
FWall can securely communicate. If Trust State is any other value, then trust was not
successfully established and Hatter and FWall cannot communicate securely.
For more information, including what to do if trust is not successfully established, see
Secure Internal Communications for Distributed Configurations on page 19.
11 Click Close.
Add Interfaces
12 Click Topology (in the tree on the left side of the Gateway Properties window) to
display the Topology page (FIGURE 5-9).
No interfaces are shown, since you have not yet defined any.
13 Click Get Topology.
Authentication Methods
16 Open the Authentication page of the Gateway Properties window (FIGURE 5-12)
by clicking Authentication in the tree in the left pane.
The other network objects you must create are listed in TABLE 5-6.
TABLE 5-6 Other Network Objects
Networks
TABLE 5-7 lists several ways to open the Network Properties window:
TABLE 5-7 Creating a new network
from the ... ... proceed as follows to open the Network Properties
window (FIGURE 5-13)
Manage menu From the Manage menu, choose Network Objects.
In the Network Objects window, click New and choose
Network from the menu.
objects toolbar If the objects toolbar is not visible, choose View > Toolbars
> Objects from the menu.
Select from the toolbar.
In the Network Objects window, click New and choose
Network from the menu.
Network Objects tree Click in the object tree tabs to display the Network
Objects tree.
Right-click Network Objects in the Network Objects
tree and choose New > Network, or
Right-click Networks in the Network Objects tree and
choose New Network
localnet
FIGURE 5-13 shows the Network Properties window after entering the data for
localnet.
FIGURE 5-14 shows the Network Properties window after entering the data for the
External Services Network, DMZ.
Hosts (Servers)
19 To define a host object, click New and choose Check Point > Host from the menu.
The General page of the Gateway Properties window is displayed.
Mail Server
FIGURE 5-15 shows the General page of the Gateway Properties window for the
Mail Server.
FTP Server
FIGURE 5-16 shows the General page of the Gateway Properties window for the
FTP Server.
FIGURE 5-16Host Properties window FTP Server
HTTP Server
FIGURE 5-17 shows the General page of the Gateway Properties window for the
HTTP Server.
Creating Users
21 To create users, display the Users window by choosing Users and Administrators
from the Manage menu.
FIGURE 5-18Users window showing no users defined
There are no users listed in the Users window, because you have not yet defined any.
Only the Standard User user template is listed. Any users you define will be based on
the Standard User user template, unless you define another template and base user
definitions on that template.
23 In the User Properties window (FIGURE 5-20), enter the data for the new user
Bob.
This means that Bob must have an OS account on each machine on which he is
authenticated.
25 Next, define another user, Alice, also based on the Standard User user template.
However, define Alices Authentication Method as VPN-1 & FireWall-1 Password
(FIGURE 5-21). This means that Alice does not need to have an OS account on a
machine on which she is authenticated.
27 In the Change Password window, enter the password twice: once in Password and
a second time in Confirm Password.
FIGURE 5-22Change Password window
Note - OS Password and VPN-1 & FireWall-1 Password are the Authentication
Methods defined in the Authentication page of the Gateway Properties window for
FWall (FIGURE 5-12 on page 128).
30 Next, select Alice and Bob and click Add to add them to the Managers group.
An Alternative Way
32 Add the rules, one after the other, until your Security Policy Rule Base looks like
this:
FIGURE 5-25Complete Rule Base
Tip - When selecting an object from the long list in the Add Object window (FIGURE 5-
26), you can speed up the selection by typing the first few letters of the objects name to
position the list near the object.
localnet
199.199.199.0
Knight
(internal client)
199.199.199.200
Queen FireWalled
(GUI Client) Gateway
199.199.199.204
(FWall)
Hatter 192.32.32.32 router
(le0)
(Management Server)
199.199.199.212 Internet
192.32.32.33
DMZ
External
Services
12.133.144.200 Network
192.32.42.0
12.133.144.204
Rabbit
(external client)
12.133.144.212 24.24.24.24
Mail Server FTP Server HTTP Server
192.32.42.102 192.32.42.103 192.32.42.104
HRnet
12.133.144.0
Suppose that HRnets IP addresses are invalid. To enable the hosts in HRnet to
communicate over the Internet, their addresses must be translated to valid addresses
using VPN-1/FireWall-1s Network Address Translation feature.
There are two methods of translating IP addresses. One method (hiding) is to hide all
the invalid addresses behind the gateways valid address. This method has the advantage
that it works with the valid address you already have, but its disadvantage is that it is
impossible to initiate connections to the hosts in HRnet from the outside world.
The second method (static translation) is to acquire valid addresses and translate the
invalid addresses to valid addresses on a one-to-one basis. This method enables outside
hosts to initiate connections to the hosts in HRnet, but its disadvantage is that you will
have to acquire valid addresses.
Hide NAT
To hide HRnets invalid addresses behind the gateways valid address (that of its
external interface), select Hide from the Translation Method drop down list and enter
the valid IP address of FWalls external interface (192.32.32.32) in Hiding IP Address.
Static NAT
To statically translate HRnets invalid addresses, select Static from the Translation
Method drop down list and enter (in First Valid IP Address) the first IP address of the
valid network addresses you have acquired.
The format of a log entries is determined by the log type specified in the rules Track
field.
Introduction to Virtual
Private Networks
In This Chapter
Overview
The Problem
When Bob sends Alice a message over a public network such as the Internet, the
message passes through many computers, routers, switches and similar equipment before
it arrives at Alices computer. Charlie has many opportunities to intercept and read the
message along the way and even to alter it, so that the message that Alice receives may
be quite different from the one that Bob sent. In fact, Charlie might even send Alice a
false message, disguised to appear as though it was sent by Bob.
Alice and Bob want to ensure:
Privacy that no one can listen to their communication.
Bob wants to be sure that only Alice can read the message he sends her. Privacy can
be achieved by using encryption.
Integrity that no one is tampering with their communication.
147
Overview
Bob wants to be sure that the message that Alice will receive is exactly the same
message that he sent, that is, that the message was not tampered with in transit.
Integrity can be achieved through the use of hashing.
Authenticity that no one is sending false messages.
Alice wants to be sure that the message she received from Bob really did come from
Bob, and not from someone else. Authenticity can be achieved through the use of
digital signatures.
Secrecy
founded on w!&84$&
this continent a h*+d(#d
nation conceived 39UBd9@3
in liberty ... *&#sHhj ...
Secret key encryption is simple and fast, but it has two disadvantages:
A secure channel is required by which the correspondents can agree on a key before
their first encrypted communication.
This is a serious drawback, because if such a channel existed, there might be no need
for encryption. Agreeing on a secret key by direct face-to-face negotiation may be
impractical or unfeasible, and the correspondents may have to agree on a key by mail
or telephone or some other relatively insecure means.
The number of keys required can quickly become unmanageable, since there must
be a different key for each pair of possible correspondents.
For example, the number of keys that must be managed for 10,000 entities (people or
computing devices) is about 50 million!
If Alice wants to send Bob a message, she encrypts the message with Bobs public key
before sending it to her. Because the message was encrypted with Bobs public key, it
can only be decrypted with Bobs private key. The only person who knows Bobs
private key is Bob himself, so only Bob can read the message. If Charlie were to
somehow intercept the message, he would be unable to read it because he doesnt know
Bobs private key.
FIGURE 6-2 Encrypting and then decrypting with a private-public key pair
Everyone knows
Bobs public key, so
anyone can encrypt
a message ... and send
it to Bob.
ENCRYPTION
founded on w!&84$&
this continent a h*+d(#d
nation conceived 39UBd9@3
in liberty ... *&#sHhj ...
private
Integrity
Alice wants to be sure that the message that Bob receives is the same message that she
sent, in other words, that no one tampers with the message while it is in transit on the
network. To ensure the messages integrity, Alice computes a hash of the message.
A hash is a mathematical computation (hash function) performed on the text of the
message. The hash function is designed so that changing even one bit in the message
results in a completely different hash result, and there is no practical way to reverse the
computation, that is, to compute a message from a given hash result. So the hash result
uniquely identifies the message.
When Bob receives the message, he decrypts it, applies the same hash function and
compares his hash result to Alices hash result.
If they are the same, then Bob can be sure that the message was not tampered with,
because the hash he calculated is the same one that Alice calculated.
Authenticity
If Bob sends Alice a message, he wants Alice to be able to verify that the message
actually came from him and not from an impostor, so Bob attaches his digital signature
to the message. A digital signature acts as proof of the senders identity and the
messages integrity.
cleartext encrypted
signature signature
DECRYPTION
public
One widely-used technique for creating digital signatures is for Bob to encrypt a
pre-agreed text (for example, the hash result) with his private key (which only he
knows). Alice can then decrypt the digital signature with Bobs public key and compare
it to the hash result she calculated. If they are the same, she knows that the message can
only have come from Bob.
Summary
To summarize, here is a step-by-step description of one way that Bob can send Alice a
message so that they can both be sure that only Alice can read the message, and Alice
can be sure that the message she receives was sent by Bob and was not tampered with:
1 First, Bob computes a hash of the message.
2 Bob encrypts the hash with his own private key this is the digital signature.
Only Bob can do this, because only he knows his private key.
3 Bob encrypts the message with Alices public key.
4 He then sends Alice both the encrypted hash and the encrypted message.
When she receives the message, Alice can confirm that it was sent by Bob and also that
it was not tampered with, as follows:
5 First, she decrypts the message using her private key.
Only Alice can do this, because only she knows her private key.
6 Next, she decrypts the digital signature using Bobs public key.
7 Alice calculates the hash value of the unencrypted message (this is the same
calculation that Bob performed) and compares it to the hash value received from
Bob.
If they are the same, then Alice can be sure that:
The message was sent by Bob, because Bob is the only person who knows Bobs
private key and thus the only person who could have encrypted the hash value.
The message was not tampered with, because the hash value Alice calculated is
the same one that Bob calculated.
Note - In this scenario, the hash value serves two purposes: it confirms the messages
integrity and is also the pre-agreed text of the digital signature. It is possible to use some
other pre-agreed text, but the hash value is convenient because it is different for each
message and doesnt actually have to be agreed on in advance.
Certificates
Verifying Public Keys
Charlie might intercept Alices request and send Alice his own key instead. Charlie
would then be able to read all of Alices encrypted messages to Bob (and Bob would
not be able to read them).
What is a Certificate?
A certificate is issued by a trusted Certificate Authority and identifies the bearer (which
may be a person or computer) and contains some information about the bearer. For
example, a CA might send Bobs certificate to Alice. If Alice trusts the CA, then she by
implication trusts the information in the certificate. This information might be:
Bobs unique identifier (for example, his LDAP Distinguished Name)
Bobs public key
the CAs unique identifier, so that anyone examining a certificate can know who
issued it
a digital signature, signed with the CAs private key
Alternatively, Bob can send Alice his certificate directly. In either case, Alice can verify
the certificate (this is equivalent to verifying Bobs public key) by the procedure
described earlier. To do this, she needs the CAs public key, which must be reliably
available from an out-of-band source, such as a printed directory.
To prove his identity to Alice, Bob sends her a message consisting of:
a digital signature, encrypted with his private key
his certificate (if Alice doesnt already have it) which includes his unique identifier
(for example, his LDAP Distinguished Name and IP address)
Alice verifies the digital signature using Bobs public key (from the certificate), proving
that the message could only have been encrypted by Bob and that the information it
contains (specifically, Bobs unique identifier, which is in both the certificate and the
message) is genuine. In this way, Bob can prove who he is and what his IP address is,
and Alice can be confident that she is communicating with Bob and not with someone
else who is pretending to be Bob.
After Alice and Bob prove their identities in this way, they can use each others public
keys with confidence, because they are certified by certificates from a trusted CA.
Usually, the public keys are used to negotiate a secret key for encrypting the actual
message.
Note - In a Virtual Private Network, certificates are also used by encrypting entities (for
example, gateways) to identify themselves and supply their public keys to their peers.
To summarize, a certificate is like a passport. It identifies the bearer and contains some
important information about him or her.
Passports
A passport is issued by a government, and presented by the bearer to anyone who needs
to verify the bearers identity.
A passport consists of the following elements:
1) Proof that the passport belongs to the bearer: the bearers photograph.
2) Some important information about the bearer: for example, the bearers name.
3) An expiration date.
4) Proof that the passport is genuine and that it has not been tampered with: the
issuers seal and the special paper on which the passport is printed are intact.
For example, Alice Smith might present her US passport to Donna, an airport
immigration official, to prove her identity. Donna believes that Alice is who she claims
to be (that is, that she is a US citizen named Alice Smith) because:
1) The passport belongs to Alice and not to someone else (the picture is Alices
picture).
2) Donna can see that Alices passport has not been tampered with.
3) Donna trusts the issuer (that is, she trusts the US State Department to issue
passports in a reliable way).
4) Alices passport has not yet expired (the expiration date printed in the passport has
not passed)
If Bob tries to use Alices passport, he will be found out because Alices photograph
doesnt match his face. If Bob tries to replace Alices photograph with his own, the
tampering will be immediately noticeable.
Certificates
A certificate is issued by a trusted Certificate Authority and identifies the bearer (which
may be a person or computer). A certificate is often embedded in a token, which is
either an encrypted disk file or a hardware device, such as a smart card. The token has
a password, or PIN. Only someone who physically has the token (the file or device) in
his or her possession and knows its PIN can use the token.
Both the passport
and certificate are
PASSPORT owned by the bearer. CERTIFICATE
proof of
PUBLIC KEY:
ownership ... 0x18070...
can be trusted
issued by trusted authority signed by the
and has not been tampered with because it Certificate Authority
was ...
FIGURE 6-4 Passports and Certificates
Note - In one popular model, the information in the token is called a profile. In addition
to the certificate, the profile includes the Certificate Authoritys public and private keys
(used for validating information signed by the Certificate Authority, such as a CRL). The
profile is kept either on a hardware device or is saved as a file on a diskette, limiting
physical access and minimizing the possibilities of misuse.
Creating Certificates
A users certificate is created by a Certificate Authority. There are several different ways
in which the user acquires the certificate, depending on the Public Key Infrastructure
(PKI) vendor:
1) A file (sometimes called a profile) is created, either by the user or by the
Certificate Authority.
One method is for the user to create the profile on his or her own computer,
using special client software (for example, the Check Point SecuRemote Client).
The user can then store the profile file on a diskette or on a hardware token,
minimizing the possibility of its unauthorized copying and misuse. Some
hardware tokens can generate the key pairs on the device, providing enhanced
security for the users private key. The profile file is further protected by the
access password, known only to the user.
A second method is for the Certificate Authority to create the profile file
(preferably on a hardware token) and then give it to the user. This method
centralizes the creation of profile files, but may be impractical in a geographically
dispersed organization.
2) The user registers to the Certificate Authority using a Web browser, and can then
export the certificate and private key for the use of other applications.
3) The user creates a certificate registration request in a file, and transfers the file (via
mail, ftp, etc.) to the Certificate Authority. The Certificate Authority approves the
request and generates the certificate on a file, which is transferred back to the user
(again using mail, ftp, etc).
Certificate Authorities
An encrypting gateways CA is specified in the Certificates tab of the Workstation
Properties window. The CA itself is defined in the CA Properties window. See also
Chapter 3, Certificate Authorities for more information.
10 When prompted for the .sys file, browse for the cryptonet.sys file in the
%root/system32/drivers directory.
11 Reboot.
VPN-1 SecuRemote
Overview
Check Point VPN-1 SecuRemote enables PC users to securely communicate sensitive
and private information to networks and individual servers. Check Point VPN-1
SecuRemote extends the VPN to Windows 9x, Windows NT and Windows 2000
workstations and desktops, using both dial-up and LAN connections.
Typical uses for SecuRemote are:
Specific employees can be granted encrypted access to sensitive corporate data.
A server can be set up to provide encrypted information to paying customers only.
Because the communication is encrypted, eavesdropping is impossible.
Users at a remote office can conduct encrypted communications with the
FireWalled enterprise network without installing VPN-1/FireWall-1 at the remote
office.
General network access (email, intranet Web, etc.) can be provided for remote
employees such as telecommuters and business travelers.
A group of workers dealing with sensitive information can create private
workgroups over internal, shared-access networks such as Ethernets by using
VPN-1 SecuRemote and encryption-enabled application servers.
VPN-1 SecuRemote is based on a technology called Client Encryption. Because
SecuRemote encrypts data before it leaves the laptop, it offers a completely secure
solution for remote connections.
HP
SecuRemote
Server Sun
IBM
AIX
SecuRemote SecuRemote
Server Server
South
American Asian
Office Internet Office
SecuRemote NT
Client
SecuRemote
Server
European Office
SecuRemote includes support for dynamic IP addressing, which is necessary for dial-up
communication. SecuRemote can also be used from stationary PCs with fixed IP
addresses.
Additional Information
VPN-1 SecureClient
Overview
Check Point VPN-1 SecureClient extends security to the desktop by enabling
administrators to enforce a Security Policy on desktops both inside and outside the
LAN and prevent unauthorized users from taking control of SecureClient or
SecuRemote machine and penetrating the enterprise network via SecuRemote
encrypted connections. In addition, the configuration of SecureClient machines can be
verified and access denied to misconfigured SecureClient machines.
User-granular policies allow the administrator to exercise full access control over a
desktop by creating a rule base and enforcing it on the client machine.
Check Point VPN-1 SecureClient consists of:
VPN-1 SecureClient software with the Desktop Security feature installed
a Policy Server from which the VPN-1 SecureClient obtains its Desktop Policies
FIGURE 6-6 shows how an intruder can take advantage of a SecuRemote machine to
penetrate the internal enterprise network using a SecuRemote encrypted connection.
This kind of attack can be prevented by enforcing Desktop Policies on the SecureClient
and by performing Secure Configuration Verification (SCV) on the FireWalled gateway.
Internet Internet
unprotected FireWalled
Attacker SecuRemote Gateway
machine
BigBen
London
FinanceNet
SecureClient
Tower FireWalled
Gateway
Bridge
Internet
internal
FireWall
Tate Policy
Server
SecuRemote
but Tate is
not authorized.
internal network
By installing SecureClient on BigBen, this high degree of security can be enhanced to:
Prevent Tate (and anyone else) from taking control of the connection between
BigBen and FinanceNet.
This is configured by:
installing a Desktop Policy on BigBen in the Desktop Security page of the Global
Properties window (FIGURE 1-1 on page 32 of Check Point Desktop Security
Guide) (for SecureClients Version 4.1), or
installing a Desktop Security Policy on Bridge.
Network Configuration
FIGURE 6-8 depicts a configuration in which SecureClient provides security both
inside and outside the LAN.
Metro Management
FinanceNet Module
Paris
internal
FireWall
Internet
FireWalled
Gateway
Eiffel Opera
SecureClient
SecureClient Policy Server remote user
desktops
Licensing
SecureClient needs two separate licenses:
User license general user license, installed on VPN-1/FireWall-1 Management
Servers.
The user license contains a maximum user count.
Policy Server license, installed on each Policy Server's VPN/FireWall Module.
For more licensing information, please contact the User Center at:
http://www.checkpoint.com/usercenter
In This Chapter
Overview
VPN configuration is considered to be a complicated task facing a system administrator
while setting up a security system. Check Point VPN-1/FireWall-1s powerful,
innovative and user-friendly management tools provide a simplified VPN setup mode
that reduces the VPN configuration process to essentials, making it straightforward and
simple.
The new approach involves understanding of a few basic terms (namely, VPN site and
VPN community) which are discussed in detail below.
167
VPN Site and VPN Community
not meshed center: no VPN connection is enabled among the central gateways
in the Community.
The following principles are applied to VPN Communities:
Setting up Communities
Setting up a Mesh-Configured VPN Community
To create a mesh-configured VPN Community, proceed as follows on the SmartCenter
Server:
1 Make sure that NG Feature Pack 2 is installed on every gateway you wish to add to
the Community.
2 Make sure that the gateways VPN Domains are properly defined on the Topology
page of the Workstation Properties window.
3 Select from the toolbar. Alternatively, you can display the VPN Communities
window by selecting VPN Communities from the Manage menu.
4 Right-click Intranet and select New>Meshed from the menu.
The Meshed Community Properties window is displayed.
5 On the General page of the Meshed Community Properties window, enter Name and
optionally Comment.
6 Click Participant Gateways.
The Participant Gateways window is displayed.
7 Click Add to display the Participant Gateways window (FIGURE 7-3). The
window contains the list of all the available NG FP 2 VPN-1 modules/sites.
Chapter 7 169
Setting up Communities
Note - The IKE/IPSec default properties defined per community will apply to all the
community members. These properties can be modified, if necessary. For more information,
see IKE/IPSec Properties on page 175.
5 On the General page of the VPN Community Properties window, enter Name and
optionally Comment.
6 Define the Community traffic Security Policy by enabling or disabling Accept all
encrypted traffic. The informative field below displays the tracking option for the
encrypted traffic selected under Community Default Rule in the Log and Alert page
of the Global Properties window (Figure 6-2 on page 92).
7 Click Central Gateways.
The Central Gateways window is displayed.
Chapter 7 171
Setting up Communities
8 Click Add to display the Add Central Gateways window (FIGURE 7-3). The
window contains the list of all the gateways that can be added to the center of a
star-configured Community, namely:
all VPN-1 FP2 internal (internally managed) gateways (clusters, gateways with
dynamic IP address)
all external (externally managed) VPN gateways
interoperable devices
Note - When defining a SecuRemote Community, only internal gateways appear in the Add
Central Gateways window.
The services passing in clear will not constitute part of the encryption domain. If a
domain is selected in the IF VIA column of a rule, there will be no match by the
unencrypted services.
Chapter 7 173
Setting up Communities
Note - The IKE/IPSec default properties defined per community will apply to all the
community members. These properties can be modified, if necessary. For more information,
see IKE/IPSec Properties on page 175.
2 Edit the list of gateways on the Participant Gateways page. External gateways or
interoperable devices cannot participate in the Remote Access Community.
3 Edit the list of user groups on the Participant Users Group page.
IKE/IPSec Properties
Some Community-wide encryption properties (that apply to all VPN-1 modules/sites
participating in this Community) are defined in the VPN Properties, Advanced
Properties and Shared Secret pages of the Community Properties window.
VPN Properties
This page defines Community-wide IKE and IPSec properties.
FIGURE 7-5 VPN Properties page
Chapter 7 175
IKE/IPSec Properties
Advanced Properties
This page defines advanced Community-wide VPN properties.
FIGURE 7-6 Advanced Properties page
IKE (Phase 1)
Use Diffie-Hellman group This feature allows you to enhance security by selecting a
longer Diffie-Hellman group.
Renegotiate IKE security associations every... minutes The number of minutes after
which IKE Security Associations expire.
For more information about IKE Properties, see Chapter 6, VPN Properties.
Perform key exchange encryption with Specifies the encryption algorithm.
Perform data integrity with Specifies the cryptographic checksum method to be
used for ensuring data integrity.
IPSec (Phase 2)
Use Perfect Forward Secrecy This feature ensures that an eavesdropper who
uncovers a long-term encryption key will be unable to use it to decrypt traffic sent in
the past.
Use Diffie-Hellman group Select one of the groups. For more information, see
Diffie-Hellman Parameters Flexibility on page 37.
Renegotiate IPSec security associations every... minutes The number of minutes
after which IPSec Security Associations expire.
Support Site to Site IP Compression Enables stateless and reversible compression of
IP packets.
Reset all VPN properties Pressing this button will restore the default VPN
properties, including those which do not appear in the Policy Editor.
NAT
Disable NAT inside the VPN community Enable this property to cancel the Network
Address Translation (NAT) among the VPN Community participants.
Shared Secret
This page allows defining the IKE pre-shared secret for the external VPN modules. The
internal VPN modules will continue using Internal CA certificates to negotiate VPN
tunnels.
FIGURE 7-7 Shared Secret page
Chapter 7 177
Security Policy Conversion
Select Use only shared secret for all external members and use the Edit button to define
a shared secret for each external VPN module participating in the community.
Such a rule means that only encrypted traffic which passed via one of the VPN
connections enabled by the defined community will be accepted. Traffic that
matches the Source, Destination and Service of this rule, but not IF VIA will not
match this rule rather than be dropped by this rule.
If *Any is selected in the IF VIA column (no Community is defined), the
matching for this rule will rely only on the Source, Destination and Service, like
in Traditional mode.
The IF VIA column allows multiple choice as well. When a log is required for a
rule that includes a community in the IF VIA column, the log for matching traffic
will state Encrypted.
Configuration
The following VPN configuration modes are available on the VPN-Pro page of the
Global Properties window (FIGURE 7-9):
FIGURE 7-9 Global Properties window VPN-1 page
Chapter 7 179
Configuration
Simplified mode to all new Security Policies separates the VPN policy from
the FireWall policies, as described in this chapter.
Traditional Mode to all new Security Policies disables VPN Communities and
allows to use Regular mode only.
Traditional or Simplified mode per new Security Policy allows creating a
regular Rule Base in addition to the Simplified VPN Rule Base.
If you selected Simplified mode to all new Security Policies or Traditional or Simplified
mode per new Security Policy mode, you can check Use VPN communities as a matching
factor.... If this option is enabled, the If Via column will be added to each newly created
Rule Base. This column introduces an additional matching parameter by allowing you
to define not only the source and destination of a connection, but also the VPN
Community it passes through.
E H
C embedded systems hardware acceleration 158
where to install license 71 hash, of message 151, 152
CA hosts file 41
encryption HP-UX
181
disabling IP Forwarding 40
M S
Management Station secret key
I protecting 83
masters file
sharing 149
Secure Virtual Network 13
ICA 97 modified during VPN-1/ SecureClient
IKE FireWall-1 licensing 165
specifying the encrypting reconfiguration 108 Security Policy
gateways IP address 41 mesh topology 168 backing up 107
supported by SecuRemote 161 mesh-configured VPN community SIC
setup 169 administrative benefits 96
supported by VPN-1
message hash 151, 152 certificates 96
Accelerator Card 158
monitoring system status 144 configuring for a new
Inspection Module moving VPN-1/FireWall-1 to
defined 31 Module 99
another machine 106 configuring for upgraded
installation
overview 42 Modules 102
preparing the machine 39 ICA 97
installing
what to do before 39
N overview 95
security benefits 96
installing a VPN-1/FireWall-1 simplified VPN configuration 167
network object smart card
license 71 creating 136, 138
Internal Certificate Authority, see certificate stored on 156
ICA none of the above rule 141 SmartDefense 13
IP addresses Nortel Networks 35 SmartUpdate
when does changing take adding an administrator 80
effect 108 Administrator permissions 80
IP Forwarding
disabling in the Solaris2 and
O SmartView Status window 144
SmartView Tracker 145
HP-UX kernels 40 Solaris2
ISAKMP/OAKLEY 153 objects_5_0.C file 107 disabling IP Forwarding 40
star topology 168
star-configured VPN community
setup 170
L P state tables
cleared when Security Policy re-
license passport installed 108
confirming that you are using comparison of certificate to 155 static NAT 29
correct licenses 73 password stealth rule 141
limitation on length in SVN 13
installing 71, 72 SVN Foundation 45
Windows 80
obtaining 70 symmetric key 149
PKI 31
obtaining an evaluation Provider-1 37 system status
license 71 public key 150 monitoring 144
removing old licenses 71 trusting 153
where to install 71
where to install for embedded
systems 71 T
lmhosts file 41 R
logging topology 125
Access Control 78 re-configuration topology of VPN Communities
files modified during 108 types 168
RSA 150
V
VPN Community
IKE/IPSEC properties 175
setup 168
VPN community 168
IKE/IPSEC properties 179
VPN configuration modes 179
VPN-1 Accelerator card
IKE 158
installing on Windows
2000 158
VPN-1 SecureServer 164
VPN-1/FireWall-1
uninstalling 73
VPN-1/FireWall-1
moving to another
machine 106
uninstalling (NT) 73
uninstalling (Unix) 73
183