CheckPoint R61 SmartCenter UserGuide
CheckPoint R61 SmartCenter UserGuide
Contents
Preface
Who Should Use This Guide.............................................................................. 14 Summary of Contents ....................................................................................... 15 Appendices ................................................................................................ 17 Related Documentation .................................................................................... 18 More Information ............................................................................................. 21
Chapter 1
SmartCenter Overview
Introduction .................................................................................................... 24 VPN-1 Pro.................................................................................................. 24 Check Point Express.................................................................................... 24 Some Basic Concepts and Terminology ......................................................... 24 Possible Deployment ................................................................................... 26 Login Process .................................................................................................. 28 Overview .................................................................................................... 28 Authenticating the Administrator .................................................................. 28 Authenticating the SmartCenter Server Using its Fingerprint ........................... 29 Managing Objects in SmartDashboard................................................................ 30 SmartDashboard and Objects ....................................................................... 31 Managing Objects ....................................................................................... 33 Configuring Objects..................................................................................... 34 Changing the View in the Objects Tree .......................................................... 35 Groups in the Network Objects Tree.............................................................. 38 Securing Channels of Communication Between Internal Components (SIC)............ 43 The SIC Solution ........................................................................................ 44 The Internal Certificate Authority (ICA) ......................................................... 44 Initializing the Trust Establishment Process .................................................. 44 Understanding SIC Trust States ................................................................... 45 Testing the SIC Status................................................................................. 45 Resetting the Trust State ............................................................................. 46 Troubleshooting: If SIC fails to Initialize........................................................ 46 Network Topology ............................................................................................ 47 Managing Users in SmartDashboard .................................................................. 49 User Management Requirements .................................................................. 49 The Check Point User Management Solution ................................................. 49 Users Database........................................................................................... 50 User and Administrator Types ...................................................................... 51 Configuring User Objects ............................................................................. 52 Working with Policies ....................................................................................... 56 Overview .................................................................................................... 56 To Install a Policy Package .......................................................................... 57 To Uninstall a Policy Package ...................................................................... 58 Install User Database .................................................................................. 59
Table of Contents
Chapter 2
Policy Management
The Need for an Effective Policy Management Tool ............................................. 62 The Check Point Solution for Managing Policies ................................................. 63 Policy Management Overview ....................................................................... 63 Policy Packages.......................................................................................... 64 Dividing the Rule Base into Sections using Section Titles ............................... 67 Querying and Sorting Rules and Objects........................................................ 67 Policy Management Considerations.................................................................... 70 Conventions ............................................................................................... 70 Policy Management Configuration...................................................................... 71 Policy Package ........................................................................................... 71 Rule Sections ............................................................................................. 73 Querying the Rule Base ............................................................................... 74 Querying and Sorting Objects ....................................................................... 76
Chapter 3
SmartMap
Overview of SmartMap...................................................................................... 78 The SmartMap Solution............................................................................... 78 Working with SmartMap ................................................................................... 79 Enabling and Viewing SmartMap .................................................................. 79 Adjusting and Customizing SmartMap........................................................... 80 Working with Network Objects and Groups in SmartMap ................................. 82 Working with SmartMap Objects................................................................... 85 Working with Folders in SmartMap ............................................................... 88 Integrating SmartMap and the Rule Base ...................................................... 90 Troubleshooting SmartMap .......................................................................... 92 Working with SmartMap Output.................................................................... 94
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool
The Need for the ICA ....................................................................................... 98 The ICA Solution ............................................................................................. 99 Introduction to the ICA................................................................................ 99 ICA Clients............................................................................................... 100 Certificate Longevity and Statuses .............................................................. 101 SIC Certificate Management ...................................................................... 102 Gateway VPN Certificate Management ........................................................ 103 User Certificate Management ..................................................................... 104 CRL Management ..................................................................................... 105 ICA Advanced Options............................................................................... 106 The ICA Management Tool ......................................................................... 107 ICA Configuration .......................................................................................... 110 Retrieving the ICA Certificate ..................................................................... 110 Management of SIC Certificates ................................................................. 111 Management of Gateway VPN Certificates ................................................... 111 Management of User Certificates via SmartDashboard .................................. 113 Invoking the ICA Management Tool............................................................. 113 Search for a Certificate.............................................................................. 114
Certificate Operations Using the ICA Management Tool ................................ Initializing Multiple Certificates Simultaneously........................................... CRL Operations ........................................................................................ CA Cleanup .............................................................................................. Configuring the CA....................................................................................
Chapter 5
SmartView Tracker
The Need for Tracking .................................................................................... 128 The Check Point Solution for Tracking ............................................................. 129 Tracking Overview ..................................................................................... 129 SmartView Tracker .................................................................................... 131 Filtering ................................................................................................... 134 Queries .................................................................................................... 134 Matching Rule .......................................................................................... 135 Log File Maintenance via Log Switch .......................................................... 138 Disk Space Management via Cyclic Logging................................................. 138 Log Export Capabilities.............................................................................. 138 Local Logging ........................................................................................... 139 Logging Using Log Servers ......................................................................... 139 Advanced Tracking Operations ................................................................... 140 Tracking Considerations ................................................................................. 141 Choosing which Rules to Track................................................................... 141 Choosing the Appropriate Tracking Option ................................................... 141 Forwarding Log Records Online vs. Forwarding Log Files on Schedule ............ 142 Tracking Configuration ................................................................................... 143 Basic Tracking Configuration...................................................................... 143 SmartView Tracker View Options................................................................. 144 Configuring a Filter ................................................................................... 146 Configuring the Current Rule Number Filter................................................. 146 Follow Source, Destination and User Data ................................................... 147 Add Source .............................................................................................. 147 Viewing the Logs of a Rule from the Rule Base ............................................ 148 Configuring Queries................................................................................... 149 Hiding and Showing the Query Tree Pane .................................................... 151 Working with the Query Properties Pane ...................................................... 151 Modifying a Columns Properties ................................................................. 152 Copying Log Record Data........................................................................... 153 Viewing a Records Details ......................................................................... 153 Viewing a Rule.......................................................................................... 154 Find by Interface ...................................................................................... 154 Maintenance ............................................................................................ 155 Local Logging ........................................................................................... 156 Working with Log Servers........................................................................... 157 Custom Commands ................................................................................... 159 Block Intruder .......................................................................................... 160 Configuring Alert Commands...................................................................... 161
Chapter 6
SmartCenter Management
Table of Contents 7
The Need for SmartCenter Management........................................................... 164 The SmartCenter Management Solution ........................................................... 165 General.................................................................................................... 165 Managing Policy Versions .......................................................................... 165 Version Operations .................................................................................... 166 Version Upgrade ....................................................................................... 167 Version Diagnostics ................................................................................... 167 Backup and Restore the SmartCenter Server................................................ 168 SmartCenter Management Configuration .......................................................... 169 Manual versus Automatic Version Creation .................................................. 169
Chapter 7
Chapter 8
SmartPortal
Overview ....................................................................................................... 196 Deploying SmartPortal on a Dedicated Server ................................................... 197 Deploying SmartPortal on the SmartCenter Server ............................................. 198 SmartPortal Configuration and Commands ....................................................... 199 SmartPortal Commands ............................................................................. 199 Limiting Access to Specific IP Addresses .................................................... 199 SmartPortal Configuration.......................................................................... 200 Client Side Requirements ............................................................................... 201 Troubleshooting ............................................................................................. 202
Chapter 9
8
SmartUpdate
The Need for Software Upgrade and License Management ................................. 204 The SmartUpdate Solution.............................................................................. 205 Introducing SmartUpdate .......................................................................... 205 Understanding SmartUpdate...................................................................... 206 SmartUpdate - Seeing it for the First Time .................................................. 207 Common Operations .................................................................................. 209 Upgrading Packages....................................................................................... 211 Overview of Upgrading Packages ................................................................ 211 The Upgrade Package Process.................................................................... 212 Other Upgrade Operations.......................................................................... 217 Managing Licenses ........................................................................................ 219 Overview of Managing Licenses .................................................................. 219 Licensing Terminology............................................................................... 220 License Upgrade....................................................................................... 222 The License Attachment Process ................................................................ 223 Other License Operations........................................................................... 226 Generating CPInfo.......................................................................................... 228 The SmartUpdate Command Line .................................................................... 229
Chapter 10
Chapter 11
The Need for Management High Availability ..................................................... 284 The Management High Availability Solution...................................................... 285 Backing Up the SmartCenter Server............................................................ 285 Management High Availability Deployment .................................................. 285 Active versus Standby ............................................................................... 287 What Data is Backed Up by the Standby SmartCenter Servers?...................... 287 Synchronization Modes.............................................................................. 288 Synchronization Status.............................................................................. 289 Changing the Status of the SmartCenter Server............................................ 291 Synchronization Diagnostics ...................................................................... 291 Management High Availability Considerations ................................................... 293 Remote versus Local Installation of the Secondary SCS ................................ 293 Different Methods of Synchronizations ........................................................ 293 Data Overload During Synchronization ........................................................ 293 Management High Availability Configuration..................................................... 294 Secondary Management Creation and Synchronization - the First Time .......... 294 Changing the Active SCS to the Standby SCS .............................................. 296 Changing the Standby SCS to the Active SCS .............................................. 296 Refreshing the Synchronization Status of the SCS........................................ 297 Selecting the Synchronization Method ........................................................ 298 Tracking Management High Availability Throughout the System .................... 299
Chapter 12
Chapter 13
FAQ
Network Objects Management......................................................................... 312 Policy Management........................................................................................ 313
Chapter 14
Appendix A
10
Network Objects
Introduction to Objects................................................................................... 320 The Objects Creation Workflow ................................................................... 321 Viewing and Managing Objects ................................................................... 321 Network Objects ............................................................................................ 322 Check Point Objects.................................................................................. 322 Nodes...................................................................................................... 325 Interoperable Device ................................................................................. 325 Networks.................................................................................................. 325 Domains .................................................................................................. 326 Open Security Extension (OSE) Devices ...................................................... 326 Groups..................................................................................................... 330 Logical Servers ......................................................................................... 330 Address Ranges ........................................................................................ 331 Dynamic Objects....................................................................................... 331 VoIP Domains........................................................................................... 332
Appendix B
SmartCenter CLI
Index........................................................................................................... 351
Table of Contents
11
12
Preface
Preface
P
page 14 page 15 page 18 page 21
In This Chapter
Who Should Use This Guide Summary of Contents Related Documentation More Information
13
14
Summary of Contents
Summary of Contents
This guide describes how to deploy and manage Check Point products in order to secure a network, manage objects in SmartDashboard, secure SIC, manage users and install policies. Chapter Chapter 1, SmartCenter Overview Description includes an overview of usage, and describes the terminology and procedures that will help you install VPN-1 Pro for NGX R61 and Check Point Express. describes how to facilitate the administration and management of the Security Policy by the system administrator. describes how a visual representation of your network is used to facilitate and enhance the understanding of the physical deployment and organization of your network. includes in-depth information about how to work with and manage the Certificate Authority.
Chapter 4, The Internal Certificate Authority (ICA) and the ICA Management Tool Chapter 5, SmartView Tracker
provides information about how to collect comprehensive information on your network activity in the form of logs and descibes how you can then audit these logs at any given time, analyze your traffic patterns and troubleshoot networking and security issues. explains the use of SmartCenter tools to make changes in the production environment securely, smoothly and efficiently. This chapter includes information on Revision control(SmartCenter can manage multiple versions of policies) and Backup & Restore (when it is imperative that the SmartCenter Server be upgraded, it is possible to create a functioning SmartCenter Server which will replace the existing machine while it is being serviced).
Preface
15
Summary of Contents
Description explains the importance and significance of Integrity, how it is integrated in Check Point products and how Check Point and Integrity come together to provide a manageable solution for securing internal-network endpoint PCs. includes an explanation about web based administration and troubleshooting of the VPN-1 Pro SmartCenter Server. explains the use of SmartUpdate is an optional module for VPN-1 Pro that automatically distributes software applications and updates for Check Point and OPSEC Certified products, and manages product licenses. This chapter shows how SmartUpdate provides a centralized means to guarantee that Internet security throughout the enterprise network is always up to date. It shows how SmartUpdate turns time-consuming tasks that could otherwise be performed only by experts into simple point and click operations. contains information about the effective use of SmartDirectory (LDAP) servers. In addition, this chapter explains how VPN-1 Pro supports LDAP technology and uses existing LDAP servers to obtain user information for authentication and authorization purposes. includes an in-depth explanation of how in Management High Availability the Active SmartCenter Server (Active SCS) always has one or more backup Standby SmartCenter Servers (Standby SCS) which are ready to take over from the Active SmartCenter Server.
Chapter 8, SmartPortal
Chapter 9, SmartUpdate
16
Appendices
Description explains how SNMP management tools are used to monitor the activity of various devices on the network. In addition, this chapter discusses the point that because system administrators prefer to work with familiar tools, they might feel more comfortable obtaining status information regarding Check Point products through their regular SNMP Network Management Station (NMS). provides frequently asked questions about network objects management and policy management. provides detailed information about backup and restore procedures, management high availability and SmartUpdate upgrade procedures.
Appendices
This guide contains the following appendices Appendix Appendix A, Network Objects Appendix B, SmartCenter CLI Description provides an in-depth explanation of network objects and how manage and configure them. contains a complete list and explanation of SmartCenter command line commands.
Preface
17
Related Documentation
Related Documentation
The NGX R61 release includes the following documentation
TABLE P-1 VPN-1 Pro documentation suite documentation
Description Contains an overview of NGX R61 and step by step product installation and upgrade procedures. This document also provides information about Whats New, Licenses, Minimum hardware and software requirements, etc. Explains all available upgrade paths for Check Point products from VPN-1/FireWall-1 NG forward. This guide is specifically geared towards upgrading to NGX R61. Explains SmartCenter Management solutions. This guide provides solutions for control over configuring, managing, and monitoring security deployments at the perimeter, inside the network, at all user endpoints. Describes how to control and secure network access; establish network connectivity; use SmartDefense to protect against network and application level attacks; use Web Intelligence to protect web servers and applications; the integrated web security capabilities; use Content Vectoring Protocol (CVP) applications for anti-virus protection, and URL Filtering (UFP) applications for limiting access to web sites; secure VoIP traffic Explains how to monitor and audit traffic, and generate detailed or summarized reports in the format of your choice (list, vertical bar, pie chart etc.) for all events logged by Check Point VPN-1 Pro, SecureClient and SmartDefense.
Upgrade Guide
SmartCenter Guide
Eventia Reporter
18
Related Documentation TABLE P-1 VPN-1 Pro documentation suite documentation (continued)
Description Provides information about how to collect comprehensive information on your network activity in the form of logs. Learn how to use SmartView Tracker to audit these logs at any given time, analyze traffic patterns and troubleshoot networking and security issues. Explains how to install and configure SecurePlatform. This guide will also teach you how to manage your SecurePlatform and explains Dynamic Routing (Unicast and Multicast) protocols. Explains the Provider-1/SiteManager-1 security management solution. This guide provides details about a three-tier, multi-policy management architecture and a host of Network Operating Center oriented features that automate time-consuming repetitive tasks common in Network Operating Center environments.
SecurePlatform Guide
Provider-1 Guide
TABLE P-2
Title Integrity Advanced Server Installation Guide Integrity Advanced Server Administrator Console Reference
Description Explains how to install, configure, and maintain the Integrity Advanced Server. Provides screen-by-screen descriptions of user interface elements, with cross-references to relevant chapters of the Administrator Guide. This document contains an overview of Administrator Console navigation, including use of the help system. Explains how to managing administrators and endpoint security with Integrity Advanced Server. Provides information about how to integrating your Virtual Private Network gateway device with Integrity Advanced Server. This guide also contains information regarding deploying the unified SecureClient/Integrity client package.
Integrity Advanced Server Administrator Guide Integrity Advanced Server Gateway Integration Guide
Preface
19
Title Integrity Advanced Server System Requirements Integrity Agent for Linux Installation and Configuration Guide Integrity XML Policy Reference Guide Integrity Client Management Guide
Description Provides information about client and server requirements. Explains how to install and configure Integrity Agent for Linux. Provides the contents of Integrity client XML policy files. Explains how to use of command line parameters to control Integrity client installer behavior and post-installation behavior.
20
More Information
More Information
For additional technical information about Check Point products, consult Check Points SecureKnowledge at https://secureknowledge.checkpoint.com/.
See the latest version of this document in the User Center at http://www.checkpoint.com/support/technical/documents
Preface
21
More Information
22
1
page 24 page 30
Securing Channels of Communication Between Internal Components (SIC) page 43 Network Topology Managing Users in SmartDashboard Working with Policies page 47 page 49 page 56
23
Introduction
Introduction
To make the most of Check Point products and to best use all their capabilities and features, you must be familiar with some basic concepts and components. This chapter includes an overview of usage, and describes the terminology and procedures that will help you install VPN-1 Pro for NGX R61 and Check Point Express. Unless otherwise stated, all references to VPN-1 Pro in this Guide are relevant to Check Point Express. Additionally you will be shown how to create your first Policy Package. Refer to the Check Point Express Supplemental Guide to see a list of supported features.
VPN-1 Pro
VPN-1 Pro is part of the Check Point Suite. It provides a comprehensive security solution for very large enterprises and organizations. It integrates access control, authentication, and encryption to guarantee the security of network connections, the authenticity of local and remote users, and the privacy and integrity of data communications. VPN-1 Pro supports both site-to-site and, along with VPN-1 SecuRemote/SecureClient, remote access VPN solutions.
24
the installed product are defined, such as the definition of Administrators, Fingerprint (for first time SmartCenter Server identity verification), as well features such as Management High Availability. An Enforcement module is the component that enforces a Policy (for example, a Security Policy). This module is referred to as VPN-1 Pro module. The Check Point Express module is called the VPN-1 Express module. Installation is the process by which the VPN-1 Pro or Check Point Express components are installed on a computer. Check Point products are based on a 3-tier technology architecture where a typical Check Point deployment is composed of an Enforcement module, the SmartCenter Server and a SmartConsole (usually SmartDashboard). There are several different ways to deploy these components: A standalone deployment is the simplest deployment, where the VPN-1 Pro or Check Point Express components that are responsible for the management of the Security Policy (the SmartCenter Server and the Enforcement module) are installed on the same machine. A distributed deployment is a more complex deployment where the Enforcement module and the SmartCenter Server are deployed on different machines. In all deployments, SmartConsole can be installed on any machine, unless stated otherwise. Licenses are required in order to use certain Check Point products and features. It is recommended to use SmartUpdate for license management. Login is the process by which the administrator connects to the SmartCenter Server using a SmartConsole. The recommended method to login to the SmartCenter Server is by using a certificate. Objects are defined and managed in SmartDashboard to represent actual network components such as gateways, servers and networks. A Policy Package is a set of Policies that are enforced on selected Enforcement modules. These Policies may include different types of policies, such as a Security Policy or a QoS policy. A Security Policy defines the rules and conditions that govern which communications are permitted to enter and to leave the organization. SmartConsole are GUI applications used to manage different aspects of the corporate network. For example, SmartView Tracker track logs and alerts issued by the system.
Chapter 1
SmartCenter Overview
25
Possible Deployment
SmartCenter Server is the component that manages the database and policies, and downloads policies to Enforcement modules. This server is also referred to as SmartCenter Pro server. The Check Point Express server is called the SmartCenter Express server. A Log Server is the repository for log entries generated on Enforcement modules, that is, the Enforcement modules send their log entries to the Log Server. A Log Server is often installed on the same machine as the SmartCenter Server. SmartDashboard is the SmartConsole used to create, edit and install policies. Users are the people defined in SmartDashboard as the users of an organization. For example, users may be the employees of a specified organization
Possible Deployment
There are two basic deployments: standalone deployment - where the Enforcement module and the SmartCenter Server are installed on the same machine.
distributed deployment - where the Enforcement module and the SmartCenter Server are installed on different machines (Figure 1-1). Figure 1-1 A typical deployment
26
Possible Deployment
In Figure 1-1, there are two Enforcement modules. Each Enforcement module is installed on a Gateway that leads to the Internet on one side, and the LAN on the other side. It is possible to create a Virtual Private Network (VPN) between the two Enforcement modules, to secure all communication between them. The SmartCenter Server is installed on the LAN, so that it is protected by VPN-1 Pro & Check Point Express. The SmartCenter Server manages the Enforcement modules and allows remote users to connect securely to the corporate network. SmartDashboard may be installed on the SmartCenter Server or on any other internal machine. In addition to Check Point modules, other OPSEC-partner modules (for example, an AntiVirus Server) can be deployed in order to complete the network security in collaboration with the SmartCenter Server and its Enforcement modules. The remainder of this chapter describes how to deploy and manage Check Point products to secure a network, including: Managing Objects in SmartDashboard describes how to manage objects, the building blocks of policies. Securing Channels of Communication Between Internal Components (SIC) describes how Check Point components installed on different machines securely communicate with each other for policy installation, status information, etc. Network Topology describes how the structure of the internal network protected by the Enforcement module is represented on the Network Object which represents the Enforcement module. Managing Users in SmartDashboard describes how to manage administrators and users. Working with Policies describes how to define and install policies.
Chapter 1
SmartCenter Overview
27
Login Process
Login Process
Overview
The login process, in which administrators connect to the SmartCenter Server, is common to all Check Point SmartConsole (SmartDashboard, SmartUpdate, etc.). This process consists of a bidirectional operation, in which the administrator and the SmartCenter Server authenticate each other and create a secure channel of communication between them using Secure Internal Communication (SIC). Once both the administrator and the SmartCenter Server have been successfully authenticated, SmartCenter launches the selected SmartConsole.
28
Chapter 1
SmartCenter Overview
29
Objects are created by the system administrator in order to represent actual hosts and devices, as well as intangible components such as services (for example, HTTP and TELNET) and resources, (for example, URI and FTP). Each component of an organization has a corresponding object which represents it. Once these objects are created, they can be used in the rules of the Security Policy. Objects are the building blocks of Security Policy rules and are stored in the Objects database on the SmartCenter Server. Objects in SmartDashboard are divided into several categories which can be viewed in the different tabs of the Objects Tree (Figure 1-2). Figure 1-2 Objects Tree
For instance, the Network Objects tab represents the physical machines as well as logical components, such as dynamic objects and address ranges, that make up your organization.
30
When creating objects the system administrator must consider the needs of the organization: What are the physical and logical components that make up the organization? Each component that accesses the firewall most likely needs to be defined. Who are the users and administrators and how should they be divided into different groups?
In other words, a substantial amount of planning should go into deciding what objects should be created and how they should be implemented.
Chapter 1
SmartCenter Overview
31
Figure 1-3
From these panes, objects are created, manipulated, and accessed. The following section describes the functions and characteristics of each pane.
32
Managing Objects
SmartMap Pane
A graphical display of objects in the system is displayed in SmartMap view. This view is a visual representation of the network topology. Existing objects representing physical components such as Gateways or Hosts are displayed in SmartMap, but logical objects such as dynamic objects cannot be displayed.
Managing Objects
The Objects Tree is the main view for adding, editing and deleting objects, although these operations can also be performed from the menus, toolbars and the various views such as in Rule Bases or in SmartMap.
Chapter 1
SmartCenter Overview
33
Configuring Objects
Configuring Objects
An object consists of one or more tabs and/or pages. It is in these tabs and/or pages that the object settings are configured.
A window is displayed which allows you to configure this object using a helper wizard, or manually, via the Classic method. 2. Select the Classic method. The Check Point Gateway is displayed with the following four default pages: General Properties The required values of most new objects are a name and an IP address. In this window you should also configure the Check Point products to be installed on the Check Point Gateway. For this object to communicate with the SmartCenter Server, you must initialize Secure Internal Communication (SIC) by clicking Communication. Topology Enter the interfaces that make up the network topology of your organization. NAT If relevant, configure this object for NAT and anti-spoofing purposes. Advanced If relevant, configure this object for use of the SNMP daemon.
34
3. Once you have configured the object, click OK to apply the changes to the new object. This object will be added to the Network Objects tab of the Objects Tree and to the Objects List. Note - It is possible to clone a Host object and a Network object (that is, duplicate the object). To do this right-click the Host or Network object you would like to duplicate, select Clone... and enter a new name.
Check Point management stations and enforcement modules appear under the category Check Point, DAIP servers appear in the category Dynamic Objects, etc. Organizing objects by category is preferred for small to medium sized deployments. SmartDashboard opens to Classic View by default unless set to Group View.
Chapter 1
SmartCenter Overview
35
Group View provides the flexibility to display objects in a manner pursuant to the specific needs of your organization. That manner could be by function, as the gateway group above describes, by regional distributions of resources, or any number of other groupings. Group View is especially useful for larger deployments that could benefit from grouping objects in this way. Any objects not associated with a group appear as they would in Classic View, in the appropriate logical category under the category Others. You can switch to Group View by right clicking on Network Objects, and selecting Arrange by groups. As changing views can at first be disorienting, a warning message appears (see Figure 1-8). Figure 1-8 Warning dialog before entering Groups View
36
Click OK and note that the Network Objects tab is now arranged by group. If no groups have been created, the order is similar to that of Classic View, with the addition of the category Others (see Figure 1-9). Figure 1-9 Switch to arrange by group
When you begin adding groups, they appear above the Others category. For example, network objects grouped by function would look something like Figure 1-10. Figure 1-10 Grouping network objects by function
Chapter 1
SmartCenter Overview
37
The Group Properties window opens and allows you to configure the group. Give the group a name, select the objects you want in the group from the Not in Group pane, and click Move >. To save your new group, click OK. Note that when you select a group in the Objects Tree, the groups network objects appear in the Objects List, as depicted in Figure 1-13. Figure 1-12 A groups network objects are displayed in the Objects List
You can create groups that are members of other groups. In Figure 1-13, the nested group Alaska is shown as a member of GW-group in the Objects List.
38
To change the sorting order of the Network Objects tree, right click on any category or object in the Network Objects tree and select one of the three Sort Tree by options.
Chapter 1
SmartCenter Overview
39
This ability to view group member objects in a hierarchical fashion is useful in providing context to each device. Grouping objects in meaningful ways can make locating and working with them faster and easier. A remote gateway object in a group called GW-group is easily located, for instance. Also, when creating nested groups (groups within groups), displaying their hierarchy naturally adds clarity to the organizational structure. In Figure 1-15, group GW-group is a member of group Texas. Figure 1-15 Group within a group in hierarchical view
Showing the groups hierarchy adds additional functionality as well. For instance, right clicking on a group object provides the option to create a new network object that will automatically be assigned membership in the group. It also allows groups to be sorted individually. By right clicking on a group object, you can choose to sort objects in a manner independent of how the tree or other groups are sorted. You can sort each group by type, name or color, or as the Objects Tree is sorted. To enable groups hierarchy, right click on either the Groups category or a group object and select Show groups hierarchy.
40
Group Conventions
You can configure a group object to have SmartDashboard prompt you whenever you create a network object whose criteria match certain properties you define as characteristic of the group. If you select Suggest to add objects to this group, the Group Properties window then shifts to display matchable properties (see Figure 1-16). Figure 1-16 Group Properties
Use the drop-down menus to choose any combination of name, color, and network to set the appropriate condition to be a member of this group. For example, say you set as a matchable property the network object Corporate-dmz-net. Subsequently, each time you create an object with an IP address on this network, SmartDashboard will suggest to include the new object in this group. Answering yes places the object in the group.
Chapter 1 SmartCenter Overview 41
If an object matches the properties of several groups, the Groups Selection Dialog window appears (see Figure 1-17). Figure 1-17 Groups Selection Dialog Window
If the list of matching groups includes a group to which you do not want to assign the object, set that groups Action property to Dont Add, and click OK. If you alter the properties of an object in such a way that it no longer matches the parameters of the group, SmartDashboard alerts you to the fact and asks if you want to remove the object from the group. Removing an object from a group in no way deletes the object or otherwise changes it. If an object does not belong to any other group, you can locate it in its logical category under Others.
42
The SmartCenter Server must be able to communicate with all the modules and partner-OPSEC applications that it manages, even though they may be installed on different machines. The interaction must take place to ensure that the modules receive all the necessary information from the SmartCenter Server (such as the Security Policy). While information must be allowed to pass freely, it also has to pass securely. This means that: The communication must be encrypted so that an imposter cannot send, receive or intercept communication meant for someone else. The communication must be authenticated, there can be no doubt as to the identity of the communicating peers. The transmitted communication should have data integrity, that is, the communication has not been altered or distorted in any form. The SIC setup process allowing the intercommunication to take place must be user-friendly.
If these criteria are met, secure channels of communication between inter-communicating components of the system can be set up and enforced to protect the free and secure flow of information.
Chapter 1
SmartCenter Overview
43
1. In the Check Point Configuration Tool, when the SmartCenter Server is installed, the Internal Certificate Authority (ICA) is created. After the ICA is created, it issues and delivers a certificate to the SmartCenter Server.
44
2. SIC can be initialized, for every module in the Secure Internal Communication tab of the Check Point Configuration tool. An Activation Key must be decided upon and remembered. This same Activation Key must be applied on the appropriate network object in SmartDashboard. At this point only the Module side has been prepared. The Trust state remains Uninitialized. 3. In SmartDashboard, connect to the SmartCenter server. Create a new object that represents the module. In the General Properties page of the module, click Communication to initialize the SIC procedure. 4. In the Communication window of the object, enter the Activation Key that you created in step 2. 5. To continue the SIC procedure, click Initialize. At this point the module is issued a certificate by the ICA. The certificate is signed by the ICA. 6. SSL negotiation takes place after which the two communicating peers are authenticating with their Activation Key. 7. The certificate is downloaded securely and stored on the module. 8. After successful Initialization, the module can communicate with any module that possesses a SIC certificate, signed by the same ICA. The Activation Key is deleted. The SIC process no longer requires the Activation Key, only the SIC certificates.
Chapter 1
SmartCenter Overview
45
1. To reset the Trust State in SmartDashboard: In SmartDashboard, in the General Properties window of the module, click Communication. In the Communication window, click Reset.
2. To reset the Trust State in the Check Point Configuration tool of the module, click Reset in the Secure Internal Communication tab. 3. Install the Security Policy on all modules. This deploys the updated CRL to all modules.
46
Network Topology
Network Topology
The network topology represents the internal network (both the LAN and the DMZ) protected by the Enforcement module. The module must be aware of the layout of the network topology to: Correctly enforce the Security Policy. Ensure the validity of IP addresses in eitherbound traffic. Configure a special domain for Virtual Private Networks.
Each component in the network topology is distinguished on the network by its IP address and net mask. The combination of objects and their respective IP information make up the topology. For example: The IP address of the LAN is 10.111.254.0 with Net Mask 255.255.255.0. A Check Point Gateway on this network has an external interface with the following IP address 192.168.1.1, and an internal interface with 10.111.254.254.
In this case, there is one simple internal network. In more complicated scenarios, the LAN is composed of many different networks, as in the Figure 1-18. Figure 1-18 A complex topology
The internal network is composed of the following: The IP address of the first is 10.11.254.0 with Net Mask 255.255.255.0. The IP address of the second is 10.112.117.0 with Net Mask 255.255.255.0. A Check Point Gateway that protects this network has an external interface with IP address 192.168.1.1, and an internal interface with 10.111.254.254.
Chapter 1
SmartCenter Overview
47
Network Topology
In this case the system administrator must define the topology of the gateway accordingly. In SmartDashboard: An object should be created to represent each network. The definition must include the networks IP address and netmask. A group object should be created which includes both networks. This object represents the LAN. In the Gateway object, the internal interface should be edited to include the group object. (In the selected Gateway, double-click on the internal interface in the Topology page. Select the group defined as the specific IP addresses that lie behind this interface).
48
SmartDirectory (LDAP)
LDAP is a standardized protocol that makes a single Users Database available to multiple applications (for example, email, domains, firewalls, etc.) and requires a special deployment (in addition to the VPN-1 Pro deployment). For information on managing users through LDAP, see SmartDirectory (LDAP) and User Management.
Chapter 1
SmartCenter Overview
49
Users Database
SmartDashboard
Check Points user management solution is part of SmartDashboard. Users, Administrators and their groups are managed as objects, using the standard object administration tools: the Objects Tree pane and the Objects Manager window. The Objects Tree pane (Users and Administrators tab): Provides a graphical overview of all users and administrators. Allows you to manage users and administrators by right clicking the relevant folder (for example, Administrator, Administrator Groups, External User Profiles, etc.) and selecting the appropriate command (Add, Edit, Delete, etc.) from the menu.
The Objects Manager (Users and Administrators window): Lists all users and administrators (you can filter this list to focus on a specific type of users or administrators). Allows you to define new objects using the New... menu, and to delete or modify an object by selecting them in the list and clicking Remove or Edit (respectively).
The users definition includes access permissions to and from specific machines at specific times of the day. The user definition can be used in the Rule Bases Authentication Rules and in Remote Access VPN. SmartDashboard further facilitates user management by allowing you to define user and administrator templates. Templates serve as prototypes of standard users, whose properties are common to many users. Any user you create based on a template inherits all of the templates properties, including membership in groups.
Users Database
The users defined in SmartDashboard (as well as their authentication schemes and encryption keys) are saved to the proprietary Check Point Internal Users Database (a.k.a. the Users Databases). The Users Database resides on the SmartCenter Server and on the firewalled machines (the enforcement points). The Users Database is automatically downloaded to the VPN-1 Pro Modules as part of the Policy installation process. Alternatively, you can manually install the Users Database by selecting Policy > Install Database... from the menu. The Users Database does not contain information about users defined externally to VPN-1 Pro (such as users in external SmartDirectory (LDAP) groups), but it does contain information about the external groups themselves (for example, on which
50
Account Unit the external group is defined). For this reason, changes to external groups take effect only after the Security Policy is installed or after the Users Database is downloaded.
Chapter 1
SmartCenter Overview
51
Configuring Users
Proceed as follows: 1. In the Users and Administrators tab of the Objects Tree, create a new user (see Figure 1-19). The User Properties window is displayed. 2. In the General tab, specify the Users Login Name. Note If this users certificate is to be generated by a non-Check Point Certificate Authority, the Login Name is the Common Name (CN) component of the users Domain Name (DN). For example, if the users DN is: [CN = James, O = My Organization, C = My Country], the users Login Name is James. CNs used as Login Names must consist of a single string (with no spaces).
This property is the users only mandatory property and is case sensitive.
52
3. Define additional user properties as needed, such as the following: The time period during which this user definition is valid (specified in the Personal tab). The groups this user Belongs to (specified in the Groups tab). Including users in groups is required for performing a variety of operations, such as defining User Authentication rules or RemoteAccess communities. The network objects from which (Source objects) and to which (Destination objects) the user is allowed access (specified in the Location tab). The days and times during which the user is allowed to connect to the network (specified in the Time tab). Authentication, certificates and encryption settings (for details, please refer to the Firewall and SmartDefense Guide and the VPN Guide). The users definition is saved to the Users Database on the SmartCenter Server.
Configuring Administrators
1. In the Users and Administrators tab of the Objects Tree, create a new administrator. The Administrator Properties window is displayed. 2. In the General tab, specify the administrators Login Name and Permissions Profile. 3. In the Admin Certificates tab, create a login certificate for this administrator as follows: a. Click Generate and save.
You are warned that the certificate generation cannot be undone unless you click Revoke.
b. Click OK.
Chapter 1
SmartCenter Overview
53
e. Browse to the folder in which you wish to save the certificate and click Save (by default, the certificate is saved under the administrators Login Name but you can rename it as needed).
Back in the Admin Certificates tab, the Certificate State changes to Object has a certificate and the administrators Distinguished Name (DN) is displayed.
4. Click OK. The administrators definition is saved to the Users Database on the SmartCenter Server.
Configuring Templates
To create a new user template: 1. In the Users and Administrators tab of the Objects Tree, create a new template The User Template Properties window is displayed. 2. In the General tab, specify the templates name in the Login Name field. This property is mandatory and is case sensitive. 3. Define additional user properties as needed (see step 3 on page 53). To use this template to define a new user: 1. Right click the Users folder and select New User > Template name... 2. In the General tab, specify the new users Login Name. This is the only property the user cannot inherit from the template. 3. Choose one of the following: To complete the user definition using the templates default settings, click OK. To specify the users unique properties, modify the relevant settings as needed and click OK. The templates definition is saved to the Users Database on the SmartCenter Server.
54
Configuring Groups
To create a new user group: 1. In the Users and Administrators tab of the Objects Tree, create a new user group. The Group Properties window is displayed. 2. Specify the groups name in the Name field. This property is the groups only mandatory property and is case sensitive. 3. Move the users, external user profiles or groups to be included in this group from the Not in Group list to the In Group list. To easily locate objects in the Not in Group list, limit the View to a specific type of objects (for example, users). The In Group list shows collapsed sub-groups, without listing their members. For a list of all group members (including the sub-groups members), click View Expanded Group...
4. Click OK to complete the definition. The groups definition is saved to the Users Database on the SmartCenter Server.
Chapter 1
SmartCenter Overview
55
Overview
A Policy Package is a set of Policies that are enforced by the Enforcement modules. They can be installed or uninstalled together on selected VPN-1 Pro modules. The Policy Package components include: Advanced Security consisting of the Security Rule Base the Address Translation (NAT) Rule Base the Users Database the proprietary Check Point Internal User Database, containing the definitions and authentication schemes of all users defined in SmartDashboard. the Objects Database the proprietary Check Point Objects Database, containing the definitions of all network objects defined in SmartDashboard.
QoS the Quality of Service (Check Point QoS) Rule Base Desktop Security the Desktop Security Rule Base
56
The installation process does the following: 1. Performs a heuristic verification on rules, to ensure they are consistent and that no rule is redundant. If there are verification errors (for example, when two of the Policys rules are identical) the Policy is not installed. However, if there are verification warnings (for example, when anti-spoofing is not enabled for a module with multiple interfaces), the Policy Package is installed with a warning. 2. Confirms that each of the Modules on which the rule is enforced (known as the Install On objects) enforces at least one of the rules. Install On objects that do not enforce any of the rules enforce the default rule, which rejects all communications. 3. Converts the Security Policy into an Inspection Script and compiles this Script to generate an Inspection Code. 4. Distributes the Inspection Code to the selected installation targets. 5. Distributes the User and Encryption databases to the selected installation targets.
Chapter 1
SmartCenter Overview
57
- Install on each Module independently, or - Install on all Modules, or on none of the Modules Note - If you are installing the Policy on a Gateway Cluster, specify if the installation must be successful for all Cluster Members. 4. Click OK. The Installation Process window is displayed, allowing you to monitor the progress of the verification, compilation and installation. If the verification is completed with no errors and the SmartCenter Server is able to connect to the module securely, the Policy installation succeeds. If there are verification or installation errors, the installation fails (in which case you can view the errors to find the source of the problem). If there are verification warnings, the installation succeeds with the exception of the component specified in the warning. To find out which Policy is installed on each Module, select File > Installed Policies...
3. Choose the Uninstall components. 4. Click OK. The Uninstall window is displayed, allowing you to monitor the progress of the operation. You are notified whether the uninstall has been complete successfully or has failed, and if so, for what reason.
58
Chapter 1
SmartCenter Overview
59
60
2
page 62 page 63 page 70 page 71
61
These practices clutter and inflate the Security Policy and the databases unnecessarily, which invariably affects the performance of the Security Policy and the ability of the system administrator to manage it properly. A simple, seamless solution is needed to facilitate the administration and management of the Security Policy by the system administrator. This easy-to -use policy management tool needs to take into account. The complexity of the corporate structure, with its multiple sites and branches, each of which has its own specific corporate needs. The need to be easily locate objects of interest. The need to analyze the Rule Base.
62
Chapter 2
Policy Management
63
Policy Packages
Policy Packages
Policy Packages allow you to address the specific needs of your organizations different sites, by creating a specific Policy Package for each type of site. Figure 2-1 illustrates an example organizations network, consisting of four sites. Figure 2-1 Example Organization with Different Types of Sites
Each of these sites uses a different set of Check Point products: Servers Farm has VPN-1 Pro installed. Sales Alaska and Sales California site have VPN-1 Pro installed. Executive Management has VPN-1 Pro and Check Point QoS installed.
Even sites that use the same product may have very different security needs, requiring different rules in their policies. To manage these different types of sites efficiently, you need three different Policy Packages. Each Package should include a combination of policies that correspond to the products installed on the site in question. Accordingly, a Policy Package is composed of one or more of the following policy types, each controlling a different Check Point product: A Security and Address Translation Policy, controlling VPN-1 Pro modules. This Policy also determines the VPN configuration mode. A QoS Policy, controlling Check Point QoS modules. A Desktop Security Policy, controlling SecuRemote/SecureClient machines.
64
Policy Packages
Unlike the above Policies, the Security Rule Base does not apply to a specific site but to the relationship between sites. Therefore, this Rule Base is common to all sites. The Web Access Rule Base is independent of Policy Packages, since it applies to the organization as a whole (as opposed to a specific site). Its appearance in the Rule Base pane is determined by SmartDashboards Global Properties settings (see the SmartDashboard Customization page of the Global Properties window).
File Operations
File operations (New, Open, Save etc.) are performed at the Policy Package level (as opposed to the single policy level). New allows you to either define a new Policy Package, or add a single policy to an existing Policy Package. Open allows you to display an existing Policy Package. The policy types included in the Policy Package determine which tabs are displayed in the Rule Base. Save allows you to save the entire Policy Package. Save As allows you to save the entire Policy Package, or to save a specific policy that is currently in focus in the Rule Base (i.e. Security and Address Translation, QoS or Desktop Security). Delete allows you to delete the entire Policy Package. Add to Policy Package allows you to add existing Policies to your Policy Package. Copy Policy to Package allows you to copy existing Policies to your Policy Package. Note - To back up a Policy Package before you modify it, use the Database Revision Control feature. Do not use File operations for backup or testing purposes, since they clutter the system with extraneous Packages. In addition, as there are multiple Packages but only one Objects Database, the saved Package may not correspond to changes in the Objects Databases.
Chapter 2
Policy Management
65
Policy Packages
Installation Targets
To install (and uninstall) Policy Packages correctly and eliminate errors, each Policy Package is associated with a set of appropriate installation targets. This association both eliminates the need to repeat the module selection process per installation, and ensures that Policy Package is not mistakenly installed on any inappropriate target. The installation targets are defined for the whole Policy Package, thereby eliminating the need to specify them per-rule in each policy. The selected targets are automatically displayed every time you perform an Install or Uninstall operation (Figure 2-2 on page 66). Figure 2-2 Example Installation Targets in the Install Policy window
You can set the Packages Policies to be either checked or unchecked by default for all installation targets (in the SmartDashboard customization page of the Global Properties window), and then modify these settings as needed per-installation.
66
Chapter 2
Policy Management
67
You can further benefit from the query results by defining them as a group. For example, you may wish to create a group of all Mail Servers in your system and use this group in your Rule Base. If your naming convention is to include the word Mail in a Mail Servers name, you can easily find these objects by showing All network objects, choosing the Search by Name filter and entering the string *Mail*. Then create a group out of the results and use it in the appropriate rule. This group object is also available through other Check Point SmartConsoles, for example: if you are using the Eventia Reporter, you can include this group as the source of connections in the Email Activity report.
68
To expose IP address duplications, display the Network Objects tab of the Objects Tree and sort the IP Address column of the Objects List pane. To find out which service is occupying the port you wish to use, display the Services tab of the Objects Tree and sort the Port column of the Objects List pane.
Chapter 2
Policy Management
69
70
Policy Package
Creating a New Policy Package
1. Choose File > New... from the menu. The New Policy Package window is displayed. 2. Enter the New Policy Package Name. This name cannot Contain any reserved words, spaces, numbers at the beginning, any of the following characters: %, #, , &, *, !, @, ?, <, >, /, \, : End with any of the following suffixes: .w, .pf, .W.
3. In the Include the following Policy types section, select any or all of the following policy types, to be included in the Policy Package: Security and Address Translation choose between a Simplified and Traditional VPN configuration mode. QoS choose between a Traditional mode and an Express mode. Desktop Security
Chapter 2
Policy Management
71
Policy Package
Table 2-1 lists the Rule Base tabs corresponding to each policy type. Table 2-1
Rule Base tabs per Policy Type
Policy Type Security and Address Translation: Traditional mode Security and Address Translation: Simplified mode QoS Desktop Security
Rule Base Tabs Displayed Security, Address Translation and Web Access Security, Address Translation, VPN Manager and Web Access QoS Desktop Security
4. Click OK to create the Policy Package. SmartDashboard displays the new Policy Package, consisting of the selected policy type tabs.
3. Click OK. The selected modules will be available as installation targets whenever you install or uninstall this Policy Package. 4. To set the default state of all modules to either Selected or Not Selected, thereby facilitating the policy installation (or uninstall) process, choose Policy > Global Properties and select the appropriate setting in the Global Properties windows SmartDashboard Customization page. 5. You can further modify the installation targets as part of the installation (or uninstall) operation: To modify the targets of this operation only, check the relevant modules and Policies and uncheck all others.
72
Rule Sections
To modify the targets of all future operations as well, click Select Targets... to display the Select Installation Targets window and modify the list as needed.
Rule Sections
Adding a Section Title
1. Select the rule above which or under which you want to add a section title. 2. Choose Rules > Add Section Title > Above or Below (respectively) from the menu. The Header window is displayed. 3. Specify the title of the new section and click OK. The new section title is displayed in the appropriate location. All rules between this title and the next title (or the end of the rule base) are now visually grouped together. 4. By default, the section is expanded. To hide the sections rules, collapse its title by clicking the (-) sign. 5. If the rules following this section are not proceeded by their own section title, you can mark the end of this section by adding an appropriate title (e.g. End of Alaska Rules).
Chapter 2
Policy Management
73
6. To run this query clause, click Apply. The rules matching the query clause are displayed in the Rule Base, while all other rules are hidden. 7. To save this query clause, click Save. The Save Query window is displayed. 8. Specify this querys name and click OK. The Rule Base Queries window is displayed, showing the new query in the SmartDashboard Queries List.
74
Intersecting Queries
1. Display the Rule Base you wish to query (Security, Desktop Security or Web Access) and select Search>Manage Rule Queries from the menu. The Rule Base Queries window is displayed. 2. Select the first query you wish to run and click Apply. The rules matching this query are displayed in the Rule Base, while all other rules are hidden. 3. If you cannot find a relevant query on the list, you can define one now as follows: a. Click New... The Rule Base Query window is displayed. b. Specify the new querys Name and click New... The Rule Base Query Clause / View Policy of Gateway window is displayed. c. Define the query (see step 2 on page 74 to step 5 on page 74) and click OK. The query is added to the Clause list. d. You can add new clauses to the query and use the following logical operations: And, to search for rules matching all clauses Or, to search for rules matching at least one of the clauses Negate query, to search for the negation of these clauses. 4. Select the second query you wish to run. 5. Click one of the following: And, so that only rules matching both queries are displayed. Or, to show rules that match either one of queries. 6. Run the selected query by clicking Apply. 7. To unhide all rules, click Clear all.
Chapter 2
Policy Management
75
The objects that match the search criteria are displayed. 3. To find one of these objects in SmartMap, click Show. 4. To create a group consisting of the search results, click Define query results as group... and specify the new groups name in the Group Properties window.
76
Chapter SmartMap
In This Chapter
Overview of SmartMap The SmartMap Solution Enabling and Viewing SmartMap Adjusting and Customizing SmartMap Working with Network Objects and Groups in SmartMap Working with SmartMap Objects Working with Folders in SmartMap Integrating SmartMap and the Rule Base Troubleshooting SmartMap
3
page 78 page 78 page 79 page 80 page 82 page 85 page 88 page 90 page 92
77
Overview of SmartMap
Overview of SmartMap
Most organizations have multiple gateways, hosts, networks and servers. The topology of these organizations is represented in SmartDashboard by network objects. The topology is often highly complex, vastly distributed over many different machines and enforced in many different rules and rule bases. While this layout matches the needs of your organization, it is difficult to visualize, and even harder to translate in a schematic format. While the network objects are easy to use in the rule base, it would be easier to understand and troubleshoot the policy if the rules were displayed in format where they could be understood visually.
78
Enable SmartMap
It is not possible to work with SmartMap until it has been enabled. To enable SmartMap go to Policy > Global Properties > SmartMap.
Toggle SmartMap
In order to clear SmartDashboard of visual clutter, SmartMap can be toggled until such time that you need to work with it again. Note - When the SmartMap view is hidden or inactive, all of its menus and commands are disabled; however, topology calculations do continue. To view SmartMap go to View > SmartMap. To disable SmartMap go to View > SmartMap.
Chapter 3
SmartMap
79
Launching SmartMap
SmartMap can be displayed, embedded or docked into the GUI window, or it can be displayed outside of the SmartDashboard window. To display SmartMap outside the SmartDashboard window go to SmartMap > Docked View.
In This Section
Magnifying and Diminishing the SmartMap View Scrolling Adjusting SmartMap using the Navigator Affecting SmartMap Layout (Arranging Styles) Optimally arranging SmartMap (Global Arrange) Optimally arranging SmartMap (Incremental Arrange) page 80 page 81 page 81 page 81 page 82 page 82
80
To automatically zoom into a particular area of SmartMap: 1. Select SmartMap > Zoom Mode. 2. Drag the mouse over a specific area in SmartMap. The area you selected will zoom into view. To select the level of magnification 1. Select SmartMap > Select Mode 2. Drag the mouse over a specific area in SmartMap. 3. Select SmartMap > Zoom > sub menu and the options that best meets your needs.
Scrolling
If you have an IntelliMouse you can use the scroll wheel to scroll SmartMap.
Chapter 3
SmartMap
81
82
Create a Group
1. Select all the objects that you would like to include in the group. 2. Right-click on the selected objects and select Group from the displayed menu. 3. Configure the group by adding or removing objects to and from the group.
2. Edit the object. Note that if you change the IP address of a selected object, the placement of the object in SmartMap may change accordingly.
Chapter 3
SmartMap
83
84
Chapter 3
SmartMap
85
Connecting a network to Connectivity clouds/an Internet cloud, where there is more than one/a Containing Network
1. Right-click on the network you would like to connect to the Connectivity cloud by holding the ctrl key down until all networks are selected. 2. Right-click the last selected network. 3. Select Connect to and select the option that you would like
86
Chapter 3
SmartMap
87
Collapsing locales
1. Right-click the locale. 2. Select Collapse Locale from the displayed menu.
88
Viewing the Content of special folders External Objects and Unresolved Objects are two special types of folders which cannot be expanded, but whose contents can be viewed:
1. Right-click the folder whose contents you would like to view. 2. Select Show Contents from the displayed menu.
Chapter 3
SmartMap
89
Viewing Gateway Clusters The Gateway Cluster objects are never included in the Objects to Resolve folder, even though they may be unresolved
1. Right-click the selected Gateway Cluster. 2. Select Show Members from the displayed menu.
Display a Legend for regular and/or NAT rules The Legend provides a key to the understanding of rules displayed in SmartMap.
To display a legend go to SmartMap > Customization > View Options.
90
1. Select a rule in the Rule Base that you would like to display in SmartMap from the rule number. 2. Select Show and a view option from the displayed menu.
Understanding the Rule Color Legend Rules appear as combinations of highlighted colors and arrows on SmartMap. The colors assigned to the arrows represents the action being performed. The arrow also indicates the direction of the rule; from whence the rule came (source), and to where it is going (destination).
RedDrop, Reject GreenAccept
Chapter 3 SmartMap 91
Troubleshooting SmartMap
The rules mentioned below are mapped and displayed in a specific manner: Where the Source is Any, the rule is mapped from the Install On to the Destination. Where the Destination is Any, the rule is mapped out from the Source to the Install On. Where both Source and Destination are Any, only the paths between the Install Ons
are shown
Troubleshooting SmartMap
SmartMap can be used as a troubleshooting tool, mostly for topology calculations and certain connectivity issues such as duplicated networks and unresolved object interfaces.
The Legend in the Topology Calculation Results window explains how you are meant to read the Interfaces topology list.
92
Troubleshooting SmartMap
Red the results of the calculation are different from the currently defined topology information. This information needs to be approved. Click Approve to display and contrast the current topology information with the resulting topology information. click Approve all to automatically approve all calculations without comparing and contrasting results. Blue the calculation has been automatically approved. Regular no change has been made to the topology information.
The Helper is a learning tool. Once you understand how to solve these connectivity tasks, you can solve them directly in SmartMap View, and not via the Helper.
To solve duplicated networks you can modify the shared IP address so that they are all unique. Alternately you can delete the duplicated network.
Print SmartMap
Set the attributes by which SmartMap will be printed. This includes how the output is to be scaled, the size of the margins and finally information to be included (such as page numbers, borders, crop marks, or even a customized caption).
94
Chapter 3
SmartMap
95
96
4 Chapter The Internal Certificate Authority (ICA) and the ICA Management Tool
In This Chapter
The Need for the ICA The ICA Solution ICA Configuration page 110 page 98 page 99
97
98
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool
99
The ICA issues Certificate Revocation Lists (CRLs) in order to publish a list of certificates that have been revoked. This revocation may be due to a number of factors: key compromise, certificate loss, etc. The CRLs are published on an HTTP server running on the SmartCenter Server, and can be retrieved by any Check Point module for certificate validation.
ICA Clients
ICA operations are performed using the following clients: Check Point configuration tool, or cpconfig on the Command Line. Using this tool, the ICA is created and a SIC certificate is issued for the SmartCenter server. For more information, see Securing Channels of Communication Between Internal Components (SIC) on page 43. SmartDashboard. This SmartConsole is used to manage: SIC certificates for the various modules, as well as for administrators. For more information see Securing Channels of Communication Between Internal Components (SIC) on page 43. VPN certificates user certificates managed in the internal database, for more information see Introduction to Remote Access VPN in VPN Guide.
ICA Management tool. This tool is used to manage VPN certificates for users which are either managed on the internal database or on a LDAP server. Additionally it is used to perform ICA management operations.
The ICA generates audit logs when ICA operations are performed. These logs can be viewed in the SmartView Tracker.
100
The advantages of the two-step process are as follows: enhanced security the private key is created and stored on the users machine the certificate issued by the ICA is downloaded securely to the client machine (and not handed to the user by the administrator)
pre-issuance automatic and administrator-initiated certificate removal if a user does not complete the registration process within a given period of time (which is by default two weeks), the registration code is automatically removed. An administrator can remove the registration key before the user completes the registration process. After that, the administrator can revoke the user certificate. Explicit or Automatic Renewal of User certificates ensuring continuous User connectivity A user certificate of type PKCS12, can be renewed explicitly by the user or it can be set to be renewed automatically when it is about to expire. This renewal operation ensures that the user can continuously connect to the organizations network. The administrator can choose when to set the automatic revocation of the old user certificate.
Chapter 4 The Internal Certificate Authority (ICA) and the ICA Management Tool 101
Another added advantage is: Automatic renewal of SIC certificates ensuring continuous SIC connectivity SIC certificates are renewed automatically after 75% of the validity time of the certificate has passed. If, for example, the SIC certificate is valid for five years, 3.75 years after it was issued, a new certificate is created and downloaded automatically to the SIC entity. This automatic renewal ensures that the SIC connectivity of the module is continuous. The administrator can decide to revoke the old certificate automatically or after a set period of time. By default, the old certificate is revoked one week after the certificate renewal has taken place.
comments can be set to 2048 or 4096 bits Digital Signature and Key encipherment
KeyUsage
yes
All the attributes in Table 4-1 can be set in the ICA Management Tool
102
comments can be set to 2048 or 4096 bits Digital Signature and Key encipherment
KeyUsage
yes
ExtendedKey Usage
0 (no KeyUsage)
yes
All the attributes in Table 4-2 can be set in the ICA Management Tool. Note - If the gateway certificate is stored on a hardware token, the key size is configured in the Objects_5_0.C file using the dbedit utility, see Modifying the Key Size on page 105.
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 103
Comments can be set to 2048 or 4096 bits This DN is appended to the DN of the ICA depends on LDAP branch
DN of User certificates managed by the internal database DN of User certificates managed on an LDAP server KeyUsage
no
yes
yes
ExtendedKey Usage
0 (no KeyUsage)
yes
All the operations in Table 4-3 can be performed via the ICA Management Tool.
104
How is it done?
In SmartDashboard or in the dbedit utility: 1. Change the attribute ica_key_size to one of the following values: 1024, 2048 or 4096. 2. Run fwm sic_reset. 3. Run cpconfig and define the CA name in the Certificate Authority tab. 4. When you are done, click OK. 5. Run cpstart.
CRL Management
By default, the CRL is valid for one week. This value can be configured. Fresh CRLs are issued: when approximately 60% of the CRL validity period has passed immediately following the revocation of a certificate
It is possible to recreate a specified CRL via the ICA Management Tool. This acts as a recovery mechanism in the event that the CRL is deleted or corrupted. Moreover, an administrator can download a DER encoded version of the CRL using the ICA Management Tool.
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 105
CRL Modes
Until NG FP1, all revoked certificates appeared in the same CRL (this is referred to as CRL old mode). From NG FP2, the ICA is able to issue multiple CRLs (this is referred to as CRL new mode). The purpose of multiple CRLs is to eliminate any CRL from becoming larger than 10K. If the CRL exceeds 10K, IKE negotiations may fail when trying to establish VPN tunnels. Multiple CRLs are achieved by attributing every certificate which is issued to a specific CRL. If revoked, the serial number of the certificate appears in this specific CRL. The CRL Distribution Point (CRLDP) extension of the certificate contains the URL of the specific CRL, this ensures that the correct CRL is retrieved when the certificate is validated. It is possible to upgrade the pre NG FP2 ICA to work in the CRL new mode. This can be done using the ICA Management Tool provided there are no valid certificates with an empty CRLDP extension. Once a pre NG FP2 ICA has been upgraded, it is possible to revert to CRL old mode using the ICA Management Tool.
106
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 107
The Menu pane - select the operation to be performed from the menu pane. The Operations pane - the operation is configured and applied in this pane. From this window you can Manage Certificates - this window (Figure 4-1) is divided into search attributes configuration and bulk operation configuration Create Certificates - from this window you can create certificates. Configure the CA - this window contains the configuration parameters and enables the administrator to configure them. You can also view the CAs time, name, and the version and build number of the SmartCenter server. Manage CRLs - from this window you can download, publish, or recreate CRLs
The Search Results pane - the results of the applied operation are displayed in this pane. This window consists of a table with a list of searched certificates attributes.
The ICA Management Tool is operational from any browser on any platform. Using HTTPS it is possible to connect securely from the ICA Management Tool to the ICA provided that an administrator certificate is added to the browser. Note - The ICA Management Tool can connect to the ICA in clear, however for the sake of
security it is recommended to work encrypted in HTTPS.
108
The following are the types of operations that can be performed simultaneously: initiate user certificates revoke users certificates send mail to users remove expired certificates remove certificates for which the registration process was not completed
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 109
ICA Configuration
ICA Configuration
In This Section
Retrieving the ICA Certificate Management of SIC Certificates Management of Gateway VPN Certificates Management of User Certificates via SmartDashboard Invoking the ICA Management Tool Search for a Certificate Certificate Operations Using the ICA Management Tool Initializing Multiple Certificates Simultaneously CRL Operations CA Cleanup Configuring the CA page 110 page 111 page 111 page 113 page 113 page 114 page 116 page 119 page 120 page 120 page 121
110
ICA Configuration
2. In the Certificate Services window, you can download a CA certificate to your computer or in Windows you can install the CA certification path.
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 111
ICA Configuration
Figure 4-3
Certificates are created automatically when VPN-1 Pro or VPN-1 Net are specified.
112
ICA Configuration
[-p <ca_port>]
[-no_ssl]
on means to start the ICA Management Tool (by opening port 18265) off means to stop the ICA Management Tool (by closing port 18265) -p changes the port used to connect to the CA (if the default port is not being used) -no_ssl configures the server to use clear HTTP rather than HTTPS. -a "administrator DN" ... - sets the DNs of the administrators that will be allowed to use the ICA Management Tool -u "user DN" ... - sets the DNs of the users that will be allowed to use the ICA Management Tool. This option is intended for administrators with limited privileges.
Note - If cpca_client is run without -a or -u, the list of the allowed users and
administrators will not be changed and the server will be started/stopped with the previously allowed users/administrators.
2. In order to connect to the ICA, add the administrators certificate to the browsers certificate repository. 3. Open the ICA Management tool from the browser.
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 113
ICA Configuration
Open the browser and type the location: https://<Management_Host_Name>:18265 You will be requested to authenticate. Note - The ICA Management Tool should not be on the same subnet as the SmartCenter
server.
Initiating a Search
This is performed in the Create Certificates - Operations Pane. There are two search options, a basic search that includes only the user name, type, status and serial number fields, as well as an advanced search that includes all the search fields. The second option can only be performed by administrators with unlimited privileges.
Search Attributes
Basic Search Attributes
User name - the exact string which is user name. By default this field is empty. Type - a drop-down list with the following options: Any, SIC, Gateway, Internal User or LDAP user, where the default is Any. Status - a drop-down list with the following options: Any, Pending, Valid, Revoked, Expired or Renewed (superseded), where the default is Any. Serial Number - the serial number of the requested certificate. By default this field is empty.
114
ICA Configuration
Search statistics will be displayed in the status bar after every search is performed.
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 115
ICA Configuration
116
ICA Configuration
Mail to Selected - this operation sends mail for all selected pending certificates that include the authorization codes to the selected users. Messages to users that do not have an email defined will be sent to a default address that can be defined in the CA Configuration window (select Menu pane > Configure the CA). For more information, see Notifying Users about Certificate Initialization on page 108.
Initiating a Certificate
To initiate a certificate, proceed as follows: 1. In the Menu pane, select Create Certificates. 2. Select Initiate. 3. Enter a User Name or Full DN, or fill in the Form. 4. If you would like to enter expiration details for certificates or registration keys, click Advanced. Certificate Expiration Date: open the calendar to select a date or enter the date in the format dd-mmm-yyyy [hh:mm:ss]. The default is two years from now. Registration Key Expiration Date: open the calendar to select a date or enter the date in the format dd-mmm-yyyy [hh:mm:ss]. The default is two weeks from now.
5. Click Go. A registration key is created and displayed in the Results pane. 6. If desired, click Send mail to user to email the registration key. Note that the number of characters in the email is limited to 1900. 7. The certificate becomes usable upon supplying the proper registration key.
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 117
ICA Configuration
Generating a Certificate
To generate a certificate, proceed as follows: 1. In the Menu pane, select Create Certificates. 2. Select Generate. 3. Enter a User Name or Full DN, or fill in the Form. 4. If you would like to enter expiration details for certificates or registration keys, click Advanced. Certificate Expiration Date: open the calendar to select a date or enter the date in the format dd-mm-yyyy [hh:mm:ss]. The default is two years from now. Registration Key Expiration Date: open the calendar to select a date or enter the date in the format dd-mm-yyyy [hh:mm:ss]. The default is two weeks from now.
5. Enter a password. 6. Click Go. 7. Save the P12 file, and deliver it to the user.
118
ICA Configuration
If the line is otp_validity then the value at the next line is the Registration Key Expiration Date in seconds from now. Figure 4-4 Example of Output of an LDAP Search
not_after 86400 otp_validity 3600 uid=user_1,ou=People,o=intranet,dc=company,dc=com [email protected] <blank_line> uid=
For more information, see SmartDirectory (LDAP) and User Management on page 231.
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 119
ICA Configuration
<email address> space <DN> blank line as a separator <email address> space <DN>
CRL Operations
In the Menu pane, select Manage CRL and: 1. either: select Download and enter the number of the CRL that you would like to download, or select Publish to immediately renew the current CRL after changes have been made to the CRL database (this operation is performed automatically at an interval set by the CRL Duration attribute). select Recreate and enter the number of the CRL that you would like to recreate
2. Click Go.
CA Cleanup
On the Manage CRLs page, select Clean the CAs Database and CRLs from expired certificates. This operation gets rid of all expired certificates. Before performing this operation, make sure that the time set on the SmartCenter server is accurate.
120
ICA Configuration
Configuring the CA
In the Menu pane, select Configure the CA. The Configure the CA - Operations pane displays all the configurable fields of the CA. There are three possible operations that can be performed: Select Configure to save and enter the CA configuration settings. If the values are valid, the configured settings will take affect immediately. All non-valid strings will be changed to the default value. Select Reset to reset all values to the last configuration. Select Restore Default to revert the CA to its default configuration settings. Entering the string Default in one of the attributes will also reset it to the default after pressing Configure. Values that are valid will be changed as requested and others will change to default values.
CA Data Types
Edit the CA data by modifying the values displayed in the Configure the CA Operations Pane. The CA data types can be any of the following: Time - displayed in the format: <number> days <number> seconds. For example: CRL Duration: 7 days 0 seconds. When changing the attribute, it can be entered as <number> days <number> seconds or just as a single number of seconds. Integer - a regular integer, for example: SIC Key Size: 1024 Boolean - the values can be true or false (not case sensitive). for example: Enable renewal: true. String - for example: Management Tool DN prefix: cn=tests
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 121
ICA Configuration
The following attributes are listed in alphabetical order: Table 4-4 Attribute Authorization Code Length CRL Duration Enable Renewal
CA Attributes
Comment the number of characters of the authorization codes. the period of time for which the CRL is valid. For Users certificates. This is a Boolean value setting which stipulates whether to enable renewal or not. the amount of time the old certificate will remain in Renewed (superseded) state. the amount of time between sequential checks of the Renewed (superseded) list in order to revoke those whose duration has passed. the amount of time an IKE certificate will be valid. certificate purposes for describing the type of the extended key usage for IKE certificates. Refer to RFC 2459 certificate purposes for describing the certificate operations. Refer to RFC 2459
1 week
1 day
5 years
means no KeyUsag e
122
ICA Configuration
CA Attributes
Comment determines the prefix of a DN that will be created when entering a user name. determines the DN suffix of a DN that will be created when entering a user name. for security reasons the mail sending button after displaying a single certificate can be hidden. the SMTP server that will be used in order to send registration code mails. It has no default and must be configured in order for the mail sending option to work. the amount of time a registration code is valid when initiated using the Management Tool. the amount of time that a user certificate is valid when initiated using the Management Tool. when sending mails this is the email address that will appear in the from field. A report of the mail delivery status will be sent to this address. the email subject field.
Default CN=
ou=users
true or false
false
Management Tool Registration Key Validity Period Management Tool User Certificate Validity Period Management Tool Mail From Address
2 weeks
2 years
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 123
ICA Configuration
CA Attributes
Comment the text that appears in the body of the message. 3 variables can be used in addition to the text: $REG_KEY (users registration key); $EXPIRE (expiration time); $USER (users DN). when the send mail option is used, the emails to users that have no email address defined will be sent to this address. the maximum capacity of a CRL in the new CRL mode. a Boolean value describing the CRL mode. the number of certificates that will be displayed in each page of the search window. the number of digits of certificates serial numbers. this flag determines whether to revoke an old certificate after it has been renewed. The reason for not revoking this is to prevent the CRL from growing each time a certificate is renewed. If the certificate is not revoked the user may have two valid certificates
Values
Max Certificates Per Distribution Point New CRL Mode Number of certificates per search page Number of Digits for Serial Number Revoke renewed certificates
min-3 max-400 0 for old CRL mode 1 for new mode min-1 max-approx 700
400
true
124
ICA Configuration
CA Attributes
Default 1024
certificate purposes for describing the certificate operations. Refer to RFC 2459 The amount of time a SIC certificate will be valid. certificate purposes for describing the type of the extended key usage for User certificates. Refer to RFC 2459. the key size in bits of the user's certificates. Possible values are 1024 2048 4096 min-10 minutes max-20 years
1024
certificate purposes for describing the certificate operations. Refer to RFC 2459
Chapter 4
The Internal Certificate Authority (ICA) and the ICA Management Tool 125
ICA Configuration
126
5
page 128 page 129 page 141 page 143
127
You need different levels of tracking, depending on the datas importance. For example, while you may choose to track standard network patterns (e.g., your users surfing patterns), this information is not urgent and you can inspect it at your convenience. However, if your firewall is being attacked, you must be alerted immediately.
128
Tracking Overview
Check Point products provide you with the ability to collect comprehensive information on your network activity in the form of logs. You can then audit these logs at any given time, analyze your traffic patterns and troubleshoot networking and security issues. Figure 5-1 illustrates the log collection and tracking process: Figure 5-1 Log Collection and Tracking Process
Chapter 5
Tracking Overview
The SmartDashboard allows you to customize your tracking settings for each Rule Base, by specifying per-rule whether or not to track the events that match it. If you decide to track the events that match a certain rule, you can choose from a variety of tracking options, based on the informations urgency. For example, you can choose a standard Log for allowed http connections; opt for an Account log when you wish to save byte data; or issue an Alert (in addition to the log) when a connections destination is your firewall machine. For a list of the available tracking options, right-click the relevant rules Track column. The modules on which this Policy is installed collect data as specified in the Policy, and forward the logs to the SmartCenter Server (and/or to Log Servers, depending on their settings). The logs are organized in files according to the order in which they arrived to the SmartCenter Server. All new logs are saved to the fw.log file, except for audit (management-related) logs, which are saved to the fw.adtlog file. The SmartCenter Server makes these logs available for inspection via SmartView Tracker - a comprehensive auditing solution, enabling central management of both active and old logs of all Check Point products. You can conveniently customize searches to address your specific tracking needs; integrate the logs with Check Points Eventia Reporter; or export them to text files or to an external Oracle database. The SmartCenter Server also performs the operations specified in the Policy for events matching certain rules (e.g., issuing an alert, sending email, running a user-defined script etc.). In addition to the above solutions, you can benefit from the tracking and auditing capabilities of the following Check Point SmartConsole: SmartView Monitor allows you to manage, view and test the status of various Check Point components throughout the system, as well as to generate reports on traffic on interfaces, VPN-1 Pro and QoS modules, and other Check Point system counters. Eventia Reporter allows you to save consolidated records (as opposed to raw logs) and conveniently focus on events of interest.
130
SmartView Tracker
SmartView Tracker
Figure 5-2 displays the main window of SmartView Tracker. Each entry in the Records pane is a record of an event that was logged according to a specific rule in the Rule Base. New records that are added to the fw.log file are automatically added to the Records pane as well. To understand Figure 5-2 refer to the numbers in the figure and the following list. 1. The Log, Active and Audit modes display different types of logs. 2. The Query Tree pane displays the Predefined and Custom queries. 3. The Query Properties pane displays the properties of the fields in the Records pane. 4. The Records pane displays the fields of each record in the log file.
Chapter 5
SmartView Tracker
Figure 5-2
The log fields displayed are a function of the following factors: The product that generated the log (e.g., VPN-1 Pro, Check Point QoS) The type of operation performed (e.g., installation, opening a connection)
For example, when NAT is used, the address translation fields (with the Xlate prefix, e.g., XlateSrc, XlateDst etc.) are displayed. When VPN-1 Pro is used, IKE-related fields (e.g., IKE Cookiel, IKE CookieR etc.) are displayed.
132
SmartView Tracker
The following table gives a description of the different types of actions recorded by SmartView Tracker (Table 5-1). Table 5-1 Icon
Action icons
Action
Accept The connection was allowed to proceed. Reject The connection was blocked. Drop
Icon
Encrypt
Authcrypt
Chapter 5
Filtering
Filtering
SmartView Trackers filtering mechanism allows you to conveniently focus on log data of interest and hide other data, by defining the appropriate criteria per-log field. Once you have applied the filtering criteria, only entries matching the selected criteria are displayed. The filtering options available are a function of the log field in question. For example, while the Date field is filtered to show data that is after, before or in the range of the specified date, the Source, Destination and Origin fields are filtered to match (or differ from) the specified machines. Since it is very useful to filter the Product field and focus on a specific Check Point product, SmartView Tracker features these filters as predefined queries, described in the following section.
Queries
SmartView Tracker gives you control over the Log file information displayed. You can either display all records in the Log file, or filter the display to focus on a limited set of records matching one or more conditions you are interested in. This filtering is achieved by running a query. A query consists of the following components: Condition(s) applied to one or more log fields (record columns) for example, to investigate all HTTP requests arriving from a specific source, you can run a query specifying HTTP as the Service columns filter and the machine in question as the Source columns filter. A selection of the columns you wish to show for example, when investigating HTTP requests it is relevant to show the URL log field.
Each of the SmartDashboards three modes (Log, Active and Audit) has its own Query Tree, consisting of the following folders: Predefined, containing the default queries that cannot be directly modified or saved. The predefined queries available depend on the mode you are in. The default query of all three modes is All Records. In addition, the Log mode includes predefined per product or feature.
134
Matching Rule
Custom, allowing you to customize your own Query based on a predefined one, to better address your needs. Customized queries are the main querying tool, allowing you to pinpoint the data you are interested in. An existing query that is copied or saved under a new name is automatically added to the Custom folder.
The attributes of the selected query are displayed in the Query Properties pane.
Matching Rule
SmartView Tracker records the Security Rule Base rule to which a connection was matched. The matching rule is recorded in four columns in SmartView Tracker, as depicted in Figure 5-3: Figure 5-3 Recording the Matching Rule
The Rule column, which records the number of the rule in the Rule Base at the time the log entry was recorded. Like other properties in SmartView Tracker, logs can be sorted and queried by rule number. The Current Rule Number column, which is a dynamic field that reflects the current placement of the rule in the Rule Base and displays the current policy package name. As the Rule Base is typically subject to change, this column makes it possible to locate the rules that have changed their relative positions in the Rule Base since the log was recorded, and to create filters for log entries that match the rule, not just the rule number. By way of example, note the log entry in Figure 5-3. When this log was first recorded, it recorded the matching rule as Rule 1. Since then the rules position in the Rule Base has changed, and so the Current Rule Number column reports its present position as 2 [Standard], where [Standard] is the name of the policy package in which this rule resides. The Rule Name column, which records the short textual description of the rule in the Name column of the Rule Base, when in use. The Rule UID column, which records the unique identifying number (UID) that is generated for each rule at the time that it is created. This number serves an internal tracking function, and as such the column is hidden by default. To display this column, click on View > Query Properties and enable the Rule UID property. Note - SmartCenter supports UID rule numbers from NG with Application Intelligence R55
and later. However, in order to enable enforcement modules of versions R55 and R55W to include the UID field when forwarding logs, you must first install a policy generated by a NGX R61 SmartCenter Server to those enforcement modules.
Chapter 5
Matching Rule
These two operations are essentially short-cuts to creating a filter. You can achieve the same results by right clicking anywhere in a given column and selecting Edit Filter, and then entering the filtering criteria you want to apply. The Rule and Current Rule Number filters, which provide the same functionality as the Follow Rule and Follow Rule Number commands, can also create filtered views based on multiple matching rules. Figure 5-4 shows the Current Rule Number Filter. Figure 5-4 Current Rule Number Filter
For configuration information, see Configuring the Current Rule Number Filter on page 146.
136
Matching Rule
If you are using version control, SmartDashboard opens with the revision that was saved when this record was created. If no revision is available and the record was created after installing NG with Application Intelligence R55 (or later), SmartDashboard uses the unique identifying number to display the relevant rule. If neither version control nor a UID number are available, the View rule in SmartDashboard option is not available.
For detailed instructions, see Viewing the Logs of a Rule from the Rule Base on page 148.
Chapter 5
SmartView Tracker supports a basic export operation, in which the display is copied as-is into a text file. More advanced export operations (for example, exporting the whole log file or exporting log online) are performed using the command line (using the fwm logexport, log_export and fw log commands).
138
Local Logging
With the Export option (File > Export...) you can create a comma delimited ASCII file that can be used as input for other applications.
Local Logging
By default, modules forward their log records online to the SmartCenter Server. Alternatively, to improve the modules performance, you can free it from constantly sending logs by saving the information to local log files. These files can either be automatically forwarded to the SmartCenter Server or Log Server, according to a specified schedule; or manually imported through SmartView Tracker, using the Remote File Management operation. If you choose to use a local logging configuration, you need to manually configure the standard log maintenance settings (log switch, cyclic logging, etc.) on the module.
Chapter 5
Custom Commands
SmartView Tracker allows you to conveniently run commands from the SmartConsole, instead of working in the command line. The commands available by default are ping and whois. These commands, along with the ones you add manually, are available through the menu displayed by right-clicking a relevant cell in the Records pane.
140
Tracking Considerations
Tracking Considerations
Choosing which Rules to Track
The extent to which you can benefit from the events log depends on how well they represent the traffic patterns you are interested in. Therefore, you must ensure your Security Policy is indeed tracking all events you may later wish to study. On the other hand, you should keep in mind that tracking multiple events results in an inflated log file, which requires more disk space and management operations. To balance these conflicting needs, and determine which of your Policys rules should be tracked, consider how useful this information is to you. For example, consider whether this information: Improves your networks security Enhances your understanding of your users behavior Is the kind of data you wish to see in reports May be useful for future purposes
Chapter 5
142
Tracking Configuration
Tracking Configuration
In This Section
Basic Tracking Configuration SmartView Tracker View Options Configuring a Filter Configuring Queries Hiding and Showing the Query Tree Pane Working with the Query Properties Pane Modifying a Columns Properties Copying Log Record Data Viewing a Records Details Viewing a Rule Find by Interface Find by Interface Maintenance Local Logging Working with Log Servers Custom Commands Block Intruder Configuring Alert Commands page 143 page 144 page 146 page 149 page 151 page 151 page 152 page 153 page 153 page 154 page 154 page 154 page 155 page 156 page 157 page 159 page 160 page 161
Chapter 5
How... Choose View > Query Tree or Query Properties (respectively). Choose one of the following: In the Query Properties pane enter the appropriate number of characters in the Width column, or In the Records pane drag the columns right border while clicking on the left mouse button. Release when the column has reached its desired width. In the Query Properties pane drag the column up
or down to the desired position, or
Sorting columns
In the Records pane drag the header of the column left or right to the desired position.
Selecting (+) or (-), respectively. Double click the record in question in the Records pane.
144
Query Pane
The Query Tree pane is the area where the Log Files appear. The SmartView Tracker has a new and improved interface enabling you to open multiple windows. You can open more than one Log File simultaneously. You can also open more than one window of the same Log File. This may be helpful if you want to get different images of the same Log File. For example, you can open two windows of the same file and use different filtering criteria on each window. You can view both windows simultaneously and compare the different images. You can also resize each window so as to fit in as many windows as possible in the Query pane. The Query pane is divided into two sections: Query Properties pane shows all the attributes of the fields contained in the Records pane. Records pane displays the fields of each record in the Log File.
Resolving IP Addresses
Since the IP address resolution process consumes time and resources, SmartView Tracker allows you to choose whether or not to display source and destination host names in the Log file. Click the Resolve IP toolbar button to toggle between: Displaying the name of the host and the domain. Displaying the addresses in conventional IP dot notation.
Resolving Services
With the Resolving Services option you can control the display of the source and destination port in the Log File. Each port number is mapped to the type of service it uses. This option toggles between: Displaying the destination port number. Displaying the type of service the port uses. Note - If you clicked the Resolving Services button to display the type of service the port uses, and the port number appears, it means that a service has not been previously defined for this port. A port number can be mapped to a service either in the Objects database using the Object Manager or in the Services Configuration file. In SecurePlatform, the Services Configuration file name is called /etc/services
Chapter 5
Configuring a Filter
Configuring a Filter
To filter a log field and focus on data of interest: 1. Choose one of the following: Display the Query Properties pane (by selecting View > Query Properties) and right-click the desired log field in the Filter column, or In the Records pane, right-click the log field (e.g., the column) you wish to filter. The right-click menu is displayed. 2. Choose Edit Filter from the displayed menu. Each field displays a type-specific Filter window. Configure the window as desired and the log data will be displayed according to the filtering criteria used. 3. Click OK to apply the filter settings. Note - Filtering criteria takes effect only if the Apply Filter toolbar button is activated.
146
Add Source
With the Add Source option you can add a Source to the communication. Right-click the record with the value of interest in the Records pane and select one of the following Add Source commands: Add Source to Bypass indicates that connections from this source pass transparently through InterSpect. However, basic sanity tests on the packets are performed, and malformed packets are dropped. IP addresses can also be added to and removed from the bypass list via SmartDashboard. Add Source to Block indicates that connections from this source are not allowed. This Action isolates the zone from the rest of the network, and can be used when a zone is infected, or is under threat. IP addresses can also be added to and removed from the bypass list via SmartDashboard. Add Source to Quarantine means that the hosts or network of worm or attack victims at this source are blocked at the borders of the zone for a limited period of time, and quarantined users of a web browser are informed that they are blocked via a customized web page. IP addresses can also be added to and removed from quarantine via SmartDashboard. Also, the administrator can decide that if SmartDefense detects an attack, then the source of the attack will be put into quarantine.
Chapter 5
1. Right click on a rule in the No. column in SmartDashboard and select View rule logs in SmartView Tracker. SmartView Tracker opens with a filter applied to the Curr. Rule No. column to display only those logs that match on the selected rule. Copy rule ID
1. Right click on the rule in the No. column in SmartDashboard and select Copy rule ID. 2. In SmartView Tracker, click View > Query Properties and enable the Rule UID column. 3. Right click on the Rule UID column heading and choose Edit Filter. 4. Paste the UID in the Value field and click OK. A filter is applied to the Curr. Rule No. column to display only those logs that matched on the Rule UID.
148
Configuring Queries
Configuring Queries
In This Section
Opening An Existing Query Creating A Customized Entry Saving a Query Under a New Name Renaming a Customized Query Deleting a Customized Query page 149 page 150 page 150 page 150 page 151
New queries are created by customizing existing queries and saving them under new names. Proceed as follows: 1. Select an existing query in the Query Tree (either a predefined query or a custom query) and choose Query > Copy from the menu. A copy of the query, named New, is added to the Custom folder. 2. Rename the new query. 3. In the Query Properties pane, modify the query as desired by specifying the following for each relevant log field (column): Whether or not to Show the information available for that column. The Width of the column displaying the information. The Filter (conditions) applied to the column.
Chapter 5
Configuring Queries
Double-clicking the query you would like to open. The desired query appears in the Records pane.
150
Width Filter
Chapter 5
152
Chapter 5
Viewing a Rule
Viewing a Rule
You can view the rule that created the log. To view a rule 1. Open SmartDashboard. Click the Database Revision Control toolbar button. Click inside the Create new version upon Install Policy operation check box. Click Close. Install Policies in the SmartDashboard.
2. Go to SmartView Tracker. 3. Right-click on the desired record. 4. Select View Rule in SmartDashboard. The SmartDashboard is opened and the rule appears. Note - This process only works for logs that have a rule number and were created after the Create a new version upon Install Policy operation is selected. In addition, this option
is only available on a Management Station. It is not available on CLM (Customer Log Module)
Find by Interface
To find by interface add the specific Interface. You can find according to direction forward and back.
154
Maintenance
Maintenance
The following maintenance operation apply to all logging systems, whether the logs are forwarded to the SmartCenter Server (the default setting), sent to Log Servers or saved locally.
If you specify both options, the log switch is performed when the first criterion is met. 3. Click OK.
Chapter 5
Local Logging
Local Logging
To save logs to a local file (instead of forwarding them to the SmartCenter Server or to a Log Server): 1. In the SmartDashboard, double click the module in question to display its properties window. 2. In the Log Servers page (under the Logs and Masters branch), check Define Log Servers and then check Save logs locally, on this machine (VM). 3. You can either set a schedule for forwarding the local file to the appropriate machine (the SmartCenter Server or a Log Server), or manually import these files using SmartView Tracker. To specify a log file forwarding schedule: Display the Additional Logging Configuration page (under the Logs and Masters branch). In the Log forwarding settings section, set the following: - Check Forward log files to SmartCenter Server and choose the Log Server from the drop-down list.
156
- Set a Log forwarding schedule by choosing the appropriate time object from the drop-down list. To view the local file using SmartView Tracker: Select Tools > Remote Files Management... The Remote Files Management window is displayed, listing all Check Point
Gateways from which you can fetch Log files.
Select the desired Check Point Gateway and click Get File List. The Files on <Module Name> window is displayed, listing all Log files found on the selected Check Point Gateway. Select one or more files to be fetched.
Note - You cannot fetch an active Log File. If you want to fetch the current file, you must first perform a log switch. Click Fetch Files. The Files Fetch Progress window is displayed, showing the progress of the file transfer operation.
3. Install the Check Point Objects Database on the Log Server object:
Chapter 5
Choose Policy > Install Database... from the menu. The Install Database window is displayed. In the Install Database on list, check the Log Server object and click OK.
4. To setup the module to forward its logs to this Log Server, double click the module so that its properties window is displayed. 5. You can either forward the log records online, one by one; or save the records locally, and then forward them in a file according to a specific schedule. To forward log records online: Display the Log Servers page (under the Logs and Masters branch). Check Define Log Servers. Add this Log Server to the Always send logs to table (click Add... to display the Add Logging Servers window, and move the Log Server from the Available Log Servers list to the Select Log Servers list).
To specify a log file forwarding schedule: Display the Additional Logging Configuration page (under the Logs and Masters branch). In the Log forwarding settings section, set the following: - Check Forward log files to Management Server and choose the Log Server from the drop-down list. - Set a Log forwarding schedule by choosing the appropriate time object from the drop-down list. 6. By default, when the selected Log Server is unreachable, the logs are written to a local file. Alternatively, you can select a backup Log Server as follows: Display the Log Servers page (under the Logs and Masters branch). Under When a Log Server is unreachable, send logs to section, click Add...to display the Add Logging Servers window. Move the Log Server from the Available Log Servers list to the Select Log Servers list and click OK.
7. Repeat step 4 to step 6 on all relevant modules. 8. Launch SmartView Tracker and login to this Log Server (instead of the SmartCenter Server).
158
Custom Commands
Custom Commands
To configure the commands you can run through SmartView Tracker: 1. Choose Tools > Custom Commands... from the menu. The Custom Commands window is displayed. 2. Click Add... The Add New Command window is displayed. 3. Specify the following command properties: Menu Text, defines how this command is to be displayed in the right-click menu (e.g. Ping). Command, specifying the name of the command (e.g. ping.exe). Arguments to be used by the command. IP Columns only, allowing you to apply this command only to columns that have an IP address value (e.g. Origin, Source, Destination etc.).
Note - It is recommended not to use a full path name in the Executable field, since the executable file may be found in different directories of different SmartView Tracker clients. The administrator must ensure that the command can be executed from the SmartView Tracker installation directory. Commands requiring a full path can be executed by a script, which all administrators save in the same directory, but each administrator edits according to his or her needs. Example: 1. Use the Add New Command window to add the Menu Content TELNET, which runs the command TELNET using <Cell Value> as its Parameter. 2. In the Records pane, right click a record whose IP address is 20.13.5.2. and select telnet from the menu. The executed command is: telnet 20.13.5.2.
Chapter 5
Block Intruder
Block Intruder
SmartView Tracker allows you to terminate an active connection and block further connections from and to specific IP addresses. The Block Intruder feature only works on UDP and TCP connections. Proceed as follows: 1. Select the connection you wish to block by clicking it in the Active modes Records pane. 2. From the Tools menu, select Block Intruder. The Block Intruder window is displayed. 3. In Blocking Scope, select the connections that you would like to block: Block all connections with the same source, destination and service - block the selected connection or any other connection with the same service, source or destination. Block access from this source - block access from this source. Block all connections that are coming from the machine specified in the Source field. Block access to this destination - block access to this destination. Block all connections that are headed to the machine specified in the Destination field.
4. In Blocking Timeout, select one of the following: Indefinite blocks all further access For... minutes blocks all further access attempts for the specified number of minutes
5. In Force this blocking, select one of the following: Only on... blocks access attempts through the indicated VPN-1 Pro module. On any VPN-1 & FireWall-1 Module blocks access attempts through all VPN-1 Pro modules defined as gateways or hosts on the Log Server.
6. Click OK. To clear blocked connections from the display, choose Clear Blocking from the Tools menu.
160
Chapter 5
162
163
164
Versions can be created manually by the system administrator, or the system can be set to automatically create a new version every time Security Policy installation takes place.
Chapter 6
Version Operations
Version Operations
The following operations can be executed for version control:
Create a Version
A new version can be created manually by the system administrator, or the system can be set to create new versions automatically every time a new policy is installed. Each new version has the following attributes: the creation date the system administrator who initiated the new version the version of the software two editable options determined by the system administrator: the name of the version, as well as, an additional optional comment. Note - It is recommended to create a version before upgrading the system. This enables the
administrator to back out to a functioning environment in case of problems during the upgrade operation.
View a Version
A saved version can be viewed in SmartDashboard. For every saved version you can view certain entities such as objects, users, rules. Various operations, such as queries can be executed on these entities.
166
Version Upgrade
Before the revert operation is done, the system administrator can expect to receive a report on the expected outcome of the revert operation. For example, information certificates that are going to be revoked is supplied. At this point it is necessary for the system administrator to decide whether or not to continue with the revert operation. Of all the entities included in the reverted version, the user database is not automatically reverted. This is because the users database is extremely dynamic; users are added and deleted frequently. The user database is always changing regardless of the policy version. The system administrator can decide to revert to a selected Policy version, but to maintain the current users database. In this manner, the current user base is used with the restored Policy.
Delete a version
A previously saved version can be deleted. This operation will also delete the various databases included in the policy version.
Version Upgrade
When the SmartCenter Server is upgraded, the various versions are upgraded as well. This means that saved versions will be compliant with the upgraded software, and there will not be a need to downgrade to a previous software version in order to revert to a saved version. For example, new object attributes are added to comply with the new features.
Version Diagnostics
The success or failure of version operations that require modification of the Versions table (such as creating, reverting to or deleting a version) are audited in the audit log of the SmartView Tracker. It is recommended to make use of these logs to ensure that operations have taken place successfully. Saved versions require disk space. If the existing disk space is exhausted, a threshold alert is sent to the SmartView Monitor. Use this SmartConsole in order to make sure that you meet the disk space requirements needed to implement the versioning feature.
Chapter 6
168
In this window you can: Create a new version of the current policy manually by clicking Create. View a saved version by clicking View Version. Revert to a saved version by clicking Restore Version. View the properties of a selected version by clicking Properties. Certain of the version options are editable. Delete a selected version by clicking Delete.
Chapter 6
170
171
Introduction
Introduction
Together with SmartCenter, Integrity uses endpoint security to stop the newest worms, spyware, and hacker attacks that can take down LANs and disrupt business operations. Along with other Check Point products, Integrity provides Total Access Protection for the enterprise. The following document will attempt to explain the importance and significance of Integrity, how it is integrated in Check Point products and how Check Point and Integrity come together to provide a manageable solution for securing internal-network endpoint PCs.
172
With Proactive and Comprehensive Endpoint Security administrators can create security policies associated with specific programs and activities. As a result of Check Points endpoint security policy enforcement, administrators can enforce all areas of endpoint security, including network access privileges of all users, PCs and applications. This control prevents an unsecured or compromised PC from serving as an entry point for a worm or hacker attack. Another essential part of endpoint security is the ability to integrate with hundreds of network gateway products (from VPNs to routers, switches and wireless access points). Such cooperative enforcement requires that all endpoint PCs be in compliance, ensuring that all required patches, antivirus updates, registry keys, files, and applications are in place, before access is granted to the network.
Chapter 7
Integrity
Integrity
Integrity centrally manages desktop firewall security, intrusion prevention, outbound threat protection, and access policy enforcement. It ensures that every PC meets antivirus, patch, and other requirements before it connects to the network. Integrity features include: Firewall Rules - Achieves the same level of security as standard perimeter firewalls by restricting or allowing network activity based on connection information. Access Zones and Zone Rules - enables you to provide network security by enabling you to create groups of locations to which you assign the same network permissions. Program Control - Restricts network access on a per-application basis. SmartDefense Program Advisor Service - Automates application control management. Compliance Enforcement - Ensures that every endpoint computer meets antivirus, patch, and additional requirements before it connects to the network. Cooperative Enforcement - Restricts or disconnects noncompliant users at the Gateway and Switch level. Integrity Anti-Spyware Protects company data by detecting and removing spyware. IM Security Keeps instant messages private and secure.
For more information about these, and all the other features included in the Integrity System, see the Integrity Advanced Server Administrator Guide.
174
Chapter 7
Support Platforms
Figure 7-1
Support Platforms
The following platforms support Integrity Advanced Server: SecurePlatform Windows 2000 Server (SP4) and Advanced Server (SP4) Windows 2003 Server v. 5.2.3790 Linux ES v. 3.0 (Update 5)
For additional information Integrity Server or Integrity clients refer to the Integrity Advanced Server System Requirements document.
176
In terms of logging capabilities, Integrity behaves like a Check Point gateway. All Integrity server logs are sent to the Log Repository (that is, Log Server) specified in the Logs and Masters > Log Server tab of the Integrity object in SmartDashboard (refer to Figure 7-3 on page 189) from which SmartView Tracker and Eventia Reporter display the data.
Chapter 7
The default Log Repository is the SmartCenter machine. This means that all Integrity logs (including all cluster nodes) will by default be sent to the SmartCenter machine. If a user would like to send the logs to a different Log Server, he or she will have to specify the Log Server for each Integrity node separately. To learn how to configure an Integrity log server refer to Define a Log Server for Integrity Server Logs on page 188 If for some reason the Integrity machine fails to connect to the Log Server, the logs will be saved locally on the Integrity machine, and can later be sent to the Log Server by a manual or batch procedure.
Integrity administrators are created as follows: With cpconfig at the end of the installation process. With cpconfig only one administrator is created with Read-Write permissions. With SmartDashboard (see Create an Integrity Administrator on page 190). When creating an administrator with SmartDashboard it is possible to give No Access, Read, or Read-Write permissions. With Integrity. When an administrator is created with Integrity the administrator will only receive granular control over the policy. This type of administrator will only be given SmartCenter read or read/write permissions to the entire server. Such an administrator will not have access to SmartCenter. Note - SmartCenter administrators with read and read/write permissions can launch and
work with Integrity. However, such a SmartCenter administrator will not be able to create an Integrity administrator. An Integrity administrator can only be created after logging into the Integrity Server using the masteradmin login
178
Licenses
Licenses
In This Section
Installing and Managing Licenses Enforcing Licenses page 180 page 180
All Check Point products are licensed through the User Center web service. The User Center retains a set of user/customer accounts, to which products may be added. A licensed Integrity Servers certificate and license keys may be retrieved through the User Center as well. Customers will have to obtain licenses for Integrity Server features, such as Instant Messaging Security. Once obtained these licenses do not need to be renewed or changed. Licenses also have to be installed for the SmartDefense services such as Anti-Spyware Updates and Program Advisor. These licenses are valid for the purchased time period and have to be re-installed when renewed. In addition, Integrity Server controls the number of endpoints that Integrity Clients protect with the license installed on the server. SmartDefense Services have subscription licenses for endpoints and for proxy updates. For example, Anti-Spyware services will not obtain updates for program permissions or Spyware DATs from the proxy server unless a valid subscription license is present. In this particular example, the SmartDefense Anti-Spyware feature also requires a license to enable the feature that is separate from the subscription.
Chapter 7
The following are the two ways in which Licenses can be managed: Using cpconfig in the Integrity machine. Using SmartUpdate. Refer to the SmartUpdate chapter in the R61 SmartCenter User Guide.
Enforcing Licenses
All Integrity Client licenses are managed on the server. Once a feature is enabled on the server it is available to the Integrity Clients. Features on Integrity Clients are controlled by the deployed policy, allowing administrators control over who has what features. Licenses are generally enforced by disabling the Edit feature or access to the management of a feature on the server. Client functionality remains in the state it was when the server's license expired or invalidated. For example, if the update license for Anti-Spyware exceeds the expired clients, Anti-Spyware will continue to scan for Spyware according to the specified schedule in the enterprise policy, but the Integrity Server will not receive additional DAT updates and subsequently neither will the clients. For more information about enforcing Integrity licenses, see the Integrity Advanced Server Installation Guide and the Integrity Advanced Server Administrator Guide.
180
Installation
Installation
In This Section
Basic Configurations Installation Paths Install Uninstall page 181 page 182 page 183 page 184
Basic Configurations
Check Point supports three Integrity-NGX configurations with SmartCenter and two Integrity-NGX configurations with Provider-1: 1. Integrity Only - this configuration is intended for users who do not want to connect Integrity to SmartCenter and are interested in the Integrity product alone. 2. Integrity and Smart Center on the same machine - this configuration is intended for users who would like to benefit from both SmartCenter and Integrity on the same machine. This configuration is aimed at: (a) customers who are concerned about hardware costs and have a limited number of clients and very little SmartCenter traffic. (b) customers interested in evaluation purposes. 3. Integrity connected to a remote SmartCenter - this configuration is intended for users who would like to use both SmartCenter and Integrity, but on separate machines. This configuration is either: a robust system, since the load is divided between two machines. a secured system since SmartCenter should not be open to the public network (something that Integrity requires).
4. Integrity on the MDS machine (Provider-1) - this configuration is intended for users connected to one CMA. For example, similar to #2 above (that is, Integrity and SmartCenter on the same machine) where users are connected to a regular SmartCenter.
Chapter 7
Installation Paths
5. Integrity connected to a remote CMA on Provider-1 - this configuration is intended for users connected to both systems, but on separate machines. For example, similar to #3 above (that is, Integrity connected to a remote SmartCenter). For additional information about Provider-1, refer to the NGX R61 Provider-1 User Guide.
Installation Paths
Each of the above Basic Configurations on page 181 and a mixture of some of them are valid. In addition, it is valid to install additional Check Point products with Integrity. There are numerous combinations and options when it comes to installing Integrity. For this reason, the following list represents only a few of the common scenarios. Note - Installing additional products along with an Integrity Only configuration (see Basic
Configurations on page 181 #1) is not supported.
182
Install
Install
The Integrity server is always (except for Basic Configurations on page 181 #4 Provider-1 scenario) composed of the following three packages. 1. Integrity package. 2. SmartPortal package. 3. SmartCenter package The Integrity wrapper installs the right packages automatically. If you prefer to manually install the packages verify the following: When installing Integrity Only, SmartCenter should be configured as the Primary SmartCenter. When installing Integrity on the same machine as the SmartCenter, the SmartCenter should be installed as the Primary or Secondary management. When installing Integrity as a distributed configuration, SmartCenter should be configured as a Log Server. Every additional Integrity node should be treated as Integrity in a distributed mode (that is, SmartCenter should be configured as a Log Server). The UTC time for Integrity and SmartCenter machines should be the same in a distributed configuration. The Installation should not be interrupted and the packages should be installed in the order listed above. A reboot is required only after all the packages are successfully installed.
For additional information about installation refer to the Advanced Server Installation Guide.
Chapter 7
Uninstall
Uninstall
To completely uninstall Integrity and the packages associated with it manually uninstall the following three packages in the order they appear: 1. Integrity package. 2. SmartPortal package. 3. SmartCenter package. When Integrity is installed on the same machine as SmartCenter, it is possible to uninstall Integrity while leaving SmartCenter installed. But, you cannot unistall SmartCenter without uninstalling Integrity, since Integrity is dependent on SmartCenter services.
184
Configuration
Configuration
In This Section
Create an Integrity Object Define a Log Server for Integrity Server Logs Create an Integrity Administrator Open the Integrity Server Configuring VPN-1 Firewall to Allow Access to Integrity page 185 page 188 page 190 page 191 page 192
Chapter 7
Figure 7-2
2. In the Check Point Products list select Integrity Server. 3. Click OK. If your Integrity-NGX configuration with SmartCenter installation is Integrity connected to a remote SmartCenter create an Integrity object as follows: 1. Select SmartDashboard > Manage > Network Objects > New > Host to create a new Check Point network object. 2. In the General Properties window click the Communication button to initialize SIC. 3. In the Communication window that appears, enter the relevant information and click Initialize.
186
4. In the General Properties > Check Point Products select Integrity Server (refer to Check Point Gateway General Properties on page 186). 5. Click OK. Note - For Integrity clusters make sure you have an Integrity object that represents each cluster member.
Install Policy
1. Select Policy > Install.... 2. Select OK. The Install Policy window appears. 3. Select the targets on which the policy should be installed. 4. Select OK. The Install Process window appears. 5. Once the process is complete click Close.
Chapter 7
Install Database
1. Select Policy > Install Database.... The Install Database window appears. 2. Select the machine(s) on which you would like to install the database and click Ok. The Install Database script appears. 3. Click Close when the script is complete.
188
Figure 7-3
Log Servers
4. In Always send logs to: select/add the Log Server to which the Integrity Logs should be sent. 5. In the When a Log Server is unreachable, send logs to: select/add the alternative Log Server to which the Integrity Logs should be sent.
Chapter 7
2. In the General tab select New.... The Permissions Profiles Properties window appears. 3. Fill in the fields in the General tab and select the following Permissions tab.
190
Figure 7-5
Permissions
Chapter 7
In many cases Integrity Server is configured to work with external databases or authentication servers, in such a case the administrator should make sure to configure outbound rules to allow communication with the external databases and/or the authentication servers. The following is a list of the possible outbound servers: LDAP RADIUS ZSP: 443/tcp NetBIOS SQLServer Oracle DB2 NTP
In a SmartCenter Server and Integrity Server distributed configuration with a Firewall-1 module between them, the administrator should manually add an Access rule to the fw1_log service. This enables logs to be uploaded from the Integrity Server to the SmartCenter Server.
192
Troubleshooting
Troubleshooting
The Install Database menu does not contain the Integrity object.
Verify that the Integrity server has been activated. Refer to Create an Integrity Object on page 185 for additional information.
Verify that the Integrity server has been activated. Refer to Create an Integrity Object on page 185 for additional information. Refer to Add an Integrity Host/Gateway to the SmartDashboard Definitions on page 187 for additional information. Refer to Create an Integrity Administrator on page 190 for additional information.
Verify that the Integrity server has been activated. Refer to Create an Integrity Object on page 185 for additional information. Refer to Add an Integrity Host/Gateway to the SmartDashboard Definitions on page 187 for additional information. Refer to Define a Log Server for Integrity Server Logs on page 188 for additional information.
Chapter 7
Troubleshooting
194
Chapter SmartPortal
In This Chapter
Overview Deploying SmartPortal on a Dedicated Server Deploying SmartPortal on the SmartCenter Server SmartPortal Configuration and Commands Client Side Requirements Troubleshooting
8
page 196 page 197 page 198 page 199 page 201 page 202
195
Overview
Overview
SmartPortal enables web based administration and troubleshooting of the VPN-1 Pro SmartCenter Server. The SmartPortal product is included on the NGX R61 CD-ROM. The product can be deployed on a dedicated server, or along side the SmartCenter Server. SSL encrypted connections are used to access the SmartPortal web interface. Administrative access can be limited to specific IP addresses. Dedicated administrator users can be limited to SmartPortal access only.
196
3. Add access rules to allow administrative access to the SmartPortal Server. 4. Create administrator users with SmartPortal permissions if you want to restrict access to SmartPortal. Administrator users can be limited to SmartPortal access only using a Permission profile. Create a Permission profile, by selecting the Allow access SmartPortal only permission for the specific administrator.
Chapter 8
SmartPortal 197
198
ALL: ALL (to allow all IPs) ALL: x.x.x.x (to allow specific IPs) ALL: x.x.x.x/y.y.y.y (to allow specific networks where x.x.x.x is the IP address and y.y.y.y is the netmask)
Chapter 8
SmartPortal 199
SmartPortal Configuration
SmartPortal Configuration
The following SmartPortal product properties can be modified by editing the cp_httpd_admin.conf conf file. This file can be found in the SmartPortal conf directory. Note - Any modifications to the cp_httpd_admin.conf file should be done after performing SmartPortalStop. To change the web server port, modify the PORT attribute (default is TCP 4433). To use HTTP instead of HTTPS set the SSL attribute to 0. It is not recommended to do this for security reasons and should only be used when troubleshooting. To change the Web Server certificate modify the SERVCERT (the full path to the certificate) and CERTPWD (the certificate password) attributes.
200
SmartPortal requires that you enable JavaScript and disable Popup blockers in your browser.
Chapter 8
SmartPortal 201
Troubleshooting
Troubleshooting
The web demon (cpwmd) error log file is cpwmd.elg and can be found in the SmartPortal log (in Windows: C:\program files\CheckPoint\R60\SmartPortal\portal\log and in Solaris, Linux and SecurePlatform: /opt/CPportal-R60/portal/log) directory. The web server (cp_http_serve) error log file is cphttpd.elg and can be found in the SmartPortal log directory. To see debug cpwmd messages perform the following:
To see debug cpwmd messages with greater detail perform the following: To see additional cp_http_server debug messages you should stop the daemon using cpwd_admin stop -name CPHTTPD and perform the following: set the TDERROR_CPHTTPD_ALL environment variable to 5. set the OPSEC_DEBUG_LEVEL environment variable to 3. execute cp_http_server -v -f <full path to the cp_httpd_admin.conf file>.
To see CGI log messages of incoming and outgoing data, you should stop the cp_http_server daemon, set the CPWM_DEBUG environment variable to 1 and run cp_http_server. The output will be written to the cgi_log.txt and cgi_out.txt files in the temp directory (c:\temp on Windows and /tmp on Unix/Linux/SPLAT).
202
Chapter SmartUpdate
In This Chapter
The Need for Software Upgrade and License Management The SmartUpdate Solution Upgrading Packages Managing Licenses Generating CPInfo The SmartUpdate Command Line
9
page 204 page 205 page 211 page 219 page 228 page 229
203
204
Introducing SmartUpdate
SmartUpdate is an optional module for VPN-1 Pro that automatically distributes software applications and updates for Check Point and OPSEC Certified products, and manages product licenses. It provides a centralized means to guarantee that Internet security throughout the enterprise network is always up to date. SmartUpdate turns time-consuming tasks that could otherwise be performed only by experts into simple point and click operations. SmartUpdate extends your organizations ability to provide centralized policy management across enterprise-wide deployments. SmartUpdate can deliver automated software and license updates to hundreds of distributed security gateways from a single management console. SmartUpdate ensures security deployments are always up-to-date by enforcing the most current security software. This provides greater control and efficiency while dramatically decreasing maintenance costs of managing global security installations. SmartUpdate enables remote upgrade, installation and license management to be performed securely and easily. A system administrator can monitor and manage remote gateways from a central location, and decide whether there is a need for software upgrade, new installations and license modification. On a Check Point Gateway, it is possible to remotely upgrade: VPN-1 Pro enforcement modules Hotfixes, Hotfix Accumulators (HFAs) and patches Third party OPSEC applications VPN-1 Edge/Embedded Nokia Operating System SecurePlatform
Chapter 9
SmartUpdate 205
All operations that can be performed via SmartUpdate can also be done via the command line interface. See The SmartUpdate Command Line on page 229 for more information.
Understanding SmartUpdate
Figure 9-1
SmartUpdate Architecture
SmartUpdate installs two repositories on the SmartCenter Server: License Repository, which is stored on all platforms in the directory $FWDIR\conf\. Package Repository, which is stored: on Windows machines in C:\SUroot. on UNIX machines in /var/suroot.
The Package Repository requires a separate license, in addition to the license for the SmartCenter Server. This license should stipulate the number of nodes that can be managed in the Package Repository. Packages and licenses are loaded into these repositories from several sources:
206
the Download Center web site (packages) the Check Point CD (packages) the User Center (licenses) by importing a file (packages and licenses) by running the cplic command line
Of the many processes that run on the Check Point Gateways distributed across the corporate network, two in particular are used for SmartUpdate. Upgrade operations require the cprid daemon, and license operations use the cpd daemon. These processes listen and wait for the information to be summoned by the SmartCenter Server. From a remote location, an administrator logged into the SmartCenter Server initiates operations using the SmartUpdate tool. The SmartCenter Server makes contact with the Check Point Gateways via the processes that are running on these modules in order to execute the operations initiated by the system administrator (e.g., attach a license, or upload an upgrade). Information is taken from the repositories on the SmartCenter Server. For instance, if a new installation is being initiated, the information is retrieved from the Package Repository; if a new license is being attached to remote gateway, information is retrieved from the License Repository. This entire process is Secure Initial Communication (SIC) based, and therefore completely secure.
These tabs are divided into a tree structure that displays the packages installed and the licenses attached to each managed Check Point Gateway. The tree has three levels: Root level shows the name of the SmartCenter Server to which the GUI is connected.
Chapter 9
SmartUpdate 207
Second level shows the names of the Check Point Gateways configured in SmartDashboard. Third level shows the Check Point packages (in the Packages tab) or installed licenses (in the Licenses tab) on the Check Point Gateway.
Additionally, the following panes can be displayed: Package Repository - shows all the packages available for installation. To view this pane, select Packages > View Repository. License Repository - shows all licenses (attached or unattached). To view this pane, select Licenses > View Repository. Operation Status - shows past and current SmartUpdate operations. To view this pane, select Operations > View Status. In this pane you can read about: Operations performed (e.g., Installing package <X> on Check Point Gateway <Y>, or Attaching license <L> to Check Point Gateway <Y>.). The status of the operation being performed, throughout all the stages of its development (for instance, operation started, or a warning) A progress indicator. The time that the operation takes to complete.
208
Common Operations
Dragging and Dropping Sorting Expanding or Collapsing Modifying the Repository View Viewing Operation Details Searching for Text Printing Views page 209 page 209 page 209 page 209 page 210 page 210 page 210
Sorting
To sort in ascending or descending order, click the column title in the Licenses or Packages tab.
Expanding or Collapsing
To expand or collapse the Check Point Gateways tree structure, right-click on the tree root and choose Expand/Collapse.
Chapter 9
SmartUpdate 209
Printing Views
To print a view, select File > Print. The Choose Window is displayed. Select the window that you would like to print, e.g., Operation Status or License Repository. Optionally, you can adjust the print setup settings, or preview the output.
210
Upgrading Packages
Upgrading Packages
In This Section
Overview of Upgrading Packages The Upgrade Package Process Other Upgrade Operations page 211 page 212 page 217
Chapter 9
SmartUpdate 211
Upgrading Packages
212
Upgrading Packages
Download Center
1. Select Packages > New Package > Add from Download Center. 2. Accept the Software Subscription Download Agreement. 3. Enter your user credentials. 4. Select the packages to be downloaded. Use the Ctrl and Shift keys to select multiple files. You can also use the Filter to show just the packages you need. 5. Click Download to add the packages to the Package Repository.
User Center
Use this procedure for adding OPSEC packages and Hotfixes to the Package Repository. 1. Open a browser to the Download Center at: http://www.checkpoint.com/techsupport/downloads.jsp 2. Select the package you want to upgrade. 3. Enter your user credentials. 4. Accept the Software Subscription Download Agreement. 5. Choose the appropriate platform and package, and save the download to the local disk. 6. Select Packages > New Package > Import File 7. In the Add Package window, navigate to the desired .tgz file and click Open to add the packages to the Package Repository.
Chapter 9
SmartUpdate 213
Upgrading Packages
Check Point CD
1. Select Packages > New Package > Add from CD 2. Browse to the location of the CD drive, and click OK. The Add Package From CD window opens, showing the available packages on the CD. (If you wish to upload packages from a Check Point Comprehensive CD, select the CD-Rom drive as the path.) 3. Select the package(s) to be added to the Package Repository (Ctrl-select for more than one package), and click OK.
214
Upgrading Packages
3. If one or more of the required packages are missing from the Package Repository, the Download Packages window opens. Download the required package directly to the Package Repository. 4. Click Upgrade. The installation proceeds only if the upgrade packages for the selected packages are available in the Package Repository.
Proceed as follows: 1. In the Package Management window, click the Check Point Gateway you want to upgrade. 2. Select Packages > distribute.
Chapter 9
SmartUpdate 215
Upgrading Packages
3. From the distribute Packages window, select the package that you want to distribute. Use the Ctrl and Shift keys to select multiple packages, and then click distribute. The installation proceeds only if the upgrade packages selected are available in the Package Repository.
216
Upgrading Packages
Cancelling an Operation
You can halt the distribution (that is, installation) or upgrade while in progress. To cancel an operation: Select Status > Stop Operation.
At a certain point in any operation, the Stop Operation function becomes unavailable. If you decide you want to cancel after this point is reached, wait for the operation to complete, and then select Packages > Uninstall.
Chapter 9
SmartUpdate 217
Upgrading Packages
218
Managing Licenses
Managing Licenses
In This Section
Overview of Managing Licenses Licensing Terminology License Upgrade The License Attachment Process Other License Operations page 219 page 220 page 222 page 223 page 226
Chapter 9
SmartUpdate 219
Managing Licenses
Licensing Terminology
Add Licenses received from the User Center should first be added to the SmartUpdate License Repository. Adding a local license to the License Repository also attaches it to the gateway. Licenses can be conveniently imported to the License Repository via a file and they can be added manually by pasting or typing the license details. Attach Licenses are attached to a gateway via SmartUpdate. Attaching a license to a gateway involves installing the license on the remote gateway, and associating the license with the specific gateway in the License Repository. Central License A Central License is a license attached to the SmartCenter Server IP address, rather than the gateway IP address. The benefits of a Central License are: Only one IP address is needed for all licenses. A license can be taken from one gateway and given to another. The new license remains valid when changing the gateway IP address. There is no need to create and install a new license.
Certificate Key The Certificate Key is a string of 12 alphanumeric characters. The number is unique to each package. For an evaluation license your certificate key can be found inside the mini pack. For a permanent license you should receive your certificate key from your reseller.
CPLIC A command line for managing local licenses and local license operations. Refer to Local Licensing Commands in the NGX R61 SmartCenter User Guide for additional information.
Detach Detaching a license from a gateway involves uninstalling the license from the remote gateway and making the license in the License Repository available to any gateway.
State Licenses can be in one of the following states: Requires Upgrade, No NGX R61 License, Obsolete or Assigned.
220
Managing Licenses
The license state depends on whether the license is associated with the enforcement module in the License Repository, and whether the license is installed on the remote enforcement module. The license state definitions are as follows: Attached indicates that the license is associated with the enforcement module in the License Repository, and is installed on the remote enforcement module. Unattached indicates that the license is not associated with the enforcement module in the License Repository, and is not installed on any enforcement module. Requires Upgrade indicates an NG license that is installed on a NGX R61 machine, for which no replacement upgraded license exists. Assigned is a NGX R61 license that is associated with the enforcement module in the License Repository, but has not yet been installed on the module as a replacement for an existing NG license. No NGX license is an NG license that does not need a new license, or one for which the license upgrade failed. Obsolete license is a pre-NGX license for which a replacement NGX R61 license is installed on an NGX R61 enforcement module.
Upgrade Status is a field in the License Repository that contains an error message from the User Center when the Upgrade process fails. Get Locally installed licenses can be placed in the License Repository, in order to update the repository with all licenses across the installation. The Get operation is a two-way process that places all locally installed licenses in the License Repository and removes all locally deleted licenses from the License Repository.
License Expiration Licenses expire on a particular date, or never. After a license has expired, the functionality of the Check Point package may be impaired.
Local License A Local License is tied to the IP address of the specific gateway and can only be used with a gateway or a SmartCenter Server with the same address.
Multi-License File
Chapter 9
SmartUpdate 221
Managing Licenses
Licenses can be conveniently added to a gateway or a SmartCenter Server via a file, rather than by typing long text strings. Multi-license files contain more than one license, and can be downloaded from the User Center: https://usercenter.checkpoint.com/home2/index.jsp. Multi-license files are supported by the cplic put, and cplic add command-line commands. SKU/Features SKU stands for Stock Keeping Unit and is a character string that identifies an individual packages features.
License Upgrade
One of the many SmartUpdate features is to upgrade licenses that reside in the License Repository. SmartUpdate will take all the licenses in the License Repository and will attempt to upgrade them with the use of the Upgrade tool. For a full explanation on how to upgrade licenses refer to the Upgrading Licenses to NGX R61 chapter in the NGX R61 Upgrade Guide.
222
Managing Licenses
Attaching a license is a three step process. 1. Get real-time license data from the remote gateway. 2. Add the appropriate license to the License Repository. 3. Attach the license to the device. The following explains the process in detail.
Chapter 9
SmartUpdate 223
Managing Licenses
224
Managing Licenses
3. Select Licenses > New License > Add Manually. The Add Licenses window appears. 4. Enter the license details: If you copied the license to the clipboard, click Paste License. The fields will be populated with the license details. Alternatively, enter the license details from a hard-copy printout.
5. Click Calculate, and make sure the result matches the validation code received from the User Center. 6. You may assign a name to the license, if desired. If you leave the Name field empty, the license is assigned a name in the format SKU@ time date. 7. Click OK to complete the operation.
Attaching Licenses
After licenses have been added to the License Repository, select one or more licenses to attach to a Check Point Gateway. 1. Select the license(s). 2. Select Licenses > Attach. 3. From the Attach Licenses window, select the desired device. If the attach operation fails, the Local licenses are deleted from the Repository.
Chapter 9
SmartUpdate 225
Managing Licenses
Detaching Licenses
Detaching a license involves deleting a single Central license from a remote Check Point Gateway and marking it as unattached in the License Repository. This license is then available to be used by any Check Point Gateway. To detach a license, select Licenses > Detach and select the licenses to be detached from the displayed window. Note - Local licenses, prior to NGX R61, cannot be detached from a remote Check Point
Gateway.
226
Managing Licenses
Chapter 9
SmartUpdate 227
Generating CPInfo
Generating CPInfo
CPInfo is a support tool that gathers into one text file a wide range of data concerning the Check Point packages in your system. When speaking with a Check Point Technical Support Engineer, you may be asked to run CPInfo and transmit the data to the Support Center. To launch CPInfo, select Packages > Generate CPInfo. 1. Choose the directory to which you want to save the output file. 2. Choose between two methods to name the file: based on the SR number the technician assigns you, or a custom name that you define.
3. Optionally, you may choose to add: log files to the CPInfo output the registry to the CPInfo output
228
cppkg to work with the Packages Repository cprinstall to perform remote installations of packages cplic for license management
For details on how to use these commands, see the Command Line Interface (CLI) Guide.
Chapter 9
SmartUpdate 229
230
In This Chapter
The Need to Integrate LDAP servers with Check Point Software The Check Point Solution for Using LDAP servers SmartDirectory (LDAP) Considerations page 232 page 233 page 242
Configuring SmartDirectory (LDAP) Entities to Work with VPN-1 Pro page 243 SmartDirectory (LDAP) Reference Information page 254
231
232
Check Point products are compliant with LDAP technology. This compliancy enables: Users to be managed externally by an LDP server. The Enforcement modules to retrieve CRLs. User information from other applications gathered in the LDAP users database, to be shared by many different applications. VPN-1 Pro uses the user information for authentication purposes.
LDAP is an open industry standard that is used by multiple vendors. It is widely accepted as the directory access method of the Internet. One of the reasons that it is the obvious choice for so many vendors is because of its cross-platform compliancy, LDAP is automatically installed on different Operating Systems (e.g. the Microsoft Active Directory) and servers (such as Novell, Netscape etc.). When integrated with SmartCenter, LDAP is referred to as SmartDirectory (LDAP).
Chapter 10
In some cases perform bind operations for authentication purposes. Figure 10-1 Example SmartDirectory (LDAP) server Deployment with Check Point
Products as Clients
There are several SmartDirectory (LDAP) features that can be applied to further enhance VPN-1 Pro SmartDirectory (LDAP) functionality, these include: High Availability, where user information can be duplicated across several servers (SmartDirectory [LDAP] Replications), see Account Units and High Availability on page 236. Support of multiple SmartDirectory (LDAP) servers on which many user databases are distributed, see Working with Multiple SmartDirectory (LDAP) Servers on page 239. The use of encrypted or non-encrypted SmartDirectory (LDAP) Connections, the administrator must decide, for each SmartDirectory (LDAP) server specified in the Account Unit, whether the SmartDirectory (LDAP) connections are
234
Account Units
encrypted between the SmartDirectory (LDAP) server and VPN-1 Pro using SSL, or whether they are clear, i.e, not encrypted, see Define an Account Unit on page 244. Support of Multiple SmartDirectory (LDAP) Vendors by using Profiles, built in profiles are available for different supported platforms. These profiles can be selected and applied to an Account Unit. This enables the system to adapt to the specified SmartDirectory (LDAP) server and to recognize from which vendor it originated. To this end, all SmartDirectory (LDAP) servers specified on an Account Unit must be of the same vendor. When a given SmartDirectory (LDAP) server is queried, the VPN-1 Pro queries will be customized according to the selected profile. The default profiles can be modified, see SmartDirectory (LDAP) Profiles on page 240.
Account Units
An Account Unit is the interface which allows interaction between VPN-1 Pro and the SmartDirectory (LDAP) server(s). Each Account Unit represents one or more branches of the information maintained on the SmartDirectory (LDAP) server. An organization may have several Account Units, which represent the various SmartDirectory (LDAP) servers. In this case, the users in the system are split between the different Account Units, as well as between the different branches within the Account Unit. For instance, in a bank with one SmartDirectory (LDAP) server, one Account Unit may represent users with businesses accounts and another Account Unit may represent users with private accounts. Within the former, large business users may be defined in one branch and small business users may be defined on another branch. In order to work with SmartDirectory (LDAP) servers, the administrator needs to define the Account Unit(s) that represents the organization enter the access information required in order to connect to the relevant SmartDirectory (LDAP) server.
After this is done, the SmartCenter server or VPN-1 Pro modules can then connect to that SmartDirectory (LDAP) server in order to manage the users or to make queries.
Chapter 10
236
When SmartDirectory (LDAP) servers are queried for user information, they are queried according to their place in a set priority. Priority is defined on two levels: per gateway as well as per Account Unit. When per Gateway, the priority of the SmartDirectory (LDAP) servers is defined according to their proximity. The closest SmartDirectory (LDAP) server has the first priority. The furthest SmartDirectory (LDAP) server has the last priority. In the event that a specified Gateway does not have a set SmartDirectory (LDAP) server priority, the Account Unit has a default SmartDirectory (LDAP) server priority list. SmartDirectory (LDAP) servers with the same priority are queried in a round-robin manner for load-balancing purposes. If you have SmartDirectory (LDAP) server replications and you are using the SmartCenter Server to manage users, you need to select the SmartDirectory (LDAP) server to which the SmartCenter Server connects. The SmartCenter Server can work with one SmartDirectory (LDAP) server, all other replications must be properly synchronized with the SmartDirectory (LDAP) server
Backward Compatibility
Pre-NG FP3 VPN-1/FireWall-1 modules support only one SmartDirectory (LDAP) server per Account Unit. If your deployment includes pre-NG FP3 VPN-1/FireWall-1 modules you can specify which replication (out of all replications associated with a specific Account Unit) is to be used by these earlier modules.
Chapter 10
A SmartDirectory (LDAP) group is a user group which consists of members who are defined on a SmartDirectory (LDAP) server and not on the internal VPN-1 Pro database. For more information, see SmartDirectory (LDAP) Groups on page 249. The Gateway queries the SmartDirectory (LDAP) server in order to determine if the user belongs to a group that is permitted to perform certain operations, (for instance whether the user is allowed to open a VPN tunnel).
238
Chapter 10
To help the administrators successfully cope with diverse technical solutions, a new layer, SmartDirectory (LDAP) profiles, has been added that controls most of the SmartDirectory (LDAP) server-specific knowledge. The SmartDirectory (LDAP) profile is a configurable LDAP policy that allows administrators to define more precise SmartDirectory (LDAP) requests and enhance communication with the server.
240
Some of these categories list the same entry with different values. This is because the behavior differs depending on the type of operation.
Chapter 10
242
The first step for any of these objectives is to define an Account Unit. If you are implementing SmartDirectory (LDAP) user management, you will need to know which entities to define, and how to manage the users defined on the SmartDirectory (LDAP) server. SmartDirectory (LDAP) user management requires a special license.
In This Section
Define an Account Unit Working with SmartDirectory (LDAP) for CRL Retrieval Managing Users page 244 page 248 page 249
Authenticating with the SmartDirectory (LDAP) Server using Certificates page 251 Using SmartDirectory (LDAP) Queries page 252
Chapter 10
Select a profile to be applied to the new Account Unit. 2. In the Servers tab, display the SmartDirectory (LDAP) servers to be used by the Account Unit. The order in which they are displayed is also the default order in which they will be queried This priority can be defined per Gateway and in addition it can be defined on the Account Unit. You can add, remove and modify SmartDirectory (LDAP) servers from the displayed list. Additionally, for purposes of backwards compatibility, select a SmartDirectory (LDAP) server which is able to work with pre-NG FP3 VPN-1/FireWall-1 modules. Modifying the SmartDirectory (LDAP) server Double-click on a SmartDirectory (LDAP) server in the displayed list in order to modify it. The SmartDirectory (LDAP) server Properties window is displayed.
244
Configure the following tabs: In the General tab, you can modify the login DN of the SmartDirectory (LDAP) server. Define the priority of the selected SmartDirectory (LDAP) server. Specify a password to be used for authentication purposes. You will need to confirm this password. Finally, decide whether or not this SmartDirectory (LDAP) server is allowed to be queried. In the Encryption tab, define whether or not SmartDirectory (LDAP) connections are SSL encrypted. If the connections are encrypted, define the relevant encryption port. and the minimum and maximum encryption strengths. Finally, verify the SmartDirectory (LDAP) servers Fingerprints by comparing the displayed fingerprint, with the SmartDirectory (LDAP) Fingerprint. Authenticating Modules with certificates SmartDirectory (LDAP) connections can be authenticated by using client certificates that are supplied by a trust Certificate Authority (CA). To use certificates, the SmartDirectory (LDAP) server must be configured with SSL strong authentication. For more information, see Defining a new SmartDirectory (LDAP) Account Unit in the Objects Tree on page 248. 3. In the Objects Management tab, select the SmartDirectory (LDAP) server on which the objects are managed. The branches for the selected SmartDirectory (LDAP) server can be retrieved by selecting Fetch branches, or they can be added manually. Some versions of SmartDirectory (LDAP) do not support
Chapter 10
automatic branch retrieval using Fetch branches. These branches will be searched when this SmartDirectory (LDAP) server is queried. The administrator can add or modify the branches. For enhanced security, this Account Unit object can be locked with a password which must be entered when this Account Unit is accessed from SmartDashboard for managing users. 4. In the Authentication tab, the authentication limitations and default authentication settings for a user on an Account Unit are defined. The Allowed Authentication schemes limits the users authentication access only to those authentication schemes. You can allow several authentication schemes which can be applied per user, or you can apply a default authentication scheme which is applied to all the users. Users that are retrieved through this Account Unit, but which are missing authentication-related definitions, will be granted these definition using the default authentication scheme, or a complete user template. These default settings are useful, if the Check Point schema is not in place. In the place of the Check Point schema, a user template is used to supply the authentication attributes and the other options described on this page will by default be automatically configured per user. For all users in this Account Unit that are configured for IKE, the pre-shared secret for encryption purposes should be entered. The number of login attempts to a user can be set, as well as the number of seconds it takes for the users account to be unlocked, once it has been frozen.
246
3. Define a SmartDirectory (LDAP) Account Unit in the SmartDirectory (LDAP) Account Unit Properties window, see(Figure 10-7). Specify that the Account Unit is to be used for user management. Figure 10-5 Defining a new SmartDirectory (LDAP) Account Unit in the Objects Tree
Chapter 10
2. Define a SmartDirectory (LDAP) Account Unit in the SmartDirectory (LDAP) Account Unit Properties window, see(Figure 10-7). Specify that the Account Unit is to be used CRL retrieval. Figure 10-7 Defining a new SmartDirectory (LDAP) Account Unit in the Objects Tree
248
Managing Users
Managing Users
Users which are defined on the Account Unit are managed in the Users tab of the Objects Tree. This intuitive tree structure, enable users to be managed as if they were actually sitting on the internal VPN-1 Pro database. For instance, you can add, edit or delete users by right-clicking on them in the Objects Tree, and by selecting the option of your choice. Figure 10-8 Creating a new SmartDirectory (LDAP) User
Chapter 10
Managing Users
can include all users defined on the selected Account Unit as part of the SmartDirectory (LDAP) group, or only members of a specified branch, or only members of a specified group on the branch. For advanced treatment of the SmartDirectory (LDAP) group, a filter can be applied which allows for the use of additional SmartDirectory (LDAP) criteria. Only the users who match these criteria will be applied as group members.
If certain users in your enterprise have an e-mail address ending with us.org.com, you can define the US group by specifying the additional filter (mail=*us.org.com). Figure 10-9 Defining a new SmartDirectory (LDAP) Group in the Objects Tree
250
Managing Users
Chapter 10
Defining Queries
1. Select an attribute, an operator and a value for each query. These represent the component being queried, the condition of the query and the specific item.
252
For example, <mail, contains, Andy,> means that all mail that contains the value Andy should be found. The operators are explained in Table 10-1. Table 10-1 Operators - meaning of values Value
is is not starts with ends with contains equal or less than equal or greater than sounds like
Meaning The attributes value must be equal to the The attributes value is not equal to the The attributes value starts with the The attributes value ends with the The attributes value contains the
Value. Value. Value. Value.
The attributes value is greater than or equal to the The attributes value sounds like the
Value.
Note - The less than and greater than operators are supported by LDAP Version 3.0
and higher servers only.
2. There are several advanced methods which can be applied to enhance your queries. Click Advanced to see these options, which include: click Add each time you would like to filter by another criterion, after selecting the new attributes, operators and values. enter a free form SmartDirectory (LDAP) expression. See RFC 1558 for information about the syntax of SmartDirectory (LDAP) query expressions use the Boolean AND/OR conditions object types can selected in order to narrow the query. For instance, you can filter by users, groups and templates.
3. Click Find to run the query. When a query is executed, the SmartDirectory (LDAP) server queries the SmartDirectory (LDAP) directory, using a filter constructed from the query. For example, the query described in shown in Defining Queries on page 252 becomes the following filter:
filter:(&(|(objectclass=fw1person)(objectclass=person) (objectclass=organizationalPerson)(objectclass=inetOrgPerson)) (|(cn=Brad)(mail=*Andy*)))
Chapter 10
DC=qa, DC=checkpoint,DC=com CN=Configuration,DCROOT CN=Schema,CN=Configuration,DCROOT CN=System,DCROOT CN=Users,DCROOT CN=Builtin,DCROOT CN=Computers,DCOOT OU=Domain Controllers,DCROOT ...
254
Most of the user objects and group objects created by Windows 2000 tools are stored under the CN=Users, DCROOT branch, others under CN=Builtin, DCROOT branch, but these objects can be created under other branches as well. The branch CN=Schema, CN=Configuration, DCROOT contains all schema definitions. Check Point can take advantage of an existing Active Directory object as well as add new types. For users, the existing user can be used as is or be extended with fw1person as an auxiliary of User for full feature granularity. The existing Active Directory Group type is supported as is. A SmartDirectory (LDAP) template can be created by adding the fw1template objectclass. This information is downloaded to the directory using the schema_microsoft_ad.ldif file (see Adding New Attributes to the Active Directory on page 257). Performance The number of queries performed on the directory server is significantly low with Active Directory. This is achieved by having a different object relations model. The Active Directory group-related information is stored inside the user object. Therefore, when fetching the user object no additional query is necessary to assign the user with the group. The same is true for users and templates. Manageability SmartDashboard allows the creation and management of existing and new objects. However, some specific Active Directory fields are not enabled via SmartDashboard. Enforcement It is possible to work with the existing Active Directory objects without extending the schema. This is made possible by defining an Internal Template object and assigning it with the SmartDirectory (LDAP) Account Unit defined on the Active Directory server. For example, if you wish to enable all users with IKE+Hybrid based on the Active Directory passwords, create a new template with the IKE properties enabled and VPN-1 & FireWall-1 as the authentication method.
Chapter 10
Delegating Control
Delegating control over the directory to a specific user or group is important since by default the Administrator is not allowed to modify the schema or even manage directory objects through SmartDirectory (LDAP) protocol. To delegate control over the directory: 1. Display the Users and Computers Control console. 2. Right-click on the domain name displayed in the left pane and choose Delegate control from the right-click menu. The Delegation of Control wizard window is displayed. 3. Add an Administrator or another user from the System Administrators group to the list of users who can control the directory. 4. Reboot the machine.
256
dn:CN=fw1auth-method,CN=Schema,CN=Configuration,DC ROOT changetype: add adminDisplayName: fw1auth-method attributeID: 1.3.114.7.4.2.0.1 attributeSyntax: 2.5.5.4 cn: fw1auth-method distinguishedName: CN=fw1auth-method,CN=Schema,CN=Configuration,DCROO T instanceType: 4 isSingleValued: FALSE LDAPDisplayName: fw1auth-method name: fw1auth-method objectCategory: CN=Attribute-Schema,CN=ConfigurationCN=Schema,CN=C onfiguration,DCROOT ObjectClass: attributeSchema oMSyntax: 20 rangeLower: 1 rangeUpper: 256 showInAdvancedViewOnly: TRUE
All Check Point attributes can be added in a similar way. The definitions of all VPN-1 Pro attributes in LDIF format are contained in the schema_microsoft_ad.ldif file located in the $FWDIR/lib/ldap directory. Before attempting to run the ldapmodify command, edit schema_microsoft_ad.ldif and replace all instances of DCROOT with the specific domain root of your organization. For example if your domain is support.checkpoint.com, replace DCROOT with dc=support,dc=checkpoint,dc=com.
Chapter 10
After modifying the file, run the ldapmodify command to load the file into the directory. For example if you use the Administrator account of the dc=support,dc=checkpoint,dc=com domain the command syntax will be as follows:
Note - A shell script is available for UNIX gateways. The script is located at: $FWDIR/lib/ldap/update_schema_microsoft_ad.
258
Warning - This operation deletes objectclass definition from the schema and adds the updated one instead. It is recommended to backup the SmartDirectory (LDAP) server before this operation. You can use this file with the ldapmodify command line. On some server versions the delete objectclass operation may return with error although it was successful. You can run ldapmodify with -c (continuous) option.
Chapter 10
The OIDs for the proprietary attributes begin with the same prefix (1.3.114.7.4.2.0.X). Only the value of X is different for each attribute. See Attributes on page 260 for the value of X.
Attributes
cn
The entrys name. This is also referred to as Common Name. For users this can be different from the uid attribute, the name used to login to the VPN-1 Pro module. This attribute is also used to build the SmartDirectory (LDAP) entrys distinguished name, that is, it is the RDN of the DN.
uid
The users login name, that is, the name used to login to the VPN-1 Pro module. This attribute is passed to the external authentication system in all authentication methods except for Internal Password, and must be defined for all these authentication schemes. The login name is used by VPN-1 Pro to search the SmartDirectory (LDAP) server(s). For this reason, each user entry should have its own unique uid value. It is also possible to login to the VPN-1 Pro module using the full DN. The DN can be used when there is an ambiguity with this attribute or in Internal Password when this attribute may be missing. The DN can also be used when the same user (with the same uid) is defined in more than one Account Unit on different SmartDirectory (LDAP) servers.
260
Attributes
description
Descriptive text about the user.
default no value
mail
Users email address.
default no value
member
An entry can have zero or more values for this attribute. In a template: The DN of user entries using this template. DNs that are not users (object classes that are not one of: person, organizationalPerson, inetOrgPerson or fw1person) are ignored. In a group: The DN of user.
userPassword
Must be given if the authentication method (fw1auth-method) is Internal Password. The value can be hashed using crypt. In this case the syntax of this attribute is: {crypt}xxyyyyyyyyyyy where xx is the salt and yyyyyyyyyyy is the hashed password. It is possible (but not recommended) to store the password without hashing. However, if hashing is specified in the SmartDirectory (LDAP) server, you should not specify hashing here, in order to prevent the password from being hashed twice. You should also use SSL in this case, to prevent sending an unencrypted password. The VPN-1 Pro module never reads this attribute, though it does write it. Instead, the SmartDirectory (LDAP) bind operation is used to verify a password.
fw1auth-method
One of the following:
Chapter 10
Attributes
RADIUS, TACACS, SecurID, OS Password, Defender This default value for this attribute is overridden by Default Scheme in the Authentication tab of the Account Unit window in SmartDashboard. For example: a SmartDirectory (LDAP) server can contain SmartDirectory (LDAP) entries that are all of the object-class person even though the proprietary object-class fw1person was not added to the servers schema. If Default Scheme in SmartDashboard is Internal Password, all the users will be authenticated using the password stored in the userPassword attribute.
fw1auth-server
X in OID 1
fw1person fw1template
default undefined
The name of the server that will perform the authentication This field must be given if fw1auth-method is RADIUS or TACACS. For all other values of fw1auth-method, it is ignored. Its meaning is given below:
meaning name of a RADIUS server, a group of RADIUS servers, or Any name of a TACACS server
X in OID 2
fw1person
fw1template
fw1pwdLastMod
The date on which the password was last modified. The format is yyyymmdd (for example, 20 August 1998 is 19980820). A password can be modified through the VPN-1 Pro module as a part of the authentication process.
X in OID 3
fw1person
fw1template
default If no value is given, then the password has never been modified.
262
Attributes
fw1expiration-date
The last date on which the user can login to a VPN-1 Pro module, or no value if there is no expiration date. The format is yyyymmdd (for example, 20 August 1998 is 19980820). The default is no value.
X in OID 8
fw1person
fw1template
default no value
fw1hour-range-from
The time from which the user can login to a VPN-1 Pro module. The format is hh:mm (for example, 8:15 AM is 08:15).
X in OID 9
fw1person
fw1template
default 00:00
fw1hour-range-to
The time until which the user can login to a VPN-1 Pro module. The format is hh:mm (for example, 8:15 AM is 08:15).
X in OID 10
fw1person
fw1template
default 23:59
fw1day
The days on which the user can login to a VPN-1 Pro module. Can have the values SUN,MON,etc.
X in OID 11
fw1person
fw1template
Chapter 10
Attributes
fw1allowed-src
The names of one or more network objects from which the user can run a client, or Any to remove this limitation, or no value if there is no such client. The names should match the name of network objects defined in SmartCenter Server.
X in OID 12
fw1person
fw1template
default no value
fw1allowed-dst
The names of one or more network objects which the user can access, or Any to remove this limitation, or no value if there is no such network object. The names should match the name of network objects defined on the SmartCenter Server.
X in OID 13
fw1person
fw1templat e
default no value
fw1allowed-vlan
currently not used
X in OID 14
fw1person
fw1templat e
default no value
fw1SR-keym
The algorithm used to encrypt the session key in SecuRemote. Can be CLEAR, FWZ1, DES or Any.
X in OID 15
fw1person
fw1template
default Any
264
Attributes
fw1SR-datam
The algorithm used to encrypt the data in SecuRemote. Can be CLEAR, FWZ1, DES or Any.
X in OID 16
fw1person
fw1template
default Any
fw1SR-mdm
The algorithm used to sign the data in SecuRemote. Can be none or MD5.
X in OID 17
fw1person
fw1template
default none
fw1enc-fwz-expiration
The number of minutes after which a SecuRemote user must re-authenticate himself or herself to the VPN-1 Pro module.
X in OID 18
fw1person
fw1template
fw1sr-auth-track
The exception to generate on successful authentication via SecuRemote. Can be none, cryptlog or cryptalert.
X in OID 19
fw1person
fw1template
default none
Chapter 10
Attributes
fw1groupTemplate
This flag is used to resolve a problem related to group membership. The group membership of a user is stored in the group entries to which it belongs, in the user entry itself, or in both entries. Therefore there is no clear indication in the user entry if information from the template about group relationship should be used. If this flag is TRUE, then the user is taken to be a member of all the groups to which the template is a member. This is in addition to all the groups in which the user is directly a member.
X in OID 20
fw1person
fw1templat e
default False
fw1ISAKMP-EncMethod
The key encryption methods for SecuRemote users using IKE. This can be one or more of: DES, 3DES. A user using IKE (formerly known as ISAMP) may have both methods defined.
X in OID 21
fw1person
fw1template
fw1ISAKMP-AuthMethods
The allowed authentication methods for SecuRemote users using IKE, (formerly known as ISAMP). This can be one or more of: preshared, signatures.
X in OID 22
fw1person
fw1template
default signatures
266
Attributes
fw1ISAKMP-HashMethods
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can be one or more of: MD5, SHA1. A user using IKE must have both methods defined.
X in OID 23
fw1person
fw1template
fw1ISAKMP-Transform
The IPSec Transform method for SecuRemote users using IKE, (formerly known as ISAMP). This can be one of: AH, ESP.
X in OID 24
fw1person
fw1template
default ESP
fw1ISAKMP-DataIntegrityMethod
The data integrity method for SecuRemote users using IKE, (formerly known as ISAMP). This can be one of: MD5, SHA1.
X in OID 25
fw1person
fw1templat e
default SHA1
fw1ISAKMP-SharedSecret
The pre-shared secret for SecuRemote users using IKE, (formerly known as ISAMP). The value can be calculated using the fw ikecrypt command line.
X in OID 26
fw1person
fw1template
Chapter 10
Attributes
fw1ISAKMP-DataEncMethod
The data encryption method for SecuRemote users using IKE, (formerly known as ISAMP) .
X in OID 27
fw1person
fw1template
default DES
fw1enc-Methods
The encryption method allowed for SecuRemote users. This can be one or more of: FWZ, ISAKMP (meaning IKE).
X in OID 28
fw1person
fw1template
default FWZ
fw1userPwdPolicy
Defines when and by whom the password should and can be changed
X in OID 29
fw1person y
fw1badPwdCount
Number of allowed wrong passwords entered sequentially
X in OID 30
fw1person y
268
Schema Checking
fw1lastLoginFailure
Time of the last login failure
X in OID 31
fw1person 4
memberof template
DN of the template that the user is a member of.
X in OID 33
fw1person 4
Schema Checking
When schema checking is enabled, SmartDirectory (LDAP) requires that every object class and its associated attributes be defined in the directory schema. Before working with SmartDirectory (LDAP), schema checking should be disabled. Once the VPN-1 Pro object classes and attributes to the SmartDirectory (LDAP) servers schema, schema checking should be enabled.
Chapter 10
In This Section
Profile Attributes Fetch User Information Effectively by Modifying the Profile page 270 page 282
Profile Attributes
The attributes that are commonly configured by category are described.
UserLoginAttr
The unique username SmartDirectory (LDAP) attribute (uid). In addition, when fetching users by the username, this attribute is used for query.
Other
UserPasswordAttr
This user password SmartDirectory (LDAP) attribute.
Other
270
Profile Attributes
TemplateObjectClass
The object class for VPN-1 Pro SmartDirectory (LDAP) templates. If you change the default value with another objectclass, make sure to extend that objectclass schema definition with relevant attributes from fw1template.
default fw1template
Other
ExpirationDateAttr
The account expiration date SmartDirectory (LDAP) attribute. This could be a Check Point extended attribute or an existing attribute.
Other
ExpirationDateFormat
Expiration date format. This format will be applied to the value defined at ExpirationDateAttr.
Other
PsswdDateFormat
The format of the password modified date SmartDirectory (LDAP) attribute. This formation will be applied to the value defined at PsswdDateAttr
Other
Chapter 10
Profile Attributes
PsswdDateAttr
The password last modified date SmartDirectory (LDAP) attribute.
Other
BadPwdCountAttr
SmartDirectory (LDAP) attribute to store and read bad password authentication count.
default fw1BadPwdCount
Other
ClientSideCrypt
If 0, the sent password will not be encrypted. If 1, the sent password will be encrypted with the algorithm specified in the DefaultCryptAlgorithm.
default 0 for most servers 1 for Netscape_DS if not using encrypted password, SSL is recommended
Other
DefaultCryptAlgorith
The algorithm used to encrypt a password before updating the SmartDirectory (LDAP) server with a new password.
Other
272
Profile Attributes
CryptedPasswordPrefix
The text to prefix to the encrypted password when updating the SmartDirectory (LDAP) server with a modified password.
Other
PhoneNumberAttr
SmartDirectory (LDAP) attribute to store and read the user phone number.
default internationalisednumber
Other
AttributesTranslationMap
General purpose attribute translation map, to resolve problems related to peculiarities of different server types. For example, an X.500 server does not allow the "-" character in an attribute name. To enable the Check Point attributes containing "-", specify a translation entry: (e.g., "fw1-expiration =fw1expiration").
default none
Other
Chapter 10
Profile Attributes
ListOfAttrsToAvoid
All attribute names listed here will be removed from the default list of attributes included in read/write operations. This is most useful in cases where these attributes are not supported by the SmartDirectory (LDAP) server schema, which might fail the entire operation. This is especially relevant when the SmartDirectory (LDAP) server schema is not extended with the Check Point schema extension.
Default There are no values by default. In case the SmartDirectory (LDAP) server was not extended by the Check Point schema, the best thing to do is to list here all the new Check Point schema attributes
Other
BranchObjectClass
Use this attribute to define which type of objects (objectclass) is queried when the object tree branches are displayed after the Account Unit is opened in SmartDashboard.
Default Organization OrganizationalUnit Domain (most servers) Container (extra for Microsoft_AD)
Other
BranchOCOperator
If One is set, an ORed query will be sent and every object that matches the criteria will be displayed as a branch. If All, an ANDed query will be sent and only objects of all types will be displayed.
Default One
Other
274
Profile Attributes
OrganizationObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new object type specified here should also be in BranchObjectClass.
Default organization
Other
OrgUnitObjectClass
This attribute defines what objects should be displayed with an organization object icon. A new object type specified here should also be in BranchObjectClass.
Other
DomainObjectClass
This attribute defines what objects should be displayed with a Domain object icon. A new object type specified here should also be in BranchObjectClass.
Default Domain
Other
Chapter 10
Profile Attributes
UserObjectClass
This attribute defines what objects should be read as user objects. The user icon will be displayed on the tree for object types specified here.
Default User (in Microsoft_AD) Person OrganizationalPerson InertOrgPerson FW1 Person (most servers)
Other
UserOCOperator
If one is set, an ORed query will be sent and every object that matches one of the types will be displayed as a user. If all and ANDed query will be sent and only objects of all types will be displayed.
Default One
Other
GroupObjectClass
This attribute defines what objects should be read as groups. The group icon will be displayed on the tree for objects of types specified here.
Other
276
Profile Attributes
GroupOCOperator
If one is set an ORed query will be sent and every object that matches one of the types will be displayed as a user. If all an ANDed query will be sent and only objects of all types will be displayed.
Other
Defines the relationship Mode between the group and its members (user or template objects) when reading group membership.
Default Member mode defines the member DN in the Group object (most servers) MemberOf mode defines the group DN in the member object (in Microsoft_AD) Both mode defines both the member DN in the Group object and the group DN in the Member object.
Other
UserMembershipAttr
Defines what SmartDirectory (LDAP) attribute to use when reading group membership from the user or template object if GroupMembership mode is MemberOf or Both you may be required to extend the user/template object schema in order to use this attribute.
Default MemberOf
Other
Chapter 10
Profile Attributes
TemplateMembership
Defines the user to template membership mode when reading user template membership information.
Default Member mode defines the member DN in the Group object (most servers) MemberOf mode defines the group DN in the member object (in Microsoft_AD)
Other
TemplateMembershipAttr
Defines which attribute to use when reading the User members from the template object, as User DNs, if the TemplateMembership mode is Member.
Default member
Other
UserTemplateMembershipAttr
Defines which attribute to use when reading from the User object the template DN associated with the user, if the TemplateMembership mode is MemberOf.
Default member
Other
OrganizationRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when creating a new organization via SmartDashboard.
Default o
Other
278
Profile Attributes
OrgUnitRDN
This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when creating a new organizationalUnit via SmartDashboard
Default ou
Other
UserRDN This value will be used as the attribute name in the Relatively Distinguished Name (RDN) when creating a new User object via SmartDashboard.
Default cn
Other
GroupRDN
This value will be used as the attribute name for the RDN when creating a new Group object via SmartDashboard.
Default cn
Other
DomainRDN
This value will be used as the attribute name for the RDN when creating a new Domain object via SmartDashboard.
Default dc
Other
Chapter 10
Profile Attributes
AutomaticAttrs
This field is relevant when creating objects in SmartDashboard. The format of this field is Objectclass:name:value meaning that if the object being created is of type ObjectClass then additional attributes will be included in the created object with name name and value value.
Default user:userAccountControl:66048 For Microsoft_AD This means that when a user object is created an extra attribute is included automatically: userAccountControl with the value 66048
Other
GroupObjectClass
This field is used when modifying an existing group in SmartDashboard. The format of this field is ObjectClass:memberattr meaning that for each group objectclass there is a group membership attribute mapping. List here all the possible mappings for this SmartDirectory (LDAP) server profile. When a group is modified, based on the groups objectclass the right group membership mapping will be used.
Other
OrgUnitObjectClass
This determines which ObjectClass to use when creating/modifying an OrganizationalUnit object. These values can be different from the read counterpart.
Default OrganizationalUnit
Other
280
Profile Attributes
OrganizationObjectClass
This determines which ObjectClass to use when creating and/or modifying an Organization object. These values can be different from the read counterpart.
Default Organization
Other
UserObjectClass
This determines which ObjectClass to use when creating and/or modifying a user object. These values can be different from the read counterpart.
Default User (in Microsoft_AD) person organizationalPerson inetOrgPerson fw1Person (All other servers)
Other
DomainObjectClass
Determines which ObjectClass to use when creating and/or modifying a domain context object. These values can be different from the read counterpart.
Default Domain
Other
Chapter 10
The most effective mode is the MemberOf and Both modes where users groups membership information is available on the user itself and no additional SmartDirectory (LDAP) queries are necessary.
After successfully converting the database, set the SmartDirectory (LDAP) server profile in objects_5_0.C to the proper membership setting and start VPN-1 Pro. Make sure to install policy/user database on all gateways to enable the new configuration.
282
283
284
Chapter 11
In a Management High Availability deployment the first installed SmartCenter Server is specified as the Primary SmartCenter Server. This is a regular SmartCenter Server used by the system administrator to manage the Security Policy. When any subsequent SmartCenter Server is installed, these must be specified as Secondary SmartCenter Servers. Once the Secondary SmartCenter Server has been installed and manually synchronized, the distinctions between Primary versus Secondary is no longer significant. These servers are now referred to according to their role in the Management High Availability scenario as Active or Standby, where any SmartCenter Server can function as the Active SCS.
It is possible to install an Enforcement module on any of the SmartCenter Servers. The role of these Enforcement modules is to protect the SmartCenter Servers. Although the SmartCenter Servers backup one another, High Availability is not implemented between the Enforcement modules installed on SmartCenter Servers.
286
the latest installed Security Policy. The installed Security Policy is the applied Security Policy. The modules must be able to fetch the latest Security Policy from either the Active or the Standby SCS. Note - Previous versions of the Database, SmartMap data, as well as View Installed Policy
data are not synchronized.
Chapter 11
Synchronization Modes
Synchronization Modes
There are two ways to perform synchronization: manual synchronization is a process initialized by the system administrator. It can be set to synchronize databases, or databases as well as the installed Security Policy.
The former option synchronizes quicker than the latter option. It should be the preferred mode of synchronization provided that the system administrator has edited the objects or the Security Policy, but has not installed the newly edited Security Policy since the previous synchronization. automatic synchronization is a process configured by the system administrator to allow the Standby SCSs to be synchronized with the Active SCSs at set intervals of time. This is generally the preferred mode of synchronization, since it keeps the Standby SCSs updated. The basis for the synchronization schedule is that when the Security Policy is installed, both the installed Security Policy and all the databases are synchronized. Additionally, it is possible to synchronize the Standby SCSs when: the system administrator saves the Security Policy at a specified scheduled time
Even when automatic synchronization has been selected as the synchronization mode, it is possible to perform a manual synchronization.
288
Synchronization Status
Synchronization Status
The synchronization status indicates the status of the peer SCSs in relation to that of the selected SmartCenter Server. This status can be viewed in the Management High Availability Servers window or in SmartView Monitor, whether you are connected to the Active or Standby SCS. Figure 11-2 A typical Management High Availability scenario
The possible synchronization statuses are: Never been synchronized - immediately after the Secondary SmartCenter has been installed, it has not yet undergone the first manual synchronization that brings it up to date with the Primary SmartCenter. Synchronized - the peer is properly synchronized and has the same database information and installed Security Policy Lagging - the peer SCS has not been synchronized properly. For instance, on account of the fact that the Active SCS has undergone changes since the previous synchronization (objects have been edited, or a the Security Policy has been newly installed), the information on the Standby SCS is lagging. Advanced - the peer SCS is more up-to-date. For instance, in Figure 11-2 if a system administrators logs into SmartCenter Server B before it has been synchronized with the SmartCenter Server A, the status of the SmartCenter Server A is Advanced, since it contains more up-to-date information which the former does not have. In this case, manual synchronization must be initiated by the system administrator by changing the Active SCS to a Standby SCS, perform a synch me operation from the more advanced server to the Standby SCS. Change the Standby SCS to the Active SCS. Collision - the Active SCS and its peer have different installed policies and databases. The administrator must perform manual synchronization and decide which of the SCSs to overwrite.
Chapter 11
Synchronization Status
For instance, in Figure 11-2 when SmartCenter Server A fails before a synchronization takes place, the changes made (to databases or to the Security Policy) cannot be synchronized with SmartCenter Server B. When SmartCenter Server B takes over from SmartCenter Server A, the system administrator may decide to modify the Security Policy. In this case, both SmartCenter Server A and B have some information which is not synchronized with its peer. In order to remedy the collision state, one of the SmartCenter Servers will need to be overwritten. The SmartCenter Server which is found to have the dominant or significant changes should be the SmartCenter Server on which manual synchronization is initiated. At this point the system administrator needs to decide which of the SmartCenter Servers should become the Standby SCS, and change its status, if necessary. Note - Changes made by the CA, such as the issuance of certificates, could lead to
breaches of security if they are overwritten; therefore, any CA changes that are made are merged in order to eliminate security issues.
290
Synchronization Diagnostics
The status of all SmartCenter Servers can be viewed in the Management High Availability Servers window in SmartDashboard or via SmartView Monitor. Audit Logs can be used to view and track management operations as well as Synchronization operations in the SmartView Tracker.
Chapter 11
Synchronization Diagnostics
Collision between the SmartCenter Servers, in this case the system administrator should perform a manual synchronization and decide which database is the dominant database. The CA is always merged in order to eliminate security issues. When a collision occurs and one of the SmartCenter Servers is overwritten, it is very useful to follow management operations performed on the overwritten SmartCenter Server in the audit logs of the SmartView Tracker. In this manner it is possible to track and redo these operations, where necessary, on the dominant SmartCenter Server.
292
Chapter 11
294
Select Manage > Network Objects > Check Point > New > Host
In the displayed window, select as follows: Check Secondary Management Station in the Check Point Products list box, in the Secondary Management network objectss window. This automatically selects the Log Server as well.
Note - In order for the Secondary SmartCenter Server to act as a Log Server when the Primary SmartCenter Server becomes unavailable additional steps must be performed. Access the Enforcement Module network object(s) properties window and select Logs and Masters > Log Servers. Add the Secondary SmartCenter Server to the When a Log Server is unreachable, send log to list. Initialize SIC between the Secondary SmartCenter and the Active SCS by selecting Communication.
3. If there is an Enforcement module installed on the SmartCenter Server, install the Security Policy on the module before performing manual synchronization. 4. Manually synchronize the Secondary SmartCenter with the Active SCS. by selecting Policy > Management High Availability and select Synchronize
Chapter 11 Management High Availability 295
296
Chapter 11
The manner in which the Standby SCSs synchronize with the Active SCS, is defined in the Global Properties - Management High Availability window. This window is displayed by select Policy > Global Properties > Management High Availability. The Standby SCS can be synchronized automatically when the policy is installed, saved or on a specified scheduled event. Alternatively, the Standby SCS can be synchronized manually. If manual synchronization is the method of choice, the system administrator will need to initiate the manual synchronization in the Management High Availability Servers window. For more information, see Synchronization Modes on page 288.
298
Chapter 11
300
12
301
302
In the standard client-server relationship, the network SNMP Management Station is the client and the SNMP agent within the Check Point product acts as the server.
Chapter 12
For Check Point, the root of the registered Object Identifier (OID) is 1.3.6.1.4.1.2620. The notation is: Check point OBJECT IDENTIFIER:: ={enterprises 2620}. For example, the MIB on the management station resolves a string such as 1.3.6.1.4.1.2640.1.1 to: iso.org.dod.internet.private.enterprises.checkpoint.products.fw. The object definitions for VPN-1 Pro are located in the Check Point MIB. The Check Point MIB can be read by any third party SNMP Management Station once the MIB has been imported.
2. Provides name resolution, resolving the OID integer string to a user-friendly name. For example, if an administrator wants to know the version number of a particular firewall, the administrator selects version number as the property of the managed device and the MIB maps version number to an integer string before sending the information request to the agent. Note - The SNMP management station can read but not modify the object definitions for
Check Point products.
304
SNMP Traps
While VPN-1 Pro has Alert as one of its tracking types, you might prefer to receive alert messages through your regular SNMP Management Station in the form of an SNMP trap. An SNMP trap is notification that a certain event has occurred. VPN-1 Pro offers SNMP traps as one of its tracking types. When the conditions of the trap are met, the Enforcement module sends a log to SmartCenter Server. SmartCenter Server saves the log and sends (via port 162) an SNMP trap to the configured catcherthe SNMP Network Management station. The trap includes the text of the log file. If any machine outside of the organization tries to make a http connection to a machine within the internal network, the packet is dropped and an SNMP trap is sent:
Source Any
Destination Internal_private_network
VPN Any
Service HTTP
Action Drop
Track Log
Chapter 12
306
Do this only on Enforcement Points through which the SNMP packets need to pass. Figure 12-2 Allowing SNMP packets through Enforcement Points
This policy rule allows the SNMP Management Station to communicate with VPN-1 Pro. 4. Install the new Security Policy.
Chapter 12
In Figure 12-3, Alaska is configured as the SNMP trap catcher. 4. For the relevant rules in the Security Policy Rule Base, set the tracking type to snmp_trap.
308
5. If SmartCenter Server and the SNMP Management Station do not reside on the same network segment, open port 162 on all Enforcement Points between them. This will allow SNMP traps to pass through. Figure 12-4 Allowing SNMP traps through Enforcement Points
Chapter 12
310
Chapter FAQ
In This Chapter
Network Objects Management Policy Management
13
page 312 page 313
311
312
Policy Management
Policy Management
How can I open or save a specific Policy? All Policy operations (opening, saving etc.) are performed at the Policy Package-level (as opposed to the single policy-level). For detailed instructions, please refer to Chapter 2, Policy Management. Why are some Rule Base tabs missing when I open a Policy Package? Policy Packages may include one or more of the following policies: - a Security and Address Translation Policy, consisting of the Security, Address Translation and VPN Manager Rule. - a QoS Policy, displayed in the QoS Rule Base. - a Desktop Security Policy, displayed in the Desktop Security Rule Base. - The Web Access Rule Bases is The Rule Bases you see correspond to the Policies included in this specific Policy Package. After upgrading all of my products, why does the SmartDashboard show only the Security Rue Base? The Policy Package you are currently displaying contains only the Security and Address Translation Policies, so the QoS and Desktop Security Policies are not displayed. For more details, please refer to Chapter 2, Policy Management. How can I locate duplicate IP addresses? Select Search > Query Network Objects... from the SmartDashboard menu and choose Duplicates from the Refine by drop-down list. The port I need to use is occupied. How can I find the corresponding service? Display the Object Trees Services tab and then sort the Objects List by its Port column.
Chapter 13
FAQ 313
Policy Management
314
14
315
316
Chapter 14
SmartUpdate Upgrade
SmartUpdate Upgrade
Upgrade SmartUpdate version 4.1 Check Point Gateways
Add the following rule in SmartDashboard: Any/Any/Any/FW1_CPRID/Accept.
318
A
page 320 page 322
319
Introduction to Objects
Introduction to Objects
Network Objects are created in order to represent actual physical machines and components such as Gateway, Servers, as well as logical components such as IP Address Ranges and Dynamic Objects. Objects are created and managed by the system administrator via SmartDashboard. All objects are managed using SmartDashboard; therefore, it is recommended that the objects database must not be accessed or edited directly. In this appendix you will find general information about network objects, including configuration specifications, where necessary.
320
When an objects is created it is allocated an iconic representation that can be viewed and applied from any of the following locations: Objects Tree is the Objects manager from which objects are created, viewed and managed. To make sure that all network objects folders are displayed, right-click on the Network Objects root, and uncheck Do not show empty folders. Objects List is the view from which detailed information about specific objects categories is displayed (such as all the available networks) Rule Base is the view in which objects are implemented and applied to the rules which make up the Security Policy SmartMap is the view in which the objects implemented in the Rule Base are displayed in a graphical representation
Appendix A
Network Objects
Network Objects
In This Appendix
Check Point Objects Nodes Interoperable Device Networks Domains Open Security Extension (OSE) Devices Groups Logical Servers Address Ranges Dynamic Objects VoIP Domains page 322 page 325 page 325 page 325 page 326 page 326 page 330 page 330 page 331 page 331 page 332
If the Check Point Gateway that you defined does not need to perform IP forwarding or anti-spoofing, you can convert it to a Check Point Host.
322
Converting a Check Point Gateway into a Check Point Host You can convert a Check Point Gateway to a Check Point Host by right-clicking the Check Point Gateway in the Objects Tree and selecting Convert to Host.
If you have defined a Check Point Host and you are trying to use it to perform IP forwarding or anti-spoofing, you must convert it to a Check Point Gateway. Converting a Check Point Host into a Check Point Gateway You can convert a Check Point Host to a Check Point Gateway by right-clicking the Check Point Host in the Objects Tree and selecting Convert to Gateway.
Appendix A
Gateway Cluster
A Gateway Cluster is a group of VPN-1 Pro module machines on which Check Point software has been installed which have been configured to provide failover services using ClusterXL or another Cluster solution. Converting a Cluster Member into a Check Point Gateway You can detach a Cluster member from a Gateway Cluster and convert it into a Check Point Gateway as follows: 1. Right-click on a Cluster object in the Objects Tree or List. 2. Select Detach Cluster Members from the menu. 3. Select the member from the displayed window and click Detach. 4. Ignore the displayed warning in order to complete the conversion. 5. The Gateway Properties window of the converted cluster member is displayed. Click OK to finalize the conversion.
324
Nodes
Nodes
A node can represent any network entity. The two most common uses of this object are to create non-Check Point Gateways and Hosts. A Gateway Node is a Gateway which does not have Check Point software installed. A Host Node is a Host which does not have Check Point software installed.
Converting Nodes
Gateway Nodes can be converted to Host Nodes and vice versa. Right-click on the specified Node in the Objects Tree and selecting Convert to Host or Gateway. Gateway Nodes can be converted to Check Point Gateways. Right-click on the Gateway Node in the Objects Tree and selecting Convert to Check Point Gateway. Host Nodes can be converted to Check Point Hosts. Right-click on the specified Host Node in the Objects Tree and selecting Convert to Check Point Host.
Interoperable Device
An Interoperable Device is a device which has no Check Point product software installed. This device is managed by any Management Server, including SmartCenter Server, although, it cannot receive the Check Point Security Policy, and it can participate in Check Point VPN communities and solutions.
Networks
A Network is a group of IP addresses defined by a network address and a net mask. The net mask indicates the size of the network. A Broadcast IP address is an IP address which is destined for all hosts on the specified network. If this address is included, the Broadcast IP address will be considered as part of the network.
Appendix A
Domains
Domains
This object defines a DNS domain name. The format of the domain name is .x.y, where each section of the domain name is the demarcated by a period. For instance .mysite.com or .mysite.co.uk. The domain name that is specified must be an actual domain name in order that it can be resolved to a valid IP address. The first time that a domain name is resolved by VPN-1 Pro a brief delay may occur. Once the domain name has been resolved it is entered into the cache, and no further delays will take place on any subsequent access attempts. On account of the initial delays which delay may occur for each new domain name; the rules that contain Domain objects in their Source or Destination should be placed towards the end of the Rule Base.
Show all IPs behind gateway Show all IP addresses behind the device in the SmartMap View. To add an interface, click Add. The Interface Properties window is displayed. To edit an interface, select the interface and click Edit, or double-click the interface. The Interface Properties window is displayed. To delete an interface, select the interface and click Remove. The manner in which names are specified for OSE device interfaces is different from the manner in which they are specified for interfaces of other network objects.
Appendix A Network Objects 327
Name name of the network interface as specified in the routers interface configuration scheme. This name does not include a trailing number.
IP Address the IP address of the device Net Mask the net mask of the device. Exportable for SecuRemote/SecureClient Specifies whether information about this object can be made available to SecuRemote/SecureClient machines.
Note - Logging for spoofing attempts is available for external interfaces only.
328
Enable Username the user name required to install Access Lists Enable Password the password required to install Access Lists The security administrator must select one of the following options from the drop-down list for the above Username and Password fields (this includes the Enable fields): None Indicates the parameter is not needed. Known the value of the parameter must be entered Prompt Indicates that the security administrator will be prompted for this parameter. Version the Cisco OSE device version (9.x, 10.x, 11.x, 12,x) OSE Device Interface Direction Installed rules are enforced on data packets traveling in this direction on all interfaces. Spoof Rules Interface Direction The spoof tracking rules are enforced on data packets traveling in this direction on all interfaces. Security The security administrator must select either none, Wellfleet or Other from the drop-down list. Password the password to access the OSE device Additional Managers additional managers as defined in the Bay Site Manager software Volume the volume on the OSE device Config File name of the config file on the OSE device Version the version of the OSE device (7.x, 8.x, 9.x, 10.x, 11.x, or 12.x) OSE Device Access Username the name required to logon to the OSE device Password the password to access the OSE device Manager Password password required to connect to the OSE device Interface Directions Rules the direction in which the rules are enforced on the OSE device interfaces Spoof Rules the direction in which spoof rules are enforced on each OSE device interface
Appendix A Network Objects 329
Groups
Generate ICMP Errors For denied packets, this option specifies whether or not the OSE Device should generate ICMP destination administratively unreachable messages (ICMP type 13).
Groups
A network objects group is a collection of hosts, gateways, networks or other groups. Groups are used in cases where you cannot work with single objects, e.g. when working with VPN domains or with topology definitions. In addition, groups can greatly facilitate and simplify network management, since they allow you to perform operations only once instead of repeating them for every group member. The Group Properties window lists the network objects included from the group versus those excluded from the group. To configure the group, move objects between the lists as needed. To include an unlisted network object in the group, create it now by clicking New... This window shows collapsed sub-groups, without listing their members. For a list of all group members (including the sub-groups members), click View Expanded Group....
Logical Servers
A Logical Server is a group of machines that provides the same services. The workload of this group is distributed between all its members. When a Server group is stipulated in the Servers group field, the client is bound to this physical server. In Persistent server mode the client and the physical server are bound for the duration of the session. Persistency by Service once a client is connected to a physical server for a specified service, subsequent connection to the same Logical Server and the same service will be redirected to the same physical server for the duration of the session. Persistency by Server once a client is connected to a physical server, subsequent connections to the same Logical Server (for any service) will be redirected to the same physical server for the duration of the session.
330
Address Ranges
Balance Method
The load balancing algorithm stipulates how the traffic is balanced between the servers. There are several types of balancing methods: Server Load VPN-1 Pro determines which Server is best equipped to handle the new connection Round Trip Time On the basis of the shortest round trip time between VPN-1 Pro and the servers, executed by a simple ping, VPN-1 Pro determines which Server is best equipped to handle the new connection Round Robin the new connection is assigned to the first available server Random the new connection is assigned to a server at random Domain the new connection is assigned to a server based on domain names
Address Ranges
An Address Range object stipulates the range of IP addresses used in the network from the first to the last IP address. This object is used when the networks themselves do not have IP address-net mask alignment, so an Address Range is necessary for the implementation of: NAT, and VPN
Dynamic Objects
A dynamic object is a "logical" object where the IP address will be resolved differently per VPN-1 Pro module using the dynamic_objects command. The following are the predefined Dynamic Objects: LocalMachine-all-interfaces The DAIP machine interfaces (static and dynamic) are resolved into this object. LocalMachine The external interface (dynamic) of the ROBO gateway (as declared in cpconfig when configuring the ROBO gateway). InternalNet The internal interface of the ROBO gateway (as declared in cpconfig when configuring the ROBO gateway). AuxiliaryNet The auxiliary interface of the ROBO gateway (as declared in cpconfig when configuring the ROBO gateway).
Appendix A
VoIP Domains
DMZNet The DMZ interface of the ROBO gateway (as declared in cpconfig when configuring the ROBO gateway).
VoIP Domains
There are five types of VoIP Domain objects: VoIP Domain SIP Proxy VoIP Domain H.323 Gatekeeper VoIP Domain H.323 Gateway VoIP Domain MGCP Call Agent VoIP Domain SCCP CallManager
In many VoIP networks, the control signals follow a different route through the network than the media. This is the case when the call is managed by a signal routing device. Signal routing is done in SIP by the Redirect Server, Registrar, and/or Proxy. In SIP, signal routing is done by the Gatekeeper and/or Gateway. Enforcing signal routing locations is an important aspect of VoIP security. It is possible to specify the endpoints that the signal routing device is allowed to manage. This set of locations is called a VoIP Domain. For more information refer to the Firewall and SmartDefense Guide.
332
The following command line commands relate to SmartCenter and are documented in the Command Line Interface (CLI) Guide.
Description This command and all its derivatives are used to execute operations on the ICA. This command prompts the ICA to issue a SIC certificate for the SmartCenter server. This command is used to revoke a certificate issued by the ICA. This command is used to invoke or terminate the ICA Management Tool. This command is used to run a Command Line version of the Check Point Configuration Tool. This tool is used to configure/reconfigure a VPN-1 Pro installation. This command and all its derivatives relate to the subject of Check Point license management. All cplic commands are located in $CPRID/bin. Use this command to check whether the license on the local machine will allow a given feature to be used.
cplic
cplic check
333
Table B-1
Description The cplic db_add command is used to add one or more licenses to the license repository on the SmartCenter Server. When local license are added to the license repository, they are automatically attached to its intended Check Point Gateway, central licenses need to undergo the attachment process. The cplic db_print command displays the details of Check Point licenses stored in the license repository on the SmartCenter Server. The cplic db_rm command removes a license from the license repository on the SmartCenter Server. It can be executed ONLY after the license was detached using the cplic del command. Once the license has been removed from the repository, it can no longer be used. Use this command to delete a single Check Point license on a host, including unwanted evaluation, expired, and other licenses. This command is used for both local and remote machines. Use this command to detach a Central license from a Check Point Gateway. When this command is executed, the License Repository is automatically updated. The Central license remains in the repository as an unattached license. This command can be executed only on a SmartCenter Server. The cplic get command retrieves all licenses from a Check Point Gateway (or from all Check Point Gateways) into the license repository on the SmartCenter Server. Do this to synchronize the repository with the Check Point Gateway(s). When the command is run, all local changes will be updated. The cplic put command is used to install one or more Local licenses on a local machine. Use the cplic put command to attach one or more central or local license remotely. When this command is executed, the License Repository is also updated.
cplic db_print
cplic db_rm
cplic del
cplic get
334
Table B-1
Description The cplic print command (located in $CPDIR/bin) prints details of Check Point licenses on the local machine. Use the cplic upgrade command to upgrade licenses in the license repository using licenses in a license file obtained from the User Center. This utility has two main functionalities Export and import of policy packages Merge of objects from a given file into SmartCenter database This command provides the options of deleting an existing policy package. Note that the default policy can be deleted by delete action. This command provides the options of leaving the policy package in the active repository, or deleting it as part of the export process. The default policy cannot be deleted during the export action. This command provides the options to overwrite an existing policy package with the same name, or preventing overwriting when the same policy name already exists. This command is used to manage the Package Repository. It is always executed on the SmartCenter Server. The cppkg add command is used to add a package to the Package Repository. Only SmartUpdate packages can be added to the Package Repository. The command is used to delete a package from the Package Repository. To delete a package you must specify a number of options. To see the format of the options and to view the contents of the Package Repository, use the cppkg print command. This command synchronizes the Package Repository database with the content of the actual Package Repository under $SUROOT.
cplic upgrade
cp_merge
cp_merge delete_policy
cp_merge export_policy
cp_merge import_policy|restore_policy
cppkg add
cppkg delete
cppkg get
Appendix B
Table B-1
Description The command is used to find out the location of the Package Repository. The default Package Repository location on Windows machines is C:\SUroot. On UNIX it is /var/SUroot. The command is used to list the contents of the Package Repository. The command is used to create a new repository root directory location, and to move existing packages into the new Package Repository. Stops and starts the Check Point Remote installation Daemon (cprid). This is the daemon that is used for remote upgrade and installation of products. It is part of the SVN Foundation. In Windows it is a service. Start the Check Point Remote installation Daemon (cprid). This is the service that allows for the remote upgrade and installation of products. It is part of the SVN Foundation. In Windows it is a service. Stop the Check Point Remote installation Daemon (cprid). This is the service that allows for the remote upgrade and installation of products. It is part of the SVN Foundation. In Windows it is a service. Use cprinstall commands to perform remote installation of packages, and associated operations. The command is used to boot the remote computer. This command enables cprestart to be run remotely. This command enables cpstart to be run remotely. This command enables cpstop to be run remotely. The cprinstall get command is used to obtain details of the packages and the Operating System installed on the specified Check Point Gateway, and to update the database.
cpridrestart
cpridstart
cpridstop
cprinstall cprinstall boot cprinstall cprestart cprinstall cpstart cprinstall cpstop cprinstall get
336
Table B-1
Description The cprinstall install command is used to install Check Point packages, VPN-1 Edge firmware packages, OPSEC partner packages (SU compliant) and Nokia IPSO images on remote Check Point Gateways. To install a package you must specify a number of options. Use the cppkg print command and copy the required options. The cprinstall uninstall command is used to install Check Point packages, VPN-1 Edge firmware packages, OPSEC partner packages (SU compliant) and Nokia IPSO images on remote Check Point Gateways. To uninstall a package you must specify a number of options. Use the cprinstall get command and copy the required options. The cprinstall verify command is used to verify: If a specific product can be installed on the remote Check Point Gateway. That the Operating System and currently installed products are appropriate for the package. That there is enough disk space to install the product. That there is a CPRID connection. This command is used to start all Check Point processes and applications running on a machine.
cprinstall uninstall
cprinstall verify
cpstart cpstat
cpstat displays the status of Check Point applications, either on the local machine or on another machine, in various formats.
This command is used to terminate all Check Point processes and applications, running on a machine.
cpstop
Appendix B
Table B-1
Command cpwd_admin
Description
cpwd (also known as WatchDog) is a process that invokes and monitors critical processes such as Check Point daemons on the local machine, and attempts to restart them if they fail. Among the processes monitored by Watchdog are cpd, fwd, fwm. cpwd is part of the SVN Foundation. cpwd writes monitoring information to the $CPDIR/log/cpwd.elg log file. In addition, monitoring information is written to the console on UNIX platforms, and to the Windows Event Viewer. The cpwd_admin utility is used to show the status of processes, and to configure cpwd.
This command is used to set cpwd configuration parameters. When parameters are changed, these changes will not take affect until cpwd has been stopped and restarted. This command is used to check whether cpwd is alive. This command is used to kill cpwd. This command is used to print a status of the selected processes being monitored by cpwd. This command is used to print the list of processes actively being monitored. Start a new process by cpwd. This command is used to start continuous monitoring on this machine. Stop a process which is being monitored by cpwd. This command is used to stop continuous monitoring on this machine. This command is used by administrators to edit the objects file on the SmartCenter Server. From version NG, there is an objects file on the Module and a new file, objects_5_0.C on the SmartCenter Server. A new objects.C file is created on the Module (based on the objects_5_0.C on the SmartCenter Server) whenever a Policy is installed. Editing the objects.C file on the Module is no longer required or desirable, since it will be overwritten the next time a Policy is installed.
cpwd_admin config
cpwd_admin exist cpwd_admin kill cpwd_admin list cpwd_admin monitor_list cpwd_admin start cpwd_admin start_monitor cpwd_admin stop cpwd_admin stop_monitor dbedit
338
Table B-1
Command DBTableStat
Description This utility provides a daily summary of the number of log records that match the consolidation rules, and the number of consolidated records that were stored in the specified database table. The format of the output is a comma separated value. The execution time of this utility depends on the amount of records in the Eventia Reporter table. The dbver utility is used to export and import different revisions of the database. The properties of the revisions (last time created, administrator responsible for, etc) can be reviewed. The utility can be found in $FWDIR/bin. Create a revision from the current state of $fwdir/conf, including current objects, rule bases, etc. Archive the revision as an archive file in the revisions repository: $fwdir/conf/db_versions/export. Add an exported revision to the repository a version from $fwdir/conf/db_versions/export. Give filename of revision as input. Print the properties of the revision. Print the properties of all revisions to be found on the server side: $fwdir/conf/db_versions.
dbver
dbver create
dynamic_objects specifies an IP address to which the dynamic object will be resolved on this machine.
The fw commands are used for working with various aspects of the firewall component of VPN-1 Pro. All fw commands are executed on the enforcement module. Typing fw at the command prompt sends a list of available fw commands to the standard output. The fw ctl command controls the VPN-1 Pro kernel module. This command is used to modify the expiration date of all users and administrators. This command fetches the Inspection Code from the specified host and installs it to the kernel.
Appendix B
Table B-1
Command fw fetchlogs
Description
fw fetchlogs fetches Log Files from a remote machine. You can use the fw fetchlogs command to transfer Log Files to the machine on which the fw fetchlogs command is executed. The Log Files are read from and written to the directory $FWDIR/log.
This command prompts the kernel to shut down all the daemon processes in the firewall component of VPN-1 Pro. The command is located in the $FWDIR/bin directory on the SmartCenter Server or enforcement module. The VPN-1 Pro daemons and Security Servers write their pids to files in the $FWDIR/tmp directory upon startup. These files are named $FWDIR/tmp/daemon_name.pid. For example, the file containing the pid of the VPN-1 Pro snmp daemon is $FWDIR/tmp/snmpd.pid.
This command should be run from the SmartCenter Server. It sends a LEA_COL_LOGS event to all connected lea clients, see the LEA Specification documentation. It should be used after new log files have been imported (manually or automatically) to the $FWDIR/log directory in order to avoid the scheduled update which takes 30 minutes.
fw kill
fw lea_notify
fw lichosts
This command prints a list of hosts protected by VPN-1 Pro products. The list of hosts is in the file $fwdir/database/fwd.h
fw log fw logswitch
fw log displays the content of Log files. fw logswitch creates a new active Log File. The current active Log File is closed and renamed by default $FWDIR/log/current_time_stamp.log unless you define an alternative name that is unique. The format of the default name current_time_stamp.log is YYYY-MM-DD_HHMMSS.log. For example: 2003-03-26_041200.log
340
Table B-1
Command fw mergefiles
Description This command merges several Log Files into a single Log File. The merged file can be sorted according to the creation time of the Log entries, and the times can be fixed according to the time zones of the origin Log Servers. When the combined size exceeds 2GB, the merge creates a list of "merged files" where each file size is not more then 2GB. The user receives the following warning: "Warning: The size of the files you have chosen to merge is greater than 2GB. The merge will produce two or more files." The files names will be: [Requested name].log, [Requested name]_1.log, [Requested name]_2.log, ...,[Requested name]_n.log. Logs entries with the same Unique-ID are unified. If a Log switch was performed before all the segments of a specific log were received, this command will merge the records with the same Unique-ID from two different files, into one fully detailed record. This command displays a list of Log Files residing on a remote or local machine. You must initialize SIC between the SmartCenter Server and the remote machine. This command installs an authentication password on a host. This password is used to authenticate internal communications between Check Point Modules and between a Check Point Module and its SmartCenter Server. A password is used to authenticate the control channel the first time communication is established. This command is required for backward compatibility scenarios.
fw lslogs
fw putkey
fw repairlog
fw repairlog rebuilds a Log files pointer files. The three files name.logptr, name.loginitial_ptr and name.logaccount_ptr are recreated from data in the specified Log file. The Log file itself is modified only if the -u flag is specified.
Appendix B
Table B-1
Command fw sam
Description This command is used to manage the Suspicious Activity Monitoring (SAM) server. Use the SAM server to block connections to and from IP addresses without the need to change the Security Policy. SAM commands are logged. Use this command to (also) monitor active SAM requests (see -M option). To configure the SAM Server on the SmartCenter Server or Firewall Gateway machine, use SmartDashboard to edit the Advanced>SAM page of the Check Point Gateway object. This command is used to perform SmartCenter operations on VPN-1 Pro. It controls fwd and all Check Point daemons.
fwm
fwm dbimport
fwm dbimport imports users into the VPN-1/FireWall-1 User Database from an external file. You can create this file yourself, or use a file generated by fwm dbexport. fwm dbexport exports the VPN-1/FireWall-1 User Database to a file. The file may be in one of the following formats: - The same Usage as the import file for fwm dbimport - LDIF format, which can be imported into an LDAP Server using ldapmodify
This command downloads the user database and network objects information to selected targets. If no target is specified, then the database is downloaded to localhost. The fwm hastat command displays information about High Availability machines and their states.
fwm dbexport
fwm dbload
fwm ikecrypt command line encrypts the password of a SecuRemote user using IKE. The resulting string must then be stored in the LDAP database.
342
Table B-1
Description This command compiles and installs a Security Policy or a specific version of the Security Policy on the targets VPN-1 Pro Modules. This is done in one of two ways: - fwm load compiles and installs an Inspection Script (*.pf) file on the designated VPN-1 Pro Modules. - fwm load converts a Rule Base (*.W) file created by the GUI into an Inspection Script (*.pf) file then installs it to the designated VPN-1 Pro Modules. Versions of the Security Policy and databases are maintained in a version repository on the SmartCenter Server. Using this command specific versions of the Security Policy can be installed on a Module (local or remote) without changing the definition of the current active database version on the SmartCenter Server. To protect a target, you must load a Policy that contains rules whose scope matches the target. If none of the rules are enforced on the target, then all traffic through the target is blocked. This commands enables you to view and unlock locked administrators.
fwm lock_admin fwm logexport fwm unload <targets> fwm ver GeneratorApp
Appendix B
Table B-1
Command inet_alert
Description This command notifies a companys Internet Service Provider (ISP) when the companys corporate network is under attack. The inet_alert utility forwards log messages generated by the alert daemon to an external SmartCenter Server, typically located at the ISP site. The ISP can then analyze the alert and decide how to react. inet_alert uses the ELA Protocol to send the alert. The SmartCenter Server receiving the alert must be running the ELA Proxy. If communication with the ELA Proxy is to be authenticated or encrypted, a key exchange must be performed between the SmartCenter Server running the ELA Proxy and the VPN-1 Pro Module generating the alert. To use this utility, enter it into a script. From Global Properties > Logs and alert > alert commands > early versions compatibility > run 4.x alert script, and enter the name of the script. ldapcmd is used to manage processes running on the Firewall collectively or individually. It includes: Cache cache operations, such as emptying the cache, as well as providing debug information. Statistics lookup statistics such as, all user search, pending lookups (when two or more lookups are identical) and total lookup time (the total search time for a specific lookup) cache statistics such as hits and misses Logging view the alert and warning log regarding debug
ldapcmd
ldapcompare
ldapcompare is used to perform compare queries that prints a message whether the result returned a match or not. ldapcompare opens a connection to an LDAP directory server, binds, and performs the comparison specified on the command line or from a specified file.
344
Table B-1
Command ldapconvert
Description
ldapconvert is a utility program to port from Member mode to MemberOf mode. This is done by searching all specified group/template entries and fetching their Member attribute values. Each value is the DN of a member entry. The entry identified by this DN will be added the MemberOf attribute value of the group/template DN at hand. In addition, those Member attribute values will be deleted from the group/template unless Both mode is specified. While running the program, a log file, named ldapconvert.log, is generated in the current directory, logging all modifications done and errors encountered. ldapmodify imports users to an LDAP server. The input file must be in the LDIF format. ldapsearch queries an LDAP directory and returns the results. log_export is a utility that allows you to transfer Log data to an external database. This utility behaves as a LEA client. LEA (Log Export API) enables VPN-1 Pro Log data to be exported to third-party applications. log_export receives the Logs from the SmartCenter Server via LEA so it can be run from any host that has a SIC connection with the SmartCenter Server and is defined as an OPSEC host. log_export should be defined as a reporting module in order to act in a distributed environment. To run log_export, you need a basic understanding and a working knowledge of: - Oracle database administration - LEA
Appendix B
Table B-1
Description
queryDB_util enables searching the object database according to search parameters. rs_db_tool is used to manage DAIP Modules in a DAIP database.
This tool executes VPN-1 Pro SAM (Suspicious Activity Monitoring) actions according to information received through Standard input. This tool is for executing SAM actions with the VPN-1 Pro User Defined alerts mechanism.
346
AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The following statements refer to those portions of the software copyrighted by Eric Young. THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright 1998 The Open Group. The following statements refer to those portions of the software copyrighted by Jean-loup Gailly and Mark Adler Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. The following statements refer to those portions of the software copyrighted by the Gnu Public License. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. The following statements refer to those portions of the software copyrighted by Thai Open Source Software Center Ltd and Clark Cooper Copyright (c) 2001, 2002 Expat maintainers. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. GDChart is free for use in your applications and for chart generation. YOU
Check Point Software Technologies Ltd. U.S. Headquarters: 800 Bridge Parkway, Redwood City, CA 94065, Tel: (650) 628-2000 Fax: (650) 654-4233, [email protected] International Headquarters: 3A Jabotinsky Street, Ramat Gan, 52520, Israel, Tel: 972-3-753 4555 Fax: 972-3-575 9256, http://www.checkpoint.com
MAY NOT re-distribute or represent the code as your own. Any redistributions of the code MUST reference the author, and include any and all original documentation. Copyright. Bruce Verderaime. 1998, 1999, 2000, 2001. Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41RR02188 by the National Institutes of Health. Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc. Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner. Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs. Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson ([email protected]). Portions relating to gdft.c copyright 2001, 2002 John Ellson ([email protected]). Portions relating to JPEG and to color quantization copyright 2000, 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information. Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande. Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation. This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your productive use of gd. If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible documentation. This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation. Although their code does not appear in gd 2.0.4, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributions. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 The curl license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2004, Daniel Stenberg, <[email protected]>.All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. The PHP License, version 3.0 Copyright (c) 1999 - 2004 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/ or other materials provided with the distribution. 3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. 4. Products derived from this software may not be called "PHP", nor may "PHP" appear in their name, without prior written permission from [email protected]. You may indicate that your software works in conjunction with PHP by saying "Foo for PHP" instead of calling it "PHP Foo" or "phpfoo" 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group. No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License. 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes PHP, freely available from <http://www.php.net/>". THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be contacted via Email at [email protected]. For more information on the PHP Group and the PHP project, please see <http://www.php.net>. This product includes the Zend Engine, freely available at <http://www.zend.com>. This product includes software written by Tim Hudson ([email protected]). Copyright (c) 2003, Itai Tzur <[email protected]> All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistribution of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Neither the name of Itai Tzur nor the names of other contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd
The material in document is provided with "RESTRICTED RIGHTS." Software and accompanying documentation are provided to the U.S. government ("Government") in a transaction subject to the Federal Acquisition Regulations with Restricted Rights. The Government's rights to use, modify, reproduce, release, perform, display or disclose are restricted by paragraph (b)(3) of the Rights in Noncommercial Computer Software and Noncommercial Computer Soft-ware Documentation clause at DFAR 252.227-7014 (Jun 1995), and the other restrictions and terms in paragraph (g)(3)(i) of Rights in Data-General clause at FAR 52.227-14, Alternative III (Jun 87) and paragraph (c)(2) of the Commer-cial Computer Software-Restricted Rights clause at FAR 52.227-19 (Jun 1987).
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Copyright 2003, 2004 NextHop Technologies, Inc. All rights reserved. Confidential Copyright Notice Except as stated herein, none of the material provided as a part of this document may be copied, reproduced, distrib-uted, republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not lim-ited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of NextHop Technologies, Inc. Permission is granted to display, copy, distribute and download the materials in this doc-ument for personal, non-commercial use only, provided you do not modify the materials and that you retain all copyright and other proprietary notices contained in the materials unless otherwise stated. No material contained in this document may be "mirrored" on any server without written permission of NextHop. Any unauthorized use of any material contained in this document may violate copyright laws, trademark laws, the laws of privacy and publicity, and communications regulations and statutes. Permission terminates automatically if any of these terms or condi-tions are breached. Upon termination, any downloaded and printed materials must be immediately destroyed. Trademark Notice
Use of the material in this document by the Government constitutes acknowledgment of NextHop's proprietary rights in them, or that of the original creator. The Contractor/Licensor is NextHop located at 1911 Landings Drive, Mountain View, California 94043. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in applicable laws and regulations. Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty Disclaimer Warranty THE MATERIAL IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED. TO THE FULLEST EXTENT POSSIBLE PURSUANT TO THE APPLICABLE LAW, NEXTHOP DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON INFRINGEMENT OR OTHER VIOLATION OF RIGHTS. NEITHER NEXTHOP NOR ANY OTHER PROVIDER OR DEVELOPER OF MATERIAL CONTAINED IN THIS DOCUMENT WARRANTS OR MAKES ANY REPRESEN-TATIONS REGARDING THE USE, VALIDITY, ACCURACY, OR RELIABILITY OF, OR THE RESULTS OF THE USE OF, OR OTHERWISE RESPECTING, THE MATERIAL IN THIS DOCUMENT. Limitation of Liability UNDER NO CIRCUMSTANCES SHALL NEXTHOP BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING, BUT NOT LIMITED TO, LOSS OF DATA OR PROFIT, ARISING OUT OF THE USE, OR THE INABILITY TO USE, THE MATERIAL IN THIS DOCUMENT, EVEN IF NEXTHOP OR A NEXTHOP AUTHORIZED REPRESENTATIVE HAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IF YOUR USE OF MATERIAL FROM THIS DOCUMENT RESULTS IN THE NEED FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT OR DATA, YOU ASSUME ANY COSTS THEREOF. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT FULLY APPLY TO YOU. Copyright ComponentOne, LLC 1991-2002. All Rights Reserved.
The trademarks, service marks, and logos (the "Trademarks") used and displayed in this document are registered and unregistered Trademarks of NextHop in the US and/or other countries. The names of actual companies and products mentioned herein may be Trademarks of their respective owners. Nothing in this document should be construed as granting, by implication, estoppel, or otherwise, any license or right to use any Trademark displayed in the document. The owners aggressively enforce their intellectual property rights to the fullest extent of the law. The Trademarks may not be used in any way, including in advertising or publicity pertaining to distribution of, or access to, materials in this document, including use, without prior, written permission. Use of Trademarks as a "hot" link to any website is prohibited unless establishment of such a link is approved in advance in writing. Any questions concerning the use of these Trademarks should be referred to NextHop at U.S. +1 734 222 1600. U.S. Government Restricted Rights
BIND: ISC Bind (Copyright (c) 2004 by Internet Systems Consortium, Inc. ("ISC")) Copyright 1997-2001, Theo de Raadt: the OpenBSD 2.9 Release PCRE LICENCE PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself. Written by: Philip Hazel <[email protected]> University of Cambridge Computing Service, Cambridge, England. Phone:
+44 1223 334714. Copyright (c) 1997-2004 University of Cambridge All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/ or other materials provided with the distribution. * Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Index
A
Add Package From CD 214 administrator authentication 28 configuring 53 login 28 template 50 types 51 alert commands mail alert 161 SNMP trap alert 161 user defined 161 attach 209 attaching licenses 219 AttributesTranslationMap 273 audit log 210 authentication administrator 28 automated software 205 command line interface 206 compiling a Security Policy 343 contains operator 253 cpd 207 CPInfo 228 CPLIC 220 cplic 229 cplic get 334 cplic print 335 cplic put remote operation 334 cppkg 229 cppkg delete 335 cppkg getroot 336 cppkg setroot 336 cprid daemon 207 cprinstall 229 cprinstall boot 336 cprinstall get 337 cprinstall stop 337 cyclic logging 138 configuration 156 Expand/Collapse 209 ExpirationDateAttr 272 ExpirationDateFormat 271 export user database 342 Exporting a License 227 external group when changes take effect 51
F
filter 134 configuration 146 fingerprint SmartCenter server authentication 29 FireWalled host displaying status of 337 fw fetchlogs 340 fw lea_notify 340 fw lea_notify command 340 fw lslogs 340 fw mergefiles 341 fw repairlog 341 fw sam 342 fw unload 343 fw.adtlog 129 fw.log 138 fw1allowed-dst 264 fw1allowed-src 264 fw1allowed-vlan 264 fw1authmethod 261 fw1auth-server 262 fw1day 263 fw1enc-fwz-expiration 265 fw1expiration-date 263 fw1groupTemplate 266 fw1hour-range-from 263 fw1hour-range-to 263 fw1person 253 fw1pwdLastMod 262 fw1sr-auth-track 265 351
B
BadPwdCountAttr 272 block intruder 140 configuration 160 BranchObjectClass 274 BranchOCOperator 274
D
DAIP Module managing from the command line 346 database users 50 Database Revision Control 168 Distribute 211 distribute 209, 215 distribute packages 214 Download Center 207 dynamic_objects 339
C
Central License 220 Central license 219, 223 centralized policy management 205 Certificate Key 220 Check Point CD 207 ClientSideCrypt 272 color 327 command line 218, 229
E
ends with operator 253
March 2006
fw1SR-datam 265 fw1SR-keym 264 fw1SR-mdm 265 fwm dbimport 342 fwm ikecrypt 342 fwm logexport 343 fwm unload 343 fwm ver 343
L
LDAP 49 group 51 LDAP profiles modifying 270 types of 241 LDAP Server exporting users from 342 importing users to 345 LDAP servers differences between 240 LDAP Version 3.0 253 ldapmodify command 258 ldapsearch 345 LDIF syntax 342 less than operator 253 compatibility with LDAP versions 253 license checking 333 displaying 335 finding expired 227 installing 334 removing from repository 226 viewing properties 226 License Expiration 221 License Management 223 license management 205 License Repository 206, 207, 208, 219, 222, 223, 224, 227 license updates 205 Licenses 207, 208 Licenses Repository 209 lmhosts file 327 loading a Security Policy 343 Local License 221 Local license 219, 223 log cyclic logging 138, 156 downtime 139 export 138 fw.adtlog 129 local 139, 156 log server 139 log server configuration 157 maintenance 138, 155 overview 129 purge 156
G
greater than operator 253 compatibility with LDAP versions 253 GroupMembershipAttr 278, 279 GroupObjectClass 276 GroupOCOperator 274 GroupRDN 279
H
HFA 211 hosts file 327 Hot Fix Accumulators 215 Hotfixes 213
remote file management 139 switching the active log file 138, 155 Log File creating new 340 displaying contents of 340 displaying, using commandline interface 341, 342 exporting 343 unified log 341 Log file repairing pointer files 341 log file 210 log server 139 configuration 157 log servers 139 log switch 138 configuration 155 schedule 155 login bi-directional authentication 28 SIC 28
M
Master fetching Security Policy from 339 Microsoft Active Directory adding attributes to 257 alternative to extending the schema 255 delegating control over 256 enabling 254 number of queries in 255 registry settings for 256 structure of 254 monitoring system status 144 Multi-License File 221
I
inetOrgPerson 253 installation targets 66 installation target configuring 72 installing a FireWall-1 license 334 Integrated Firewalls 329 Internal Certificate Authority SIC, ICA 44 Internal Template object 255 is not operator 253 is operator 253
N
Nokia 215 null matches 146
352
O
object database querying 346 Objects configuring 34 database 320 in SmartDashboard 31 management operations 33 managing 30 objects tree 68 sorting 68 objects_5_0.C file 338 Obsolete license 221 Operation Status 210 OPSEC 205, 213 organizationalPerson 253 OrganizationObjectClass 275 OrgUnitObjectClass 275 OrgUnitRDN 278, 279
security and address translation 64 uninstall 58 user database 56 VPN manager 64 web access 64 PsswdDateAttr 272 PsswdDateFormat 271
Q
query all records 134 configuration 149 custom 134 definition 134 intersecting queries 75 network object 68 predefined 134 rule 67 rule base 74 queryDB_util utility 346
P
Package Management 212 Package Repository 206, 207, 208, 213, 214 Package/Licenses Management 209 Packages 207, 208 Packages Repository 209 password verifying 261 person 253 policy adding to a policy package 73 policy package 56 adding a policy 73 advanced security 56 desktop security 56, 64 file operations 65 install 57 installation target 72 installation targets 66 overview 56, 64 QoS 56, 64 query network object 68 query rules 67 rule section title 67
R
reboot 217 remote device 214 remote enforcement points 204 remote firewalls 204 remote upgrade 205 Repository 209 routers anti-spoofing capabilities 328 rule section titles 67
S
schema_microsoft_ad.ldif file 257 Secure Initial Communication (SIC) 207 Secure Internal Communication (SIC) 212 SecurePlatform 215, 218
Security Policy compiling 343 fetching from Master 339 loading 343 uninstalling 343 Show 146 SIC 28 ICA, Internal Certificate Authority 44 initialize, Configuration Tool 44 reset Trust state 46 Secure Internal Communication 43 test SIC status 45 the solution 44 troubleshooting 46 Trust states 45 single management console 205 SKU 222 SmartCenter Server fingerprint 29 SmartDirectory (LDAP) 231 SmartMap adjust,customize,magnify,scr oll,Navigator,Layout 80 connections 84 enable,view, toggle, launch 79 Folders 88 integration with Rule Base 90 Internet, Connectivity Clouds, Implied Networks, Ambiguous Networks, Contained Networks 85 output 94 overview 78 solution 78 troubleshooting 92 working with Network Objects and Groups,select mode 82 SmartUpdate Operation Status pane, using the 208 SmartView Tracker account 141 active 133 alert 141 alert command configuration 161 audit 133 353
block intruder 140, 160 custom commands 140, 159 filter 134, 146 fw.adtlog 133 fw.log 133, 138 local logging 139 log 133, 141 log export 138 log switch 138, 155 modes 133 null matches 146 overview 131 purge 156 query 134, 149 remote file management 156 resolving IP addresses 145 track options 141 view options 144 working with 139 Snapshot 218 SNMP 302 Check Point Solution 303 Configuring 307 MIB 303 Requests on Unix 305 Requests on Windows NT 304 Special Consideration 306 trap 339 Traps 305 sort 68 objects list pane 68 sounds like operator 253 starts with operator 253 status of Check Point Modules, displaying 337 Stop Operation 217
alert 141 basic configuration 143 column 129 log 141 options 141 overview 129 rule 141
U
Uninstallation 217 uninstalling a Security Policy 343 UNIX 214 upgrade 214 Upgrade all Packages 211, 215 Upgrade Status 221 upgrading licenses 219 user configuring 52 database 50 managing in LDAP 49 managing in SmartDashboard 50 template 50 types 51 User Center 207 User Database downloading 342 user database exporting 342 importing 342 UserLoginAttr 270 UserMembershipAttr 277 UserObjectClass 276 UserPasswordAttr 270 UserRDN 279 users database 50 install 59
T
template 51 administrator 50 configuring 54 user 50 TemplateObjectClass 271 Topology of the network, definition 47 track account 141 354
V
VPN communities 323 VPN-1 Pro 205 VPN-1/FireWall-1 license, see license